{
  "name": "checkpoint",
  "version": "2.12.0",
  "description": "A Pulumi provider dynamically bridged from checkpoint.",
  "attribution": "This Pulumi package is based on the [`checkpoint` Terraform Provider](https://github.com/checkpointsw/terraform-provider-checkpoint).",
  "repository": "https://github.com/checkpointsw/terraform-provider-checkpoint",
  "publisher": "checkpointsw",
  "meta": {
    "moduleFormat": "(.*)(?:/[^/]*)"
  },
  "language": {
    "csharp": {
      "compatibility": "tfbridge20",
      "liftSingleValueMethodReturns": true,
      "respectSchemaVersion": true
    },
    "go": {
      "generateExtraInputTypes": true,
      "importBasePath": "github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint",
      "liftSingleValueMethodReturns": true,
      "respectSchemaVersion": true,
      "rootPackageName": "checkpoint"
    },
    "java": {
      "basePackage": "",
      "buildFiles": "",
      "gradleNexusPublishPluginVersion": "",
      "gradleTest": ""
    },
    "nodejs": {
      "compatibility": "tfbridge20",
      "disableUnionOutputTypes": true,
      "liftSingleValueMethodReturns": true,
      "packageDescription": "A Pulumi provider dynamically bridged from checkpoint.",
      "readme": "> This provider is a derived work of the [Terraform Provider](https://github.com/checkpointsw/terraform-provider-checkpoint)\n> distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n> please consult the source [`terraform-provider-checkpoint` repo](https://github.com/checkpointsw/terraform-provider-checkpoint/issues).",
      "respectSchemaVersion": true
    },
    "python": {
      "compatibility": "tfbridge20",
      "pyproject": {
        "enabled": true
      },
      "readme": "> This provider is a derived work of the [Terraform Provider](https://github.com/checkpointsw/terraform-provider-checkpoint)\n> distributed under [MPL 2.0](https://www.mozilla.org/en-US/MPL/2.0/). If you encounter a bug or missing feature,\n> please consult the source [`terraform-provider-checkpoint` repo](https://github.com/checkpointsw/terraform-provider-checkpoint/issues).",
      "respectSchemaVersion": true
    }
  },
  "config": {
    "variables": {
      "apiKey": {
        "type": "string",
        "description": "Administrator API key"
      },
      "autoPublishBatchSize": {
        "type": "number",
        "description": "Number of batch size to automatically run publish"
      },
      "cloudMgmtId": {
        "type": "string",
        "description": "Smart-1 Cloud management UID"
      },
      "context": {
        "type": "string",
        "description": "Check Point access context -<span pulumi-lang-nodejs=\" gaiaApi \" pulumi-lang-dotnet=\" GaiaApi \" pulumi-lang-go=\" gaiaApi \" pulumi-lang-python=\" gaia_api \" pulumi-lang-yaml=\" gaiaApi \" pulumi-lang-java=\" gaiaApi \"> gaia_api </span>or web_api"
      },
      "domain": {
        "type": "string",
        "description": "login to specific domain. Domain can be identified by name or UID"
      },
      "ignoreServerCertificate": {
        "type": "boolean",
        "description": "Indicates that the client should not check the server's certificate"
      },
      "password": {
        "type": "string",
        "description": "Check Point Management admin password"
      },
      "port": {
        "type": "number",
        "description": "Port used for connection to the API server"
      },
      "proxyHost": {
        "type": "string",
        "description": "HTTP proxy server address (without \"http://\")"
      },
      "proxyPort": {
        "type": "number",
        "description": "HTTP proxy port"
      },
      "server": {
        "type": "string",
        "description": "Check Point Management server IP"
      },
      "sessionDescription": {
        "type": "string",
        "description": "Session purpose description"
      },
      "sessionFileName": {
        "type": "string",
        "description": "File name used to store the current session id"
      },
      "sessionName": {
        "type": "string",
        "description": "Session unique name"
      },
      "sessionTimeout": {
        "type": "number",
        "description": "Timeout for the Check Point session in seconds. Can be 10-3600"
      },
      "timeout": {
        "type": "number",
        "description": "Timeout in seconds for the Go SDK to complete a transaction"
      },
      "username": {
        "type": "string",
        "description": "Check Point Management admin name"
      }
    }
  },
  "types": {
    "checkpoint:index/ManagementAccessRoleMachine:ManagementAccessRoleMachine": {
      "properties": {
        "baseDn": {
          "type": "string",
          "description": "When source is \"Active Directory\" use \"base-dn\" to refine the query in AD database.\n"
        },
        "selections": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Name or UID of an object selected from source. selection blocks are documented below. default\nvalue = [\"any\"]\n"
        },
        "source": {
          "type": "string",
          "description": "any, all identified, Active Directory name or UID or Identity Tag. default value = \"any\"\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementAccessRoleTimeouts:ManagementAccessRoleTimeouts": {
      "properties": {
        "create": {
          "type": "string"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementAccessRoleUser:ManagementAccessRoleUser": {
      "properties": {
        "baseDn": {
          "type": "string",
          "description": "When source is \"Active Directory\" use \"base-dn\" to refine the query in AD database.\n"
        },
        "selections": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Name or UID of an object selected from source. selection blocks are documented below. default\nvalue = [\"any\"], on ad groups: Adds<span pulumi-lang-nodejs=\" adGroup \" pulumi-lang-dotnet=\" AdGroup \" pulumi-lang-go=\" adGroup \" pulumi-lang-python=\" ad_group \" pulumi-lang-yaml=\" adGroup \" pulumi-lang-java=\" adGroup \"> ad_group </span>prefix to the selection, and removes spaces due to API limitations.\n"
        },
        "source": {
          "type": "string",
          "description": "any, all identified, UID or Identity Tag or Internal User Groups or\nLDAP groups or Guests. default value = \"any\", supports only one AD group named CpmiAdGroup due to API limitations.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementAccessRuleUserCheck:ManagementAccessRuleUserCheck": {
      "properties": {
        "confirm": {
          "type": "string",
          "description": "N/A.\n"
        },
        "customFrequency": {
          "$ref": "#/types/checkpoint:index%2FManagementAccessRuleUserCheckCustomFrequency:ManagementAccessRuleUserCheckCustomFrequency",
          "description": "N/A. Custom Frequency blocks are documented below.\n"
        },
        "frequency": {
          "type": "string",
          "description": "N/A.\n"
        },
        "interaction": {
          "type": "string",
          "description": "N/A.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementAccessRuleUserCheckCustomFrequency:ManagementAccessRuleUserCheckCustomFrequency": {
      "properties": {
        "every": {
          "type": "number",
          "description": "N/A.\n"
        },
        "unit": {
          "type": "string",
          "description": "N/A.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementAccessRuleVpnDirectional:ManagementAccessRuleVpnDirectional": {
      "properties": {
        "from": {
          "type": "string",
          "description": "From VPN community.\n"
        },
        "to": {
          "type": "string",
          "description": "To VPN community.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementAddCustomTrustedCaCertificateValidFrom:ManagementAddCustomTrustedCaCertificateValidFrom": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ]
    },
    "checkpoint:index/ManagementAddCustomTrustedCaCertificateValidTo:ManagementAddCustomTrustedCaCertificateValidTo": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ]
    },
    "checkpoint:index/ManagementAdministratorPermissionsProfile:ManagementAdministratorPermissionsProfile": {
      "properties": {
        "domain": {
          "type": "string"
        },
        "profile": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "domain",
        "profile"
      ]
    },
    "checkpoint:index/ManagementCheckpointHostInterface:ManagementCheckpointHostInterface": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "subnetMask": {
          "type": "string",
          "description": "IPv4 network mask.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementCmeAccountsAwsSubAccount:ManagementCmeAccountsAwsSubAccount": {
      "properties": {
        "accessKey": {
          "type": "string",
          "description": "Sub-account access key.\n"
        },
        "credentialsFile": {
          "type": "string",
          "description": "Sub-account credentials file.\n"
        },
        "name": {
          "type": "string",
          "description": "Sub-account name.\n"
        },
        "secretKey": {
          "type": "string",
          "description": "Sub-account secret key.\n",
          "secret": true
        },
        "stsExternalId": {
          "type": "string",
          "description": "Sub-account STS external id. Must exist with STS role.\n"
        },
        "stsRole": {
          "type": "string",
          "description": "Sub-account STS role.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ]
    },
    "checkpoint:index/ManagementCmeGwConfigurationsAwsBlades:ManagementCmeGwConfigurationsAwsBlades": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ]
    },
    "checkpoint:index/ManagementCmeGwConfigurationsAwsIdentityAwarenessSettings:ManagementCmeGwConfigurationsAwsIdentityAwarenessSettings": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementCmeGwConfigurationsAwsRepositoryGatewayScript:ManagementCmeGwConfigurationsAwsRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "The parameters to pass to the script.\n"
        },
        "uid": {
          "type": "string",
          "description": "Script uid\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "name",
            "uid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementCmeGwConfigurationsAzureBlades:ManagementCmeGwConfigurationsAzureBlades": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ]
    },
    "checkpoint:index/ManagementCmeGwConfigurationsAzureIdentityAwarenessSettings:ManagementCmeGwConfigurationsAzureIdentityAwarenessSettings": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementCmeGwConfigurationsAzureRepositoryGatewayScript:ManagementCmeGwConfigurationsAzureRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "The parameters to pass to the script.\n"
        },
        "uid": {
          "type": "string",
          "description": "Script uid\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "name",
            "uid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementCmeGwConfigurationsGcpBlades:ManagementCmeGwConfigurationsGcpBlades": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ]
    },
    "checkpoint:index/ManagementCmeGwConfigurationsGcpIdentityAwarenessSettings:ManagementCmeGwConfigurationsGcpIdentityAwarenessSettings": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementCmeGwConfigurationsGcpRepositoryGatewayScript:ManagementCmeGwConfigurationsGcpRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "The parameters to pass to the script.\n"
        },
        "uid": {
          "type": "string",
          "description": "Script uid\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "name",
            "uid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange:ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange": {
      "properties": {
        "addressType": {
          "type": "string",
          "description": "The type of the IP Address.\n"
        },
        "firstIpv4Address": {
          "type": "string",
          "description": "The first IPV4 Address in the range.\n"
        },
        "firstIpv6Address": {
          "type": "string",
          "description": "The first IPV6 Address in the range.\n"
        },
        "lastIpv4Address": {
          "type": "string",
          "description": "The last IPV4 Address in the range.\n"
        },
        "lastIpv6Address": {
          "type": "string",
          "description": "The last IPV6 Address in the range.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementCommandSetThreatAdvancedSettingsResourceClassification:ManagementCommandSetThreatAdvancedSettingsResourceClassification": {
      "properties": {
        "customSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCommandSetThreatAdvancedSettingsResourceClassificationCustomSettings:ManagementCommandSetThreatAdvancedSettingsResourceClassificationCustomSettings",
          "description": "On Custom mode, custom resources classification per service.\n"
        },
        "mode": {
          "type": "string",
          "description": "Set all services to the same mode or choose a custom mode.\n"
        },
        "webServiceFailMode": {
          "type": "string",
          "description": "Block connections when the web service is unavailable.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementCommandSetThreatAdvancedSettingsResourceClassificationCustomSettings:ManagementCommandSetThreatAdvancedSettingsResourceClassificationCustomSettings": {
      "properties": {
        "antiBot": {
          "type": "string",
          "description": "Custom Settings for Anti Bot Blade.\n"
        },
        "antiVirus": {
          "type": "string",
          "description": "Custom Settings for Anti Virus Blade.\n"
        },
        "zeroPhishing": {
          "type": "string",
          "description": "Custom Settings for Zero Phishing Blade.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementDataCenterObjectAdditionalProperty:ManagementDataCenterObjectAdditionalProperty": {
      "properties": {
        "name": {
          "type": "string",
          "description": "property name\n"
        },
        "value": {
          "type": "string",
          "description": "property value\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ]
    },
    "checkpoint:index/ManagementDataCenterObjectDataCenter:ManagementDataCenterObjectDataCenter": {
      "properties": {
        "automaticRefresh": {
          "type": "boolean",
          "description": "Object unique identifier.\n"
        },
        "dataCenterType": {
          "type": "string",
          "description": "Data Center type.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "properties": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataCenterObjectDataCenterProperty:ManagementDataCenterObjectDataCenterProperty"
          },
          "description": "List of Data Center properties.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "automaticRefresh",
        "dataCenterType",
        "name",
        "properties",
        "uid"
      ]
    },
    "checkpoint:index/ManagementDataCenterObjectDataCenterProperty:ManagementDataCenterObjectDataCenterProperty": {
      "properties": {
        "name": {
          "type": "string",
          "description": "property name\n"
        },
        "value": {
          "type": "string",
          "description": "property value\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ]
    },
    "checkpoint:index/ManagementDataCenterQueryQueryRule:ManagementDataCenterQueryQueryRule": {
      "properties": {
        "key": {
          "type": "string",
          "description": "Defines in which Data Center property to query.<br>For key-type \"predefined\", use these keys:type-in-data-center, name-in-data-center, and ip-address.<br>For key-type \"tag\", use the Data Center tag key to query.<br>Keys are case-insensitive.\n"
        },
        "keyType": {
          "type": "string",
          "description": "The type of the \"key\" parameter.<br>Use \"predefined\" for these keys: type-in-data-center, name-in-data-center, and ip-address.<br>Use \"tag\" to query the Data Center tag�s property.\n"
        },
        "values": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "The value(s) of the Data Center property to match the Query Rule.<br>Values are case-insensitive.<br>There is an 'OR' operation between multiple values.<br>For key-type \"predefined\" and key 'ip-address', the values must be an IPv4 or IPv6 address.<br>For key-type \"tag\", the values must be the Data Center tag values.values blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementDataTypeWeightedKeywordsWeightedKeyword:ManagementDataTypeWeightedKeywordsWeightedKeyword": {
      "properties": {
        "keyword": {
          "type": "string",
          "description": "keyword or regular expression to be weighted.\n"
        },
        "maxWeight": {
          "type": "number",
          "description": "Max weight of the expression.\n"
        },
        "regex": {
          "type": "boolean",
          "description": "Determine whether to consider the expression as a regular expression.\n"
        },
        "weight": {
          "type": "number",
          "description": "Weight of the expression.\n"
        }
      },
      "type": "object",
      "required": [
        "keyword"
      ]
    },
    "checkpoint:index/ManagementDomainPermissionsProfileAccessControl:ManagementDomainPermissionsProfileAccessControl": {
      "properties": {
        "accessControlObjectsAndSettings": {
          "type": "string",
          "description": "Allow editing of the following objet types: VPN Community, Access Role, Custom application group,Custom application, Custom category, Limit, Application - Match Settings, Application Category - Match Settings,Override Categorization, Application and URL filtering blade - Advanced Settings, Content Awareness blade - Advanced Settings.\n"
        },
        "appControlAndUrlFilteringUpdate": {
          "type": "boolean",
          "description": "Install Application and URL Filtering updates.\n"
        },
        "dlpPolicy": {
          "type": "string",
          "description": "Configure DLP rules and Policies.\n"
        },
        "geoControlPolicy": {
          "type": "string",
          "description": "Work with Access Control rules that control traffic to and from specified countries.\n"
        },
        "installPolicy": {
          "type": "boolean",
          "description": "Install Access Control Policies.\n"
        },
        "natPolicy": {
          "type": "string",
          "description": "Work with NAT in Access Control rules.\n"
        },
        "policyLayers": {
          "$ref": "#/types/checkpoint:index%2FManagementDomainPermissionsProfileAccessControlPolicyLayers:ManagementDomainPermissionsProfileAccessControlPolicyLayers",
          "description": "Layer editing permissions.<br>Available only if show-policy is set to true.policy_layers blocks are documented below.\n"
        },
        "qosPolicy": {
          "type": "string",
          "description": "Work with QoS Policies and rules.\n"
        },
        "showPolicy": {
          "type": "boolean",
          "description": "Select to let administrators work with Access Control rules and NAT rules. If not selected, administrators cannot see these rules.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementDomainPermissionsProfileAccessControlPolicyLayers:ManagementDomainPermissionsProfileAccessControlPolicyLayers": {
      "properties": {
        "appControlAndUrlFiltering": {
          "type": "boolean",
          "description": "Use Application and URL Filtering in Access Control rules.<br>Available only if edit-layers is set to \"By Software Blades\".\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Use specified data types in Access Control rules.<br>Available only if edit-layers is set to \"By Software Blades\".\n"
        },
        "editLayers": {
          "type": "string",
          "description": "\"By Software Blades\" - Edit Access Control layers that contain the blades enabled in the Permissions Profile.<br>\"By Selected Profile In A Layer Editor\" - Administrators can only edit the layer if the Access Control layer editor gives editing permission to their profiles.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Work with Access Control and other Software Blades that do not have their own Policies.<br>Available only if edit-layers is set to \"By Software Blades\".\n"
        },
        "mobileAccess": {
          "type": "boolean",
          "description": "Work with Mobile Access rules.<br>Available only if edit-layers is set to \"By Software Blades\".\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementDomainServer:ManagementDomainServer": {
      "properties": {
        "active": {
          "type": "boolean",
          "description": "Activate domain server. Only one domain server is allowed to be active.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "multiDomainServer": {
          "type": "string",
          "description": "Multi Domain server name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "skipStartDomainServer": {
          "type": "boolean",
          "description": "Set this value to be true to prevent starting the new created domain.\n"
        },
        "type": {
          "type": "string",
          "description": "Domain server type.\n"
        }
      },
      "type": "object",
      "required": [
        "multiDomainServer",
        "name"
      ]
    },
    "checkpoint:index/ManagementExceptionGroupAppliedThreatRule:ManagementExceptionGroupAppliedThreatRule": {
      "properties": {
        "layer": {
          "type": "string",
          "description": "The layer of the threat rule to which the group is to be attached.\n"
        },
        "name": {
          "type": "string",
          "description": "The name of the threat rule to which the group is to be attached.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        }
      },
      "type": "object",
      "required": [
        "position"
      ]
    },
    "checkpoint:index/ManagementGaiaBestPracticeRegulation:ManagementGaiaBestPracticeRegulation": {
      "properties": {
        "regulationName": {
          "type": "string",
          "description": "The name of the regulation.\n"
        },
        "requirementDescription": {
          "type": "string",
          "description": "The description of the requirement.\n"
        },
        "requirementId": {
          "type": "string",
          "description": "The id of the requirement.\n"
        },
        "requirementStatus": {
          "type": "string",
          "description": "The status of the requirement.\n"
        }
      },
      "type": "object",
      "required": [
        "regulationName",
        "requirementDescription",
        "requirementId",
        "requirementStatus"
      ]
    },
    "checkpoint:index/ManagementGaiaBestPracticeRelevantObject:ManagementGaiaBestPracticeRelevantObject": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Determines if the relevant object is enabled or not.\n"
        },
        "name": {
          "type": "string",
          "description": "The name of the relevant object.\n"
        },
        "status": {
          "type": "string",
          "description": "The status of the relevant object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The uid of the relevant object.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "name",
        "status",
        "uid"
      ]
    },
    "checkpoint:index/ManagementHostHostServers:ManagementHostHostServers": {
      "properties": {
        "dnsServer": {
          "type": "boolean",
          "description": "Gets True if this server is a DNS Server.\n"
        },
        "mailServer": {
          "type": "boolean",
          "description": "Gets True if this server is a Mail Server.\n"
        },
        "webServer": {
          "type": "boolean",
          "description": "Gets True if this server is a Web Server.\n"
        },
        "webServerConfig": {
          "$ref": "#/types/checkpoint:index%2FManagementHostHostServersWebServerConfig:ManagementHostHostServersWebServerConfig",
          "description": "Web Server configuration. Web Server configuration blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementHostHostServersWebServerConfig:ManagementHostHostServersWebServerConfig": {
      "properties": {
        "additionalPorts": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server additional ports.\n"
        },
        "applicationEngines": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Application engines of this web server.\n"
        },
        "listenStandardPort": {
          "type": "boolean",
          "description": "\"Whether server listens to standard port.\n"
        },
        "operatingSystem": {
          "type": "string",
          "description": "Operating System.\n"
        },
        "protectedBy": {
          "type": "string",
          "description": "Network object which protects this server identified by the name or UID.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementHostInterface:ManagementHostInterface": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementIdpAdministratorGroupPermissionsProfile:ManagementIdpAdministratorGroupPermissionsProfile": {
      "properties": {
        "domain": {
          "type": "string",
          "description": "N/A\n"
        },
        "profile": {
          "type": "string",
          "description": "Permission profile.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementIfMapServerAuthentication:ManagementIfMapServerAuthentication": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method for the IF-MAP server.\n"
        },
        "password": {
          "type": "string",
          "description": "Username for the IF-MAP server authentication. <font color=\"red\">Required only when</font> 'authentication-method' is set to 'basic'.\n"
        },
        "username": {
          "type": "string",
          "description": "Username for the IF-MAP server authentication. <font color=\"red\">Required only when</font> 'authentication-method' is set to 'basic'.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementIfMapServerMonitoredIp:ManagementIfMapServerMonitoredIp": {
      "properties": {
        "firstIp": {
          "type": "string",
          "description": "First IPv4 address in the range to be monitored.\n"
        },
        "lastIp": {
          "type": "string",
          "description": "Last IPv4 address in the range to be monitored.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementInterfaceAntiSpoofingSettings:ManagementInterfaceAntiSpoofingSettings": {
      "properties": {
        "action": {
          "type": "string",
          "description": "If packets will be rejected (the Prevent option) or whether the packets will be monitored (the Detect option).\n"
        },
        "excludePackets": {
          "type": "boolean",
          "description": "Don't check packets from excluded network.\n"
        },
        "excludedNetworkName": {
          "type": "string",
          "description": "Excluded network name.\n"
        },
        "excludedNetworkUid": {
          "type": "string",
          "description": "Excluded network UID.\n"
        },
        "spoofTracking": {
          "type": "string",
          "description": "Spoof tracking.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementInterfaceClusterMember:ManagementInterfaceClusterMember": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "memberName": {
          "type": "string",
          "description": "Cluster member object name.\n"
        },
        "memberUid": {
          "type": "string",
          "description": "Cluster member object uid.\n"
        },
        "name": {
          "type": "string",
          "description": "Cluster member network interface name.\n"
        },
        "networkMask": {
          "type": "string",
          "description": "IPv4 or IPv6 network mask. If both masks are required use ipv4-network-mask and ipv6-network-mask fields explicitly. Instead of providing mask itself it is possible to specify IPv4 or IPv6 mask length in mask-length field. If both masks length are required use ipv4-mask-length and  ipv6-mask-length fields explicitly.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ]
    },
    "checkpoint:index/ManagementInterfaceSecurityZoneSettings:ManagementInterfaceSecurityZoneSettings": {
      "properties": {
        "autoCalculated": {
          "type": "boolean",
          "description": "Security Zone is calculated according to where the interface leads to.\n"
        },
        "autoCalculatedZone": {
          "type": "string",
          "description": "N/A\n"
        },
        "autoCalculatedZoneUid": {
          "type": "string",
          "description": "N/A\n"
        },
        "specificSecurityZoneEnabled": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "specificZone": {
          "type": "string",
          "description": "Security Zone specified manually.\n"
        },
        "specificZoneUid": {
          "type": "string",
          "description": "Security Zone specified manually.\n"
        }
      },
      "type": "object",
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "autoCalculatedZone",
            "autoCalculatedZoneUid",
            "specificSecurityZoneEnabled",
            "specificZoneUid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementInterfaceTopologySettings:ManagementInterfaceTopologySettings": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        },
        "specificNetworkUid": {
          "type": "string",
          "description": "N/A\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementInterfaceTopologySettingsAutomatic:ManagementInterfaceTopologySettingsAutomatic": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        },
        "specificNetworkUid": {
          "type": "string",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "interfaceLeadsToDmz",
        "ipAddressBehindThisInterface",
        "specificNetwork",
        "specificNetworkUid"
      ]
    },
    "checkpoint:index/ManagementInterfaceTopologySettingsManual:ManagementInterfaceTopologySettingsManual": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        },
        "specificNetworkUid": {
          "type": "string",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "interfaceLeadsToDmz",
        "ipAddressBehindThisInterface",
        "specificNetwork",
        "specificNetworkUid"
      ]
    },
    "checkpoint:index/ManagementInteroperableDeviceGroup:ManagementInteroperableDeviceGroup": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ]
    },
    "checkpoint:index/ManagementInteroperableDeviceInterface:ManagementInteroperableDeviceInterface": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "Topology configuration.\n"
        },
        "topologySettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInteroperableDeviceInterfaceTopologySettings:ManagementInteroperableDeviceInterfaceTopologySettings",
          "description": "Internal topology settings.topology_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementInteroperableDeviceInterfaceTopologySettings:ManagementInteroperableDeviceInterfaceTopologySettings": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLogExporterAttachments:ManagementLogExporterAttachments": {
      "properties": {
        "addLinkToLogAttachment": {
          "type": "boolean",
          "description": "Indicates whether to add link to log attachment in SmartView.\n"
        },
        "addLinkToLogDetails": {
          "type": "boolean",
          "description": "Indicates whether to add link to log details in SmartView.\n"
        },
        "addLogAttachmentId": {
          "type": "boolean",
          "description": "Indicates whether to add log attachment ID.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLogExporterDataManipulation:ManagementLogExporterDataManipulation": {
      "properties": {
        "aggregateLogUpdates": {
          "type": "boolean",
          "description": "Indicates whether to aggregate log updates.\n"
        },
        "format": {
          "type": "string",
          "description": "Logs format.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterDynamicObject:ManagementLsmClusterDynamicObject": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "resolvedIpAddresses": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterDynamicObjectResolvedIpAddress:ManagementLsmClusterDynamicObjectResolvedIpAddress"
          },
          "description": "Single IP-address or a range of addresses.resolved_ip_addresses blocks are documented below.\n"
        },
        "uid": {
          "type": "string",
          "description": "UID\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "comments",
            "name",
            "uid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementLsmClusterDynamicObjectResolvedIpAddress:ManagementLsmClusterDynamicObjectResolvedIpAddress": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address.\n"
        },
        "ipv4AddressRange": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange:ManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange",
          "description": "IPv4 Address range.ipv4_address_range blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange:ManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange": {
      "properties": {
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterInterface:ManagementLsmClusterInterface": {
      "properties": {
        "ipAddressOverride": {
          "type": "string",
          "description": "IP address override. Net mask is defined by the attached LSM profile.\n"
        },
        "memberNetworkOverride": {
          "type": "string",
          "description": "Member network override. Net mask is defined by the attached LSM profile.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name.\n"
        },
        "newName": {
          "type": "string",
          "description": "New name. Overrides the interface name on profile.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterMember:ManagementLsmClusterMember": {
      "properties": {
        "deviceId": {
          "type": "string",
          "description": "Device ID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterMemberInterface:ManagementLsmClusterMemberInterface"
          },
          "description": "Interfaces.interfaces blocks are documented below.\n"
        },
        "mainIpAddress": {
          "type": "string",
          "description": "Main IP address.\n"
        },
        "memberUid": {
          "type": "string",
          "description": "Member UID\n"
        },
        "name": {
          "type": "string",
          "description": "Member Name. Consists of the member name in the LSM profile and the name or prefix or suffix of the cluster.\n"
        },
        "provisioningSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmClusterMemberProvisioningSettings:ManagementLsmClusterMemberProvisioningSettings",
          "description": "Provisioning settings. This field is relevant just for SMB clusters.provisioning_settings blocks are documented below.\n"
        },
        "provisioningState": {
          "type": "string",
          "description": "Provisioning state. This field is relevant just for SMB clusters. By default the state is 'manual'- enable provisioning but not attach to profile.If 'using-profile' state is provided a provisioning profile must be provided in provisioning-settings.\n"
        },
        "sic": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmClusterMemberSic:ManagementLsmClusterMemberSic",
          "description": "Secure Internal Communication.sic blocks are documented below.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Secure Internal Communication name\n"
        },
        "sicState": {
          "type": "string",
          "description": "Secure Internal Communication state\n"
        }
      },
      "type": "object",
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "interfaces",
            "mainIpAddress",
            "memberUid",
            "sicName",
            "sicState"
          ]
        }
      }
    },
    "checkpoint:index/ManagementLsmClusterMemberInterface:ManagementLsmClusterMemberInterface": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "IP address. When IP address is provided- initiate trusted communication immediately using this IP address.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name.\n"
        }
      },
      "type": "object",
      "required": [
        "ipAddress",
        "name"
      ]
    },
    "checkpoint:index/ManagementLsmClusterMemberProvisioningSettings:ManagementLsmClusterMemberProvisioningSettings": {
      "properties": {
        "provisioningProfile": {
          "type": "string",
          "description": "Provisioning profile.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterMemberSic:ManagementLsmClusterMemberSic": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "IP address. When IP address is provided- initiate trusted communication immediately using this IP address.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "One-time password. When one-time password is provided without ip-address- trusted communication is automatically initiated  when the gateway connects to the Security Management server for the first time.\n",
          "secret": true
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterTopology:ManagementLsmClusterTopology": {
      "properties": {
        "manualVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterTopologyManualVpnDomain:ManagementLsmClusterTopologyManualVpnDomain"
          },
          "description": "A list of IP-addresses ranges, defined the VPN community network.\nThis field is relevant only when 'manual' option of vpn-domain is checked.manual_vpn_domain blocks are documented below.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN Domain type.\n'external-interfaces-only' is relevnt only for Gaia devices.\n'hide-behind-gateway-external-ip-address' is relevant only for SMB devices.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmClusterTopologyManualVpnDomain:ManagementLsmClusterTopologyManualVpnDomain": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmGatewayDynamicObject:ManagementLsmGatewayDynamicObject": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "resolvedIpAddresses": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayDynamicObjectResolvedIpAddress:ManagementLsmGatewayDynamicObjectResolvedIpAddress"
          },
          "description": "Single IP-address or a range of addresses.resolved_ip_addresses blocks are documented below.\n"
        },
        "uid": {
          "type": "string",
          "description": "UID.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "comments",
            "name",
            "uid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementLsmGatewayDynamicObjectResolvedIpAddress:ManagementLsmGatewayDynamicObjectResolvedIpAddress": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address.\n"
        },
        "ipv4AddressRange": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange:ManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange",
          "description": "IPv4 Address range.ipv4_address_range blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange:ManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange": {
      "properties": {
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmGatewayTopology:ManagementLsmGatewayTopology": {
      "properties": {
        "manualVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayTopologyManualVpnDomain:ManagementLsmGatewayTopologyManualVpnDomain"
          },
          "description": "A list of IP-addresses ranges, defined the VPN community network.\nThis field is relevant only when 'manual' option of vpn-domain is checked.manual_vpn_domain blocks are documented below.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN Domain type.\n'external-interfaces-only' is relevnt only for Gaia devices.\n'hide-behind-gateway-external-ip-address' is relevant only for SMB devices.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementLsmGatewayTopologyManualVpnDomain:ManagementLsmGatewayTopologyManualVpnDomain": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementMobileProfileApplications:ManagementMobileProfileApplications": {
      "properties": {
        "allowCachingDocsecCredentials": {
          "type": "boolean",
          "description": "Allow store encrypted document credentials in application secure storage.\n"
        },
        "allowCachingDocsecKeys": {
          "type": "boolean",
          "description": "Allow store encrypted document keys in application secure storage.\n"
        },
        "allowCalendarSync": {
          "type": "boolean",
          "description": "Allow synchronization between business calendar to device calendar.\n"
        },
        "allowContactsFromGlobalAddressList": {
          "type": "boolean",
          "description": "Allow to add additional contacts from Global Address List to the app.\n"
        },
        "allowContactsFromLocalPhone": {
          "type": "boolean",
          "description": "Allow to add additional contacts from local phone to the app.\n"
        },
        "allowPushNotification": {
          "type": "boolean",
          "description": "Allow to receive push notifications of mails and meetings.\n"
        },
        "calendarFromTheLast": {
          "type": "number",
          "description": "How far back to see your Calendar from the current date - you can choose a unit (day, week, month) in \"calendar-from-the-last-unit\" field.\n"
        },
        "calendarFromTheLastUnit": {
          "type": "string",
          "description": "Unit for \"calendar-from-the-last\" numeric value.\n"
        },
        "calendarToTheFollowing": {
          "type": "number",
          "description": "How much ahead to see your Calendar from the current date - you can choose a unit (day, week, month) in \"calendar-to-the-following-unit\" field.\n"
        },
        "calendarToTheFollowingUnit": {
          "type": "string",
          "description": "Unit for \"calendar-to-the-following\" numeric value.\n"
        },
        "enablePrintMails": {
          "type": "boolean",
          "description": "Allow to print mails.\n"
        },
        "mailFromTheLast": {
          "type": "number",
          "description": "How far back to see your emails from the current date - choose a unit (day, week, month) in \"mail-from-the-last-unit\" field.\n"
        },
        "mailFromTheLastUnit": {
          "type": "string",
          "description": "Unit for \"mail-from-the-last\" numeric value.\n"
        },
        "maxAttachmentsSize": {
          "type": "number",
          "description": "Maximum size of attachments allowed for downloading -  you can choose a unit (gbs, kbs, mbs, bytes) in \"max-attachments-unit\" field.\n"
        },
        "saveLocalWebCache": {
          "type": "boolean",
          "description": "Configure whether local cache data generated by web browser should be preserved.\n"
        },
        "synchronizeContacts": {
          "type": "string",
          "description": "Contacts synchronization method - from the mail server to device and the app and vice versa or from the mail server to device and the app or from the mail server to the app.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementMobileProfileClientCustomization:ManagementMobileProfileClientCustomization": {
      "properties": {
        "allowCalendar": {
          "type": "boolean",
          "description": "Allow sync business calendar to device calendar.\n"
        },
        "allowContacts": {
          "type": "boolean",
          "description": "Enable/Disable contacts app.\n"
        },
        "allowMail": {
          "type": "boolean",
          "description": "Enable/Disable email app.\n"
        },
        "allowNotesSync": {
          "type": "boolean",
          "description": "Allow sync business notes to device notes.\n"
        },
        "allowSavedFileApps": {
          "type": "boolean",
          "description": "Allow the appearance of 'Saved file app' in the app list.\n"
        },
        "allowSecureChat": {
          "type": "boolean",
          "description": "Enable/Disable Messages app (depends on Mail app).\n"
        },
        "allowTasks": {
          "type": "boolean",
          "description": "Enable/Disable Tasks app.\n"
        },
        "appThemeColorDark": {
          "type": "string",
          "description": "Configure the application display colors in Dark mode. 6 hex digits that define RGB color - relevant for IOS.\n"
        },
        "appThemeColorLight": {
          "type": "string",
          "description": "Configure the application display colors in light mode. 6 hex digits that define RGB color - relevant for IOS.\n"
        },
        "certificateExpireMessage": {
          "type": "string",
          "description": "message to show users when certificate is expired - for admin to fill - can contain only English characters, digits, comma, spaces and points.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementMobileProfileDataLeakPrevention:ManagementMobileProfileDataLeakPrevention": {
      "properties": {
        "acceptProtectedFileExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Accept protected files with these extensions from external apps to your app.accept_protected_file_extensions blocks are documented below.\n"
        },
        "acceptUnprotectedFileExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Accept unprotected files with these extensions from external apps to your app.accept_unprotected_file_extensions blocks are documented below.\n"
        },
        "allowCopyPaste": {
          "type": "boolean",
          "description": "Allow copy paste of mail content.\n"
        },
        "allowImportFromGallery": {
          "type": "boolean",
          "description": "Allow import media from gallery.\n"
        },
        "allowTakingPhotosAndVideos": {
          "type": "boolean",
          "description": "Allow the camera to be used from your app.\n"
        },
        "allowedDomainsForwardAttachment": {
          "type": "string",
          "description": "exclusion of domains which attachments are allowed to be sent, even that shared policy prevents sharing these kinds of attached files - can contain only English characters, digits, comma, spaces and points.\n"
        },
        "blockForwardAttachments": {
          "type": "boolean",
          "description": "Allow share mail attachments with external mails.\n"
        },
        "blockScreenshot": {
          "type": "boolean",
          "description": "If true - you can't make a screenshot from your app.\n"
        },
        "offerCapsuleAsViewer": {
          "type": "boolean",
          "description": "Offer Capsule as a viewer for external protected documents.\n"
        },
        "openExtensionWithExternalApps": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Open the following extensions from your app with external apps when they cannot be opened with Capsule viewer.open_extension_with_external_app blocks are documented below.\n"
        },
        "shareProtectedExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Share protected files extensions to external apps.share_protected_extension blocks are documented below.\n"
        },
        "shareUnprotectedExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Share unprotected files extensions to external apps.share_unprotected_extension blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementMobileProfileHarmonyMobile:ManagementMobileProfileHarmonyMobile": {
      "properties": {
        "compromisedBehavior": {
          "type": "string",
          "description": "Device configuration - response to malicious behavior (configuration for Harmony SDK).\n"
        },
        "enableHarmonyMobileSdk": {
          "type": "boolean",
          "description": "Enable/disable Harmony SDK - cannot be enable if Harmony Mobile Application is enable.\n"
        },
        "harmonyMobileSdkLicense": {
          "type": "string",
          "description": "License for Harmony Mobile Sdk (configuration for Harmony SDK) - can contain only English characters, digits, comma, spaces and point.\n"
        },
        "malwareBehavior": {
          "type": "string",
          "description": "Behavior when App is identified as malicious (configuration for Harmony SDK).\n"
        },
        "manInTheMiddleAttack": {
          "type": "string",
          "description": "Behavior when there is a network man-in-the-middle attack (configuration for Harmony SDK).\n"
        },
        "osIntegrityCompromised": {
          "type": "string",
          "description": "Behavior when Device OS is compromised (configuration for Harmony SDK).\n"
        },
        "protectHighRiskAction": {
          "type": "string",
          "description": "What is the action if there is high risk found by Harmony Mobile.\n"
        },
        "protectHighRiskMessage": {
          "type": "string",
          "description": "The message can contain only English characters, digits, comma, spaces and points.\n"
        },
        "protectMediumRiskAction": {
          "type": "string",
          "description": "What is the action if there is medium risk found by Harmony Mobile.\n"
        },
        "protectMediumRiskMessage": {
          "type": "string",
          "description": "The message can contain only English characters, digits, comma, spaces and points.\n"
        },
        "protectNotActivatedAction": {
          "type": "string",
          "description": "What is the action if there is policy violation (configuration for Harmony Mobile).\n"
        },
        "protectNotActivatedMessage": {
          "type": "string",
          "description": "The message can contain only English characters, digits, comma, spaces and points.\n"
        },
        "protectPolicyEnabled": {
          "type": "boolean",
          "description": "Enable/disable Protect Application- cannot be enable if Harmony SDK is enable.\n"
        },
        "suspiciousApp": {
          "type": "string",
          "description": "Behavior when App is suspected as malicious (configuration for Harmony SDK).\n"
        },
        "suspiciousEnterpriseCertificate": {
          "type": "string",
          "description": "Behavior when a certificate profile has been installed allowing the installing of apps on device from unknown source - iOS only (configuration for Harmony SDK).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementMobileProfileSecurity:ManagementMobileProfileSecurity": {
      "properties": {
        "activatePasscodeLock": {
          "type": "boolean",
          "description": "Require passcode to the application.\n"
        },
        "allowStoreCredentials": {
          "type": "boolean",
          "description": "Allow storing the credentials on the device.\n"
        },
        "block3rdPartyKeyboard": {
          "type": "boolean",
          "description": "Block 3rd party keyboard.\n"
        },
        "blockJailbroken": {
          "type": "string",
          "description": "Action upon detection of jail broken devices.\n"
        },
        "hideSslConnectAnywayButton": {
          "type": "boolean",
          "description": "Hide connect button on critical SSL trust failures.\n"
        },
        "passcodeProfile": {
          "type": "string",
          "description": "Passcode Policy object identified by the name.\n"
        },
        "reportJailbroken": {
          "type": "boolean",
          "description": "Issue log when device is detected as jail broken.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Session timeout - you can choose a unit (day, week, month) in \"session-timeout-unit\" field.\n"
        },
        "sessionTimeoutUnit": {
          "type": "string",
          "description": "Unit for \"session-timeout\" numeric value.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementNetworkFeedCustomHeader:ManagementNetworkFeedCustomHeader": {
      "properties": {
        "headerName": {
          "type": "string",
          "description": "The name of the HTTP header we wish to add.\n"
        },
        "headerValue": {
          "type": "string",
          "description": "The name of the HTTP value we wish to add.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollment:ManagementOpsecTrustedCaAutomaticEnrollment": {
      "properties": {
        "automaticallyEnrollCertificate": {
          "type": "boolean",
          "description": "Whether to automatically enroll certificate.\n"
        },
        "cmpv1Settings": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Settings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Settings",
          "description": "Cmpv1 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".cmpv1_settings blocks are documented below.\n"
        },
        "cmpv2Settings": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Settings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Settings",
          "description": "Cmpv2 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".cmpv2_settings blocks are documented below.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Protocol that communicates with the certificate authority. Available only if \"automatically-enroll-certificate\" parameter is set to true.\n"
        },
        "scepSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollmentScepSettings:ManagementOpsecTrustedCaAutomaticEnrollmentScepSettings",
          "description": "Scep protocol settings. Available only if \"protocol\" is set to \"scep\".scep_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Settings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Settings": {
      "properties": {
        "directTcpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings",
          "description": "Direct tcp transport layer settings.direct_tcp_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "IP Address\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Settings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Settings": {
      "properties": {
        "directTcpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings",
          "description": "Direct tcp transport layer settings.direct_tcp_settings blocks are documented below.\n"
        },
        "httpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsHttpSettings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsHttpSettings",
          "description": "Http transport layer settings.http_settings blocks are documented below.\n"
        },
        "transportLayer": {
          "type": "string",
          "description": "Transport layer.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "IP Address\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsHttpSettings:ManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingsHttpSettings": {
      "properties": {
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementOpsecTrustedCaAutomaticEnrollmentScepSettings:ManagementOpsecTrustedCaAutomaticEnrollmentScepSettings": {
      "properties": {
        "caIdentifier": {
          "type": "string",
          "description": "Certificate authority identifier.\n"
        },
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceCifsAllowedDiskAndPrintShare:ManagementResourceCifsAllowedDiskAndPrintShare": {
      "properties": {
        "serverName": {
          "type": "string",
          "description": "Blocks the ability to remotely manipulate a the window's registry.\n"
        },
        "shareName": {
          "type": "string",
          "description": "Disk shares.\n"
        }
      },
      "type": "object",
      "required": [
        "serverName",
        "shareName"
      ]
    },
    "checkpoint:index/ManagementResourceFtpCvp:ManagementResourceFtpCvp": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "enableCvp": {
          "type": "boolean",
          "description": "Select to enable the Content Vectoring Protocol.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the CVP server, make sure the CVP server is already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceSmtpAction1:ManagementResourceSmtpAction1": {
      "properties": {
        "customField": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction1CustomField:ManagementResourceSmtpAction1CustomField",
          "description": "The name of the header.custom_field blocks are documented below.\n"
        },
        "recipient": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction1Recipient:ManagementResourceSmtpAction1Recipient",
          "description": "Rewrite Recipient header.recipient blocks are documented below.\n"
        },
        "sender": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction1Sender:ManagementResourceSmtpAction1Sender",
          "description": "Rewrite Sender header.sender blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceSmtpAction1CustomField:ManagementResourceSmtpAction1CustomField": {
      "properties": {
        "field": {
          "type": "string",
          "description": "The name of the header.\n"
        },
        "original": {
          "type": "string",
          "description": "Original field.\n"
        },
        "rewritten": {
          "type": "string",
          "description": "Replacement field.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceSmtpAction1Recipient:ManagementResourceSmtpAction1Recipient": {
      "properties": {
        "original": {
          "type": "string",
          "description": "Original field.\n"
        },
        "rewritten": {
          "type": "string",
          "description": "Replacement field.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceSmtpAction1Sender:ManagementResourceSmtpAction1Sender": {
      "properties": {
        "original": {
          "type": "string",
          "description": "Original field.\n"
        },
        "rewritten": {
          "type": "string",
          "description": "Replacement field.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceSmtpAction2:ManagementResourceSmtpAction2": {
      "properties": {
        "allowedCharacters": {
          "type": "string",
          "description": "The MIME email headers can consist of 8 or 7 bit characters (7 ASCII and 8 for sending Binary characters) in order to encode mail data.\n"
        },
        "mailCapacity": {
          "type": "number",
          "description": "Restrict the size (in kb) of incoming email attachments.\n"
        },
        "stripActivexTags": {
          "type": "boolean",
          "description": "Strip activeX tags.\n"
        },
        "stripAppletTags": {
          "type": "boolean",
          "description": "Strip JAVA applets.\n"
        },
        "stripFileByName": {
          "type": "string",
          "description": "Strips file attachments of the specified name from the message.\n"
        },
        "stripFtpLinks": {
          "type": "boolean",
          "description": "Strip ftp links.\n"
        },
        "stripMimeOfType": {
          "type": "string",
          "description": "Specifies the MIME type to strip from the message.\n"
        },
        "stripPortStrings": {
          "type": "boolean",
          "description": "Strip ports.\n"
        },
        "stripScriptTags": {
          "type": "boolean",
          "description": "Strip JAVA scripts.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceSmtpCvp:ManagementResourceSmtpCvp": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "enableCvp": {
          "type": "boolean",
          "description": "Select to enable the Content Vectoring Protocol.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the CVP server, make sure the CVP server is already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceTcpCvpSettings:ManagementResourceTcpCvpSettings": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "server": {
          "type": "string",
          "description": "CVP server identified by name or UID.\nThe CVP server must already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object",
      "required": [
        "server"
      ]
    },
    "checkpoint:index/ManagementResourceTcpUfpSettings:ManagementResourceTcpUfpSettings": {
      "properties": {
        "cachingControl": {
          "type": "string",
          "description": "Specifies if and how caching is to be enabled.\n"
        },
        "ignoreUfpServerAfterFailure": {
          "type": "boolean",
          "description": "The UFP server will be ignored after numerous UFP server connections were unsuccessful.\n"
        },
        "numberOfFailuresBeforeIgnore": {
          "type": "number",
          "description": "Signifies at what point the UFP server should be ignored, Applicable only if 'ignore after fail' is enabled.\n"
        },
        "server": {
          "type": "string",
          "description": "UFP server identified by name or UID.\nThe UFP server must already be defined as an OPSEC Application.\n"
        },
        "timeoutBeforeReconnecting": {
          "type": "number",
          "description": "The amount of time, in seconds, that must pass before a UFP server connection should be attempted, Applicable only if 'ignore after fail' is enabled.\n"
        }
      },
      "type": "object",
      "required": [
        "server"
      ]
    },
    "checkpoint:index/ManagementResourceUriAction:ManagementResourceUriAction": {
      "properties": {
        "replacementUri": {
          "type": "string",
          "description": "If the Action in a rule which uses this resource is Drop or Reject, then the Replacement URI is displayed instead of the one requested by the user.\n"
        },
        "stripActivexTags": {
          "type": "boolean",
          "description": "Strip activeX tags.\n"
        },
        "stripAppletTags": {
          "type": "boolean",
          "description": "Strip JAVA applets.\n"
        },
        "stripFtpLinks": {
          "type": "boolean",
          "description": "Strip ftp links.\n"
        },
        "stripPortStrings": {
          "type": "boolean",
          "description": "Strip ports.\n"
        },
        "stripScriptTags": {
          "type": "boolean",
          "description": "Strip JAVA scripts.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceUriCvp:ManagementResourceUriCvp": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "enableCvp": {
          "type": "boolean",
          "description": "Select to enable the Content Vectoring Protocol.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "sendHttpHeadersToCvp": {
          "type": "boolean",
          "description": "Select, if you would like the CVP server to check the HTTP headers of the message packets.\n"
        },
        "sendHttpRequestToCvp": {
          "type": "boolean",
          "description": "Used to protect against undesirable content in the HTTP request, for example, when inspecting peer-to-peer connections.\n"
        },
        "sendOnlyUnsafeFileTypes": {
          "type": "boolean",
          "description": "Improves the performance of the CVP server. This option does not send to the CVP server traffic that is considered safe.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the CVP server, make sure the CVP server is already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceUriMatchUfp:ManagementResourceUriMatchUfp": {
      "properties": {
        "cachingControl": {
          "type": "string",
          "description": "Specifies if and how caching is to be enabled.\n"
        },
        "ignoreUfpServerAfterFailure": {
          "type": "boolean",
          "description": "The UFP server will be ignored after numerous UFP server connections were unsuccessful.\n"
        },
        "numberOfFailuresBeforeIgnore": {
          "type": "number",
          "description": "Signifies at what point the UFP server should be ignored.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the UFP server that is an OPSEC certified third party application that checks URLs against a list of permitted categories.\n"
        },
        "timeoutBeforeReconnecting": {
          "type": "number",
          "description": "The amount of time that must pass before a UFP server connection should be attempted.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceUriMatchWildcards:ManagementResourceUriMatchWildcards": {
      "properties": {
        "host": {
          "type": "string",
          "description": "The functionality of the Host parameter depends on the DNS setup of the addressed server. For the host, only the IP address or the full DNS name should be used.\n"
        },
        "methods": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchWildcardsMethods:ManagementResourceUriMatchWildcardsMethods",
          "description": "Select the URI Schemes to which this resource applies.methods blocks are documented below.\n"
        },
        "path": {
          "type": "string",
          "description": "Name matching is based on appending the file name in the request to the current working directory (unless the file name is already a full path name) and comparing the result to the path specified in the Resource definition.\n"
        },
        "query": {
          "type": "string",
          "description": "The parameters that are sent to the URI when it is accessed.\n"
        },
        "schemes": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchWildcardsSchemes:ManagementResourceUriMatchWildcardsSchemes",
          "description": "Select the URI Schemes to which this resource applies.schemes blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceUriMatchWildcardsMethods:ManagementResourceUriMatchWildcardsMethods": {
      "properties": {
        "get": {
          "type": "boolean",
          "description": "GET method.\n"
        },
        "head": {
          "type": "boolean",
          "description": "HEAD method.\n"
        },
        "other": {
          "type": "string",
          "description": "You can specify another method in the Other field. You can use wildcards.\n"
        },
        "post": {
          "type": "boolean",
          "description": "POST method.\n"
        },
        "put": {
          "type": "boolean",
          "description": "PUT method.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementResourceUriMatchWildcardsSchemes:ManagementResourceUriMatchWildcardsSchemes": {
      "properties": {
        "ftp": {
          "type": "boolean",
          "description": "Ftp scheme.\n"
        },
        "gopher": {
          "type": "boolean",
          "description": "Gopher scheme.\n"
        },
        "http": {
          "type": "boolean",
          "description": "Http scheme.\n"
        },
        "mailto": {
          "type": "boolean",
          "description": "Mailto scheme.\n"
        },
        "news": {
          "type": "boolean",
          "description": "News scheme.\n"
        },
        "other": {
          "type": "string",
          "description": "You can specify another scheme in the Other field. You can use wildcards.\n"
        },
        "wais": {
          "type": "boolean",
          "description": "Wais scheme.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSecuremoteDnsServerDomain:ManagementSecuremoteDnsServerDomain": {
      "properties": {
        "domainSuffix": {
          "type": "string",
          "description": "DNS Domain suffix.\n"
        },
        "maximumPrefixLabelCount": {
          "type": "number",
          "description": "Maximum number of matching labels preceding the suffix.\n"
        }
      },
      "type": "object",
      "required": [
        "domainSuffix"
      ]
    },
    "checkpoint:index/ManagementServiceGtpRadioAccessTechnology:ManagementServiceGtpRadioAccessTechnology": {
      "properties": {
        "eutran": {
          "type": "boolean",
          "description": "(6).\n"
        },
        "gan": {
          "type": "boolean",
          "description": "(4).\n"
        },
        "geran": {
          "type": "boolean",
          "description": "(2).\n"
        },
        "hspaEvolution": {
          "type": "boolean",
          "description": "(5).\n"
        },
        "nbIot": {
          "type": "boolean",
          "description": "(8).\n"
        },
        "otherTypesRange": {
          "$ref": "#/types/checkpoint:index%2FManagementServiceGtpRadioAccessTechnologyOtherTypesRange:ManagementServiceGtpRadioAccessTechnologyOtherTypesRange",
          "description": "(9-255).other_types_range blocks are documented below.\n"
        },
        "utran": {
          "type": "boolean",
          "description": "(1).\n"
        },
        "virtual": {
          "type": "boolean",
          "description": "(7).\n"
        },
        "wlan": {
          "type": "boolean",
          "description": "(3).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementServiceGtpRadioAccessTechnologyOtherTypesRange:ManagementServiceGtpRadioAccessTechnologyOtherTypesRange": {
      "properties": {
        "enable": {
          "type": "boolean"
        },
        "types": {
          "type": "string",
          "description": "Other RAT Types. To specify other RAT ranges, add a hyphen between the lowest and the highest numbers, for example: 11-15. Multiple Ranges can be chosen when separated with comma.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementServiceGtpSelectionMode:ManagementServiceGtpSelectionMode": {
      "properties": {
        "enable": {
          "type": "boolean"
        },
        "mode": {
          "type": "number",
          "description": "The mode as integer. [0 - Verified, 1 - MS - Not verified, 2 - Network - Not verified].\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAntiMalwareUpdateScheduleSchedule:ManagementSetAntiMalwareUpdateScheduleSchedule": {
      "properties": {
        "recurrence": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAntiMalwareUpdateScheduleScheduleRecurrence:ManagementSetAntiMalwareUpdateScheduleScheduleRecurrence",
          "description": "Days recurrence.recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAntiMalwareUpdateScheduleScheduleRecurrence:ManagementSetAntiMalwareUpdateScheduleScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the month to run the update.<br> Valid values: interval in the range of 1 to 31. <font color=\"red\">Required only when</font> pattern is set to 'Monthly'.days blocks are documented below.\n"
        },
        "intervalHours": {
          "type": "number",
          "description": "The amount of hours between updates. <font color=\"red\">Required only when</font> pattern is set to 'Interval'.\n"
        },
        "intervalMinutes": {
          "type": "number",
          "description": "The amount of minutes between updates. <font color=\"red\">Required only when</font> pattern is set to 'Interval'.\n"
        },
        "intervalSeconds": {
          "type": "number",
          "description": "The amount of seconds between updates. <font color=\"red\">Required only when</font> pattern is set to 'Interval'.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Days recurrence pattern.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the week to run the update.<br> Valid values: group of values from {'Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat'}. <font color=\"red\">Required only when</font> pattern is set to 'Weekly'.weekdays blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAppControlUpdateScheduleScheduleGatewayUpdate:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdate": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable Application Control & URL Filtering Update Schedule on Gateway.\n"
        },
        "schedule": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleGatewayUpdateSchedule:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdateSchedule",
          "description": "Schedule Configuration.schedule blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAppControlUpdateScheduleScheduleGatewayUpdateSchedule:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdateSchedule": {
      "properties": {
        "recurrence": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence",
          "description": "Days recurrence.recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the month to run the update.<br> Valid values: interval in the range of 1 to 31. <font color=\"red\">Required only when</font> pattern is set to 'Monthly'.\n"
        },
        "intervalHours": {
          "type": "number",
          "description": "The amount of hours between updates. <font color=\"red\">Required only when</font> pattern is set to 'Interval'.\n"
        },
        "intervalMinutes": {
          "type": "number",
          "description": "The amount of minutes between updates. <font color=\"red\">Required only when</font> pattern is set to 'Interval'.\n"
        },
        "intervalSeconds": {
          "type": "number",
          "description": "The amount of seconds between updates. <font color=\"red\">Required only when</font> pattern is set to 'Interval'.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Days recurrence pattern.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the week to run the update.<br> Valid values: group of values from {'Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat'}. <font color=\"red\">Required only when</font> pattern is set to 'Weekly'.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAppControlUpdateScheduleScheduleManagementUpdate:ManagementSetAppControlUpdateScheduleScheduleManagementUpdate": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable Application Control & URL Filtering Update Schedule on Management Server.\n"
        },
        "schedule": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleManagementUpdateSchedule:ManagementSetAppControlUpdateScheduleScheduleManagementUpdateSchedule",
          "description": "Schedule Configuration.schedule blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAppControlUpdateScheduleScheduleManagementUpdateSchedule:ManagementSetAppControlUpdateScheduleScheduleManagementUpdateSchedule": {
      "properties": {
        "recurrence": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence:ManagementSetAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence",
          "description": "Days recurrence.recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence:ManagementSetAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the month to run the update.<br> Valid values: interval in the range of 1 to 31. <font color=\"red\">Required only when</font> pattern is set to 'Monthly'.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Days recurrence pattern.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the week to run the update.<br> Valid values: group of values from {'Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat'}. <font color=\"red\">Required only when</font> pattern is set to 'Weekly'.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetHttpsAdvancedSettingsBlockedCertificate:ManagementSetHttpsAdvancedSettingsBlockedCertificate": {
      "properties": {
        "certSerialNumber": {
          "type": "string",
          "description": "Certificate Serial Number (unique) in hexadecimal format HH:HH.\n"
        },
        "comments": {
          "type": "string",
          "description": "Describes the certificate by default, can be overridden by any text.\n"
        },
        "name": {
          "type": "string",
          "description": "Describes the name, cannot be overridden.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetThreatProtectionOverride:ManagementSetThreatProtectionOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "Protection action.\n"
        },
        "capturePackets": {
          "type": "boolean",
          "description": "Capture packets.\n"
        },
        "profile": {
          "type": "string",
          "description": "Profile name.\n"
        },
        "track": {
          "type": "string",
          "description": "Tracking method for protection.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSetTrustTrustSettings:ManagementSetTrustTrustSettings": {
      "properties": {
        "gatewayMacAddress": {
          "type": "string",
          "description": "Use the Security Gateway MAC address, relevant for the<span pulumi-lang-nodejs=\" gatewayMacAddress \" pulumi-lang-dotnet=\" GatewayMacAddress \" pulumi-lang-go=\" gatewayMacAddress \" pulumi-lang-python=\" gateway_mac_address \" pulumi-lang-yaml=\" gatewayMacAddress \" pulumi-lang-java=\" gatewayMacAddress \"> gateway_mac_address </span>identification-method.\n"
        },
        "identificationMethod": {
          "type": "string",
          "description": "How to identify the gateway (relevant for Spark DAIP gateways only).\n"
        },
        "initiationPhase": {
          "type": "string",
          "description": "Push the certificate to the Security Gateway immediately, or wait for the Security Gateway to pull the certificate. Default value for Spark Gateway is 'when_gateway_connects'.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterAdvancedSettings:ManagementSimpleClusterAdvancedSettings": {
      "properties": {
        "connectionPersistence": {
          "type": "string",
          "description": "Handling established connections when installing a new policy.\n"
        },
        "sam": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterAdvancedSettingsSam:ManagementSimpleClusterAdvancedSettingsSam",
          "description": "SAM.sam blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterAdvancedSettingsSam:ManagementSimpleClusterAdvancedSettingsSam": {
      "properties": {
        "forwardToOtherSamServers": {
          "type": "boolean",
          "description": "Forward SAM clients' requests to other SAM servers.\n"
        },
        "purgeSamFile": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterAdvancedSettingsSamPurgeSamFile:ManagementSimpleClusterAdvancedSettingsSamPurgeSamFile",
          "description": "Purge SAM File.purge_sam_file blocks are documented below.\n"
        },
        "useEarlyVersions": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterAdvancedSettingsSamUseEarlyVersions:ManagementSimpleClusterAdvancedSettingsSamUseEarlyVersions",
          "description": "Use early versions compatibility mode.use_early_versions blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterAdvancedSettingsSamPurgeSamFile:ManagementSimpleClusterAdvancedSettingsSamPurgeSamFile": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Purge SAM File.\n"
        },
        "purgeWhenSizeReachesTo": {
          "type": "number",
          "description": "Purge SAM File When it Reaches to.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterAdvancedSettingsSamUseEarlyVersions:ManagementSimpleClusterAdvancedSettingsSamUseEarlyVersions": {
      "properties": {
        "compatibilityMode": {
          "type": "string",
          "description": "Early versions compatibility mode.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Use early versions compatibility mode.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterHttpsInspection:ManagementSimpleClusterHttpsInspection": {
      "properties": {
        "bypassOnFailure": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspectionBypassOnFailure:ManagementSimpleClusterHttpsInspectionBypassOnFailure",
          "description": "Set to be true in order to bypass all requests (Fail-open) in case of internal system error.bypass_on_failure blocks are documented below.\n"
        },
        "denyExpiredServerCert": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspectionDenyExpiredServerCert:ManagementSimpleClusterHttpsInspectionDenyExpiredServerCert",
          "description": "Set to be true in order to drop traffic from servers with expired server certificate.deny_expired_server_cert blocks are documented below.\n"
        },
        "denyRevokedServerCert": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspectionDenyRevokedServerCert:ManagementSimpleClusterHttpsInspectionDenyRevokedServerCert",
          "description": "Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).deny_revoked_server_cert blocks are documented below.\n"
        },
        "denyUntrustedServerCert": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert:ManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert",
          "description": "Set to be true in order to drop traffic from servers with untrusted server certificate.deny_untrusted_server_cert blocks are documented below.\n"
        },
        "siteCategorizationAllowMode": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode:ManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode",
          "description": "Set to 'background' in order to allowed requests until categorization is complete.site_categorization_allow_mode blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterHttpsInspectionBypassOnFailure:ManagementSimpleClusterHttpsInspectionBypassOnFailure": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterHttpsInspectionDenyExpiredServerCert:ManagementSimpleClusterHttpsInspectionDenyExpiredServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterHttpsInspectionDenyRevokedServerCert:ManagementSimpleClusterHttpsInspectionDenyRevokedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert:ManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode:ManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "string",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettings:ManagementSimpleClusterIdentityAwarenessSettings": {
      "properties": {
        "browserBasedAuthentication": {
          "type": "boolean",
          "description": "Enable Browser Based Authentication source.\n"
        },
        "browserBasedAuthenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettings",
          "description": "Browser Based Authentication settings.browser_based_authentication_settings blocks are documented below.\n"
        },
        "identityAgent": {
          "type": "boolean",
          "description": "Enable Identity Agent source.\n"
        },
        "identityAgentSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettings",
          "description": "Identity Agent settings.identity_agent_settings blocks are documented below.\n"
        },
        "identityCollector": {
          "type": "boolean",
          "description": "Enable Identity Collector source.\n"
        },
        "identityCollectorSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettings",
          "description": "Identity Collector settings.identity_collector_settings blocks are documented below.\n"
        },
        "identitySharingSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentitySharingSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentitySharingSettings",
          "description": "Identity sharing settings.identity_sharing_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsProxySettings:ManagementSimpleClusterIdentityAwarenessSettingsProxySettings",
          "description": "Identity-Awareness Proxy settings.proxy_settings blocks are documented below.\n"
        },
        "remoteAccess": {
          "type": "boolean",
          "description": "Enable Remote Access Identity source.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettings": {
      "properties": {
        "authenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings",
          "description": "Authentication Settings for Browser Based Authentication.authentication_settings blocks are documented below.\n"
        },
        "browserBasedAuthenticationPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings",
          "description": "Browser Based Authentication portal settings.browser_based_authentication_portal_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "identityProviders": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Identity provider object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"identity provider\".identity_provider blocks are documented below.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories",
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings",
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings",
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding. \nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings:ManagementSimpleClusterIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettings": {
      "properties": {
        "agentsIntervalKeepalive": {
          "type": "number",
          "description": "Agents send keepalive period (minutes).\n"
        },
        "authenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings",
          "description": "Authentication Settings for Identity Agent.authentication_settings blocks are documented below.\n"
        },
        "identityAgentPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings",
          "description": "Identity Agent accessibility settings.identity_agent_portal_settings blocks are documented below.\n"
        },
        "userReauthenticateInterval": {
          "type": "number",
          "description": "Agent reauthenticate time interval (minutes).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories",
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettings": {
      "properties": {
        "authenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings",
          "description": "Authentication Settings for Identity Collector.authentication_settings blocks are documented below.\n"
        },
        "authorizedClients": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient"
          },
          "description": "Authorized Clients.authorized_clients blocks are documented below.\n"
        },
        "clientAccessPermissions": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions",
          "description": "Identity Collector accessibility settings.client_access_permissions blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authorizedClients"
      ]
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings": {
      "properties": {
        "usersDirectories": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories",
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient": {
      "properties": {
        "client": {
          "type": "string",
          "description": "Host / Network Group Name or UID.\n"
        },
        "clientSecret": {
          "type": "string",
          "description": "Client Secret.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsIdentitySharingSettings:ManagementSimpleClusterIdentityAwarenessSettingsIdentitySharingSettings": {
      "properties": {
        "receiveFromOtherGateways": {
          "type": "boolean",
          "description": "Enable receiving identity from other gateways.\n"
        },
        "receiveFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Gateway(s) to receive identity from.receive_from blocks are documented below.\n"
        },
        "shareWithOtherGateways": {
          "type": "boolean",
          "description": "Enable identity sharing with other gateways.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIdentityAwarenessSettingsProxySettings:ManagementSimpleClusterIdentityAwarenessSettingsProxySettings": {
      "properties": {
        "detectUsingXForwardFor": {
          "type": "boolean",
          "description": "Whether to use X-Forward-For HTTP header, which is added by the proxy server to keep track of the original source IP.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterInterface:ManagementSimpleClusterInterface": {
      "properties": {
        "antiSpoofing": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "antiSpoofingSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Aanti_spoofing_settings blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "interfaceType": {
          "type": "string",
          "description": "Cluster interface type.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "multicastAddress": {
          "type": "string",
          "description": "Multicast IP Address.\n"
        },
        "multicastAddressType": {
          "type": "string",
          "description": "Multicast Address Type.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "securityZone": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "securityZoneSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Asecurity_zone_settings blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "N/A\n"
        },
        "topologyAutomaticCalculation": {
          "type": "string",
          "description": "Shows the automatic topology calculation.\n"
        },
        "topologySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Atopology_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "interfaceType",
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "interfaceType",
            "name",
            "topologyAutomaticCalculation"
          ]
        }
      }
    },
    "checkpoint:index/ManagementSimpleClusterIpsSettings:ManagementSimpleClusterIpsSettings": {
      "properties": {
        "activationMode": {
          "type": "string",
          "description": "Defines whether the IPS blade operates in Detect Only mode or enforces the configured IPS Policy.\n"
        },
        "bypassAllUnderLoad": {
          "type": "boolean",
          "description": "Disable/enable all IPS protections until CPU and memory levels are back to normal.\n"
        },
        "bypassTrackMethod": {
          "type": "string",
          "description": "Track options when all IPS protections are disabled until CPU/memory levels are back to normal.\n"
        },
        "cpuUsageHighThreshold": {
          "type": "number",
          "description": "CPU usage high threshold percentage (1-99).\n"
        },
        "cpuUsageLowThreshold": {
          "type": "number",
          "description": "CPU usage low threshold percentage (1-99).\n"
        },
        "memoryUsageHighThreshold": {
          "type": "number",
          "description": "Memory usage high threshold percentage (1-99).\n"
        },
        "memoryUsageLowThreshold": {
          "type": "number",
          "description": "Memory usage low threshold percentage (1-99).\n"
        },
        "rejectOnClusterFailOver": {
          "type": "boolean",
          "description": "Define the IPS connections during fail over reject packets or accept packets.\n"
        },
        "sendThreatCloudInfo": {
          "type": "boolean",
          "description": "Help improve Check Point Threat Prevention product by sending anonymous information.\n"
        },
        "topCpuConsumingProtections": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIpsSettingsTopCpuConsumingProtections:ManagementSimpleClusterIpsSettingsTopCpuConsumingProtections",
          "description": "Provides a way to reduce CPU levels on machines under load by disabling the top CPU consuming IPS protections.top_cpu_consuming_protections blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterIpsSettingsTopCpuConsumingProtections:ManagementSimpleClusterIpsSettingsTopCpuConsumingProtections": {
      "properties": {
        "disablePeriod": {
          "type": "number",
          "description": "Duration (in hours) for disabling the protections.\n"
        },
        "disableUnderLoad": {
          "type": "boolean",
          "description": "Temporarily disable/enable top CPU consuming IPS protections.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterMember:ManagementSimpleClusterMember": {
      "properties": {
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterMemberInterface:ManagementSimpleClusterMemberInterface"
          },
          "description": "Cluster Member network interfaces.interfaces blocks are documented below.\n"
        },
        "ipAddress": {
          "type": "string",
          "description": "IPv4 or IPv6 address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "N/A\n"
        },
        "priority": {
          "type": "number",
          "description": "In a High Availability New mode cluster each machine is given a priority. The highest priority machine serves as the gateway in normal circumstances. If this machine fails, control is passed to the next highest priority machine. If that machine fails, control is passed to the next machine, and so on.\nIn Load Sharing Unicast mode cluster, the highest priority is the pivot machine.\nThe values must be in a range from 1 to N, where N is number of cluster members.\n"
        },
        "sicMessage": {
          "type": "string",
          "description": "Secure Internal Communication state.\n"
        },
        "sicState": {
          "type": "string",
          "description": "Secure Internal Communication name.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "name",
            "priority",
            "sicMessage",
            "sicState"
          ]
        }
      }
    },
    "checkpoint:index/ManagementSimpleClusterMemberInterface:ManagementSimpleClusterMemberInterface": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ]
    },
    "checkpoint:index/ManagementSimpleClusterPlatformPortalSettings:ManagementSimpleClusterPlatformPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettingsAccessibility:ManagementSimpleClusterPlatformPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettingsCertificateSettings:ManagementSimpleClusterPlatformPortalSettingsCertificateSettings",
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettingsPortalWebSettings:ManagementSimpleClusterPlatformPortalSettingsPortalWebSettings",
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterPlatformPortalSettingsAccessibility:ManagementSimpleClusterPlatformPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterPlatformPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterPlatformPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterPlatformPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterPlatformPortalSettingsCertificateSettings:ManagementSimpleClusterPlatformPortalSettingsCertificateSettings": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding. \nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterPlatformPortalSettingsPortalWebSettings:ManagementSimpleClusterPlatformPortalSettingsPortalWebSettings": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterUsercheckPortalSettings:ManagementSimpleClusterUsercheckPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettingsAccessibility:ManagementSimpleClusterUsercheckPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettingsCertificateSettings:ManagementSimpleClusterUsercheckPortalSettingsCertificateSettings",
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "State of the web portal (enabled or disabled). The supported blades are: {'Application Control', 'URL Filtering', 'Data Loss Prevention', 'Anti Virus', 'Anti Bot', 'Threat Emulation', 'Threat Extraction', 'Data Awareness'}.\n"
        },
        "portalWebSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettingsPortalWebSettings:ManagementSimpleClusterUsercheckPortalSettingsPortalWebSettings",
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterUsercheckPortalSettingsAccessibility:ManagementSimpleClusterUsercheckPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterUsercheckPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterUsercheckPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleClusterUsercheckPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterUsercheckPortalSettingsCertificateSettings:ManagementSimpleClusterUsercheckPortalSettingsCertificateSettings": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding. \nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleClusterUsercheckPortalSettingsPortalWebSettings:ManagementSimpleClusterUsercheckPortalSettingsPortalWebSettings": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayAdvancedSettings:ManagementSimpleGatewayAdvancedSettings": {
      "properties": {
        "connectionPersistence": {
          "type": "string",
          "description": "Handling established connections when installing a new policy.\n"
        },
        "sam": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayAdvancedSettingsSam:ManagementSimpleGatewayAdvancedSettingsSam",
          "description": "SAM.sam blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayAdvancedSettingsSam:ManagementSimpleGatewayAdvancedSettingsSam": {
      "properties": {
        "forwardToOtherSamServers": {
          "type": "boolean",
          "description": "Forward SAM clients' requests to other SAM servers.\n"
        },
        "purgeSamFile": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayAdvancedSettingsSamPurgeSamFile:ManagementSimpleGatewayAdvancedSettingsSamPurgeSamFile",
          "description": "Purge SAM File.purge_sam_file blocks are documented below.\n"
        },
        "useEarlyVersions": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayAdvancedSettingsSamUseEarlyVersions:ManagementSimpleGatewayAdvancedSettingsSamUseEarlyVersions",
          "description": "Use early versions compatibility mode.use_early_versions blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayAdvancedSettingsSamPurgeSamFile:ManagementSimpleGatewayAdvancedSettingsSamPurgeSamFile": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Purge SAM File.\n"
        },
        "purgeWhenSizeReachesTo": {
          "type": "number",
          "description": "Purge SAM File When it Reaches to.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayAdvancedSettingsSamUseEarlyVersions:ManagementSimpleGatewayAdvancedSettingsSamUseEarlyVersions": {
      "properties": {
        "compatibilityMode": {
          "type": "string",
          "description": "Early versions compatibility mode.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Use early versions compatibility mode.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayApplicationControlAndUrlFilteringSettings:ManagementSimpleGatewayApplicationControlAndUrlFilteringSettings": {
      "properties": {
        "globalSettingsMode": {
          "type": "string",
          "description": "Whether to override global settings or not.\n"
        },
        "overrideGlobalSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "override global settings object.override_global_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayHttpsInspection:ManagementSimpleGatewayHttpsInspection": {
      "properties": {
        "bypassOnFailure": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspectionBypassOnFailure:ManagementSimpleGatewayHttpsInspectionBypassOnFailure",
          "description": "Set to be true in order to bypass all requests (Fail-open) in case of internal system error.bypass_on_failure blocks are documented below.\n"
        },
        "denyExpiredServerCert": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert:ManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert",
          "description": "Set to be true in order to drop traffic from servers with expired server certificate.deny_expired_server_cert blocks are documented below.\n"
        },
        "denyRevokedServerCert": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert:ManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert",
          "description": "Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).deny_revoked_server_cert blocks are documented below.\n"
        },
        "denyUntrustedServerCert": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert:ManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert",
          "description": "Set to be true in order to drop traffic from servers with untrusted server certificate.deny_untrusted_server_cert blocks are documented below.\n"
        },
        "siteCategorizationAllowMode": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode:ManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode",
          "description": "Set to 'background' in order to allowed requests until categorization is complete.site_categorization_allow_mode blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayHttpsInspectionBypassOnFailure:ManagementSimpleGatewayHttpsInspectionBypassOnFailure": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert:ManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert:ManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert:ManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode:ManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "string",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettings:ManagementSimpleGatewayIdentityAwarenessSettings": {
      "properties": {
        "browserBasedAuthentication": {
          "type": "boolean",
          "description": "Enable Browser Based Authentication source.\n"
        },
        "browserBasedAuthenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettings",
          "description": "Browser Based Authentication settings.browser_based_authentication_settings blocks are documented below.\n"
        },
        "identityAgent": {
          "type": "boolean",
          "description": "Enable Identity Agent source.\n"
        },
        "identityAgentSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettings",
          "description": "Identity Agent settings.identity_agent_settings blocks are documented below.\n"
        },
        "identityCollector": {
          "type": "boolean",
          "description": "Enable Identity Collector source.\n"
        },
        "identityCollectorSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettings",
          "description": "Identity Collector settings.identity_collector_settings blocks are documented below.\n"
        },
        "identitySharingSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentitySharingSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentitySharingSettings",
          "description": "Identity sharing settings.identity_sharing_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsProxySettings:ManagementSimpleGatewayIdentityAwarenessSettingsProxySettings",
          "description": "Identity-Awareness Proxy settings.proxy_settings blocks are documented below.\n"
        },
        "remoteAccess": {
          "type": "boolean",
          "description": "Enable Remote Access Identity source.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettings": {
      "properties": {
        "authenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings",
          "description": "Authentication Settings for Browser Based Authentication.authentication_settings blocks are documented below.\n"
        },
        "browserBasedAuthenticationPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings",
          "description": "Browser Based Authentication portal settings.browser_based_authentication_portal_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettings": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "identityProviders": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Identity provider object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"identity provider\".identity_provider blocks are documented below.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories",
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsAuthenticationSettingsUsersDirectories": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings",
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings",
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsCertificateSettings": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding. \nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings:ManagementSimpleGatewayIdentityAwarenessSettingsBrowserBasedAuthenticationSettingsBrowserBasedAuthenticationPortalSettingsPortalWebSettings": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettings": {
      "properties": {
        "agentsIntervalKeepalive": {
          "type": "number",
          "description": "Agents send keepalive period (minutes).\n"
        },
        "authenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings",
          "description": "Authentication Settings for Identity Agent.authentication_settings blocks are documented below.\n"
        },
        "identityAgentPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings",
          "description": "Identity Agent accessibility settings.identity_agent_portal_settings blocks are documented below.\n"
        },
        "userReauthenticateInterval": {
          "type": "number",
          "description": "Agent reauthenticate time interval (minutes).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettings": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories",
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsAuthenticationSettingsUsersDirectories": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityAgentSettingsIdentityAgentPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettings": {
      "properties": {
        "authenticationSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings",
          "description": "Authentication Settings for Identity Collector.authentication_settings blocks are documented below.\n"
        },
        "authorizedClients": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient"
          },
          "description": "Authorized Clients.authorized_clients blocks are documented below.\n"
        },
        "clientAccessPermissions": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions",
          "description": "Identity Collector accessibility settings.client_access_permissions blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authorizedClients"
      ]
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettings": {
      "properties": {
        "usersDirectories": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories",
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthenticationSettingsUsersDirectories": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsAuthorizedClient": {
      "properties": {
        "client": {
          "type": "string",
          "description": "Host / Network Group Name or UID.\n"
        },
        "clientSecret": {
          "type": "string",
          "description": "Client Secret.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissions": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentityCollectorSettingsClientAccessPermissionsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsIdentitySharingSettings:ManagementSimpleGatewayIdentityAwarenessSettingsIdentitySharingSettings": {
      "properties": {
        "receiveFromOtherGateways": {
          "type": "boolean",
          "description": "Enable receiving identity from other gateways.\n"
        },
        "receiveFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Gateway(s) to receive identity from.receive_from blocks are documented below.\n"
        },
        "shareWithOtherGateways": {
          "type": "boolean",
          "description": "Enable identity sharing with other gateways.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIdentityAwarenessSettingsProxySettings:ManagementSimpleGatewayIdentityAwarenessSettingsProxySettings": {
      "properties": {
        "detectUsingXForwardFor": {
          "type": "boolean",
          "description": "Whether to use X-Forward-For HTTP header, which is added by the proxy server to keep track of the original source IP.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayInterface:ManagementSimpleGatewayInterface": {
      "properties": {
        "antiSpoofing": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "antiSpoofingSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Aanti_spoofing_settings blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "securityZone": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "securityZoneSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Asecurity_zone_settings blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "N/A\n"
        },
        "topologyAutomaticCalculation": {
          "type": "string",
          "description": "Shows the automatic topology calculation.\n"
        },
        "topologySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Atopology_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "name",
            "topologyAutomaticCalculation"
          ]
        }
      }
    },
    "checkpoint:index/ManagementSimpleGatewayIpsSettings:ManagementSimpleGatewayIpsSettings": {
      "properties": {
        "activationMode": {
          "type": "string",
          "description": "Defines whether the IPS blade operates in Detect Only mode or enforces the configured IPS Policy.\n"
        },
        "bypassAllUnderLoad": {
          "type": "boolean",
          "description": "Disable/enable all IPS protections until CPU and memory levels are back to normal.\n"
        },
        "bypassTrackMethod": {
          "type": "string",
          "description": "Track options when all IPS protections are disabled until CPU/memory levels are back to normal.\n"
        },
        "cpuUsageHighThreshold": {
          "type": "number",
          "description": "CPU usage high threshold percentage (1-99).\n"
        },
        "cpuUsageLowThreshold": {
          "type": "number",
          "description": "CPU usage low threshold percentage (1-99).\n"
        },
        "memoryUsageHighThreshold": {
          "type": "number",
          "description": "Memory usage high threshold percentage (1-99).\n"
        },
        "memoryUsageLowThreshold": {
          "type": "number",
          "description": "Memory usage low threshold percentage (1-99).\n"
        },
        "sendThreatCloudInfo": {
          "type": "boolean",
          "description": "Help improve Check Point Threat Prevention product by sending anonymous information.\n"
        },
        "topCpuConsumingProtections": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections:ManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections",
          "description": "Provides a way to reduce CPU levels on machines under load by disabling the top CPU consuming IPS protections.top_cpu_consuming_protections blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections:ManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections": {
      "properties": {
        "disablePeriod": {
          "type": "number",
          "description": "Duration (in hours) for disabling the protections.\n"
        },
        "disableUnderLoad": {
          "type": "boolean",
          "description": "Temporarily disable/enable top CPU consuming IPS protections.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayPlatformPortalSettings:ManagementSimpleGatewayPlatformPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettingsAccessibility:ManagementSimpleGatewayPlatformPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettingsCertificateSettings:ManagementSimpleGatewayPlatformPortalSettingsCertificateSettings",
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettingsPortalWebSettings:ManagementSimpleGatewayPlatformPortalSettingsPortalWebSettings",
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayPlatformPortalSettingsAccessibility:ManagementSimpleGatewayPlatformPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayPlatformPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayPlatformPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayPlatformPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayPlatformPortalSettingsCertificateSettings:ManagementSimpleGatewayPlatformPortalSettingsCertificateSettings": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding. \nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayPlatformPortalSettingsPortalWebSettings:ManagementSimpleGatewayPlatformPortalSettingsPortalWebSettings": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayUsercheckPortalSettings:ManagementSimpleGatewayUsercheckPortalSettings": {
      "properties": {
        "accessibility": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettingsAccessibility:ManagementSimpleGatewayUsercheckPortalSettingsAccessibility",
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettingsCertificateSettings:ManagementSimpleGatewayUsercheckPortalSettingsCertificateSettings",
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "State of the web portal (enabled or disabled). The supported blades are: {'Application Control', 'URL Filtering', 'Data Loss Prevention', 'Anti Virus', 'Anti Bot', 'Threat Emulation', 'Threat Extraction', 'Data Awareness'}.\n"
        },
        "portalWebSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettingsPortalWebSettings:ManagementSimpleGatewayUsercheckPortalSettingsPortalWebSettings",
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayUsercheckPortalSettingsAccessibility:ManagementSimpleGatewayUsercheckPortalSettingsAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayUsercheckPortalSettingsAccessibilityInternalAccessSettings",
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayUsercheckPortalSettingsAccessibilityInternalAccessSettings:ManagementSimpleGatewayUsercheckPortalSettingsAccessibilityInternalAccessSettings": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayUsercheckPortalSettingsCertificateSettings:ManagementSimpleGatewayUsercheckPortalSettingsCertificateSettings": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding. \nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSimpleGatewayUsercheckPortalSettingsPortalWebSettings:ManagementSimpleGatewayUsercheckPortalSettingsPortalWebSettings": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSmartTaskAction:ManagementSmartTaskAction": {
      "properties": {
        "runScript": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskActionRunScript:ManagementSmartTaskActionRunScript",
          "description": "When the trigger is fired, runs the configured Repository Script on the defined targets.<br>The trigger data is then passed to the script as the first parameter. The parameter is JSON encoded in Base64 format.run_script blocks are documented below.\n"
        },
        "sendMail": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskActionSendMail:ManagementSmartTaskActionSendMail",
          "description": "When the trigger is fired, sends the configured email to the defined recipients.send_mail blocks are documented below.\n"
        },
        "sendWebRequest": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskActionSendWebRequest:ManagementSmartTaskActionSendWebRequest",
          "description": "When the trigger is fired, sends an HTTPS POST web request to the configured URL.<br>The trigger data will be passed along with the SmartTask's custom data in the request's payload.send_web_request blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSmartTaskActionRunScript:ManagementSmartTaskActionRunScript": {
      "properties": {
        "repositoryScript": {
          "type": "string",
          "description": "Repository script that is executed when the trigger is fired.,  identified by the name or UID.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Targets to execute the script on.targets blocks are documented below.\n"
        },
        "timeOut": {
          "type": "number",
          "description": "Script execution time-out in seconds.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSmartTaskActionSendMail:ManagementSmartTaskActionSendMail": {
      "properties": {
        "mailSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskActionSendMailMailSettings:ManagementSmartTaskActionSendMailMailSettings",
          "description": "The required settings to send the mail by.mail_settings blocks are documented below.\n"
        },
        "smtpServer": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskActionSendMailSmtpServer:ManagementSmartTaskActionSendMailSmtpServer",
          "description": "The UID or the name a preconfigured SMTP server object.\n"
        }
      },
      "type": "object",
      "required": [
        "mailSettings"
      ]
    },
    "checkpoint:index/ManagementSmartTaskActionSendMailMailSettings:ManagementSmartTaskActionSendMailMailSettings": {
      "properties": {
        "attachment": {
          "type": "string",
          "description": "What file should be attached to the mail.\n"
        },
        "bccRecipients": {
          "type": "string",
          "description": "A comma separated list of bcc recipient mail addresses.\n"
        },
        "body": {
          "type": "string",
          "description": "The email body.\n"
        },
        "ccRecipients": {
          "type": "string",
          "description": "A comma separated list of cc recipient mail addresses.\n"
        },
        "recipients": {
          "type": "string",
          "description": "A comma separated list of recipient mail addresses.\n"
        },
        "senderEmail": {
          "type": "string",
          "description": "An email address to send the mail from.\n"
        },
        "subject": {
          "type": "string",
          "description": "The email subject.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSmartTaskActionSendMailSmtpServer:ManagementSmartTaskActionSendMailSmtpServer": {
      "properties": {
        "authentication": {
          "type": "string",
          "description": "Does the mail server requires authentication.\n"
        },
        "encryption": {
          "type": "string",
          "description": "Encryption type.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "port": {
          "type": "string",
          "description": "The SMTP port to use.\n"
        },
        "server": {
          "type": "string",
          "description": "The SMTP server address.\n"
        },
        "username": {
          "type": "string",
          "description": "A username for the SMTP server.\n"
        }
      },
      "type": "object",
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "authentication",
            "encryption",
            "port",
            "server",
            "username"
          ]
        }
      }
    },
    "checkpoint:index/ManagementSmartTaskActionSendWebRequest:ManagementSmartTaskActionSendWebRequest": {
      "properties": {
        "fingerprint": {
          "type": "string",
          "description": "The SHA1 fingerprint of the URL's SSL certificate. Used to trust servers with self-signed SSL certificates.\n"
        },
        "overrideProxy": {
          "type": "boolean",
          "description": "Option to send to the web request via a proxy other than the Management's Server proxy (if defined).\n"
        },
        "proxyUrl": {
          "type": "string",
          "description": "URL of the proxy used to send the request.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "Shared secret that can be used by the target server to identify the Management Server.<br>The value will be sent as part of the request in the \"X-chkp-shared-secret\" header.\n"
        },
        "timeOut": {
          "type": "number",
          "description": "Web Request time-out in seconds.\n"
        },
        "url": {
          "type": "string",
          "description": "URL used for the web request.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollment:ManagementSubordinateCaAutomaticEnrollment": {
      "properties": {
        "automaticallyEnrollCertificate": {
          "type": "boolean",
          "description": "Whether to automatically enroll certificate.\n"
        },
        "cmpv1Settings": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollmentCmpv1Settings:ManagementSubordinateCaAutomaticEnrollmentCmpv1Settings",
          "description": "Cmpv1 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".<span pulumi-lang-nodejs=\" cmpv1Settings \" pulumi-lang-dotnet=\" Cmpv1Settings \" pulumi-lang-go=\" cmpv1Settings \" pulumi-lang-python=\" cmpv1_settings \" pulumi-lang-yaml=\" cmpv1Settings \" pulumi-lang-java=\" cmpv1Settings \"> cmpv1_settings </span>blocks are documented below.\n"
        },
        "cmpv2Settings": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollmentCmpv2Settings:ManagementSubordinateCaAutomaticEnrollmentCmpv2Settings",
          "description": "Cmpv2 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".<span pulumi-lang-nodejs=\" cmpv2Settings \" pulumi-lang-dotnet=\" Cmpv2Settings \" pulumi-lang-go=\" cmpv2Settings \" pulumi-lang-python=\" cmpv2_settings \" pulumi-lang-yaml=\" cmpv2Settings \" pulumi-lang-java=\" cmpv2Settings \"> cmpv2_settings </span>blocks are documented below.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Protocol that communicates with the certificate authority. Available only if \"automatically-enroll-certificate\" parameter is set to true.\n"
        },
        "scepSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollmentScepSettings:ManagementSubordinateCaAutomaticEnrollmentScepSettings",
          "description": "Scep protocol settings. Available only if \"protocol\" is set to \"scep\".<span pulumi-lang-nodejs=\" scepSettings \" pulumi-lang-dotnet=\" ScepSettings \" pulumi-lang-go=\" scepSettings \" pulumi-lang-python=\" scep_settings \" pulumi-lang-yaml=\" scepSettings \" pulumi-lang-java=\" scepSettings \"> scep_settings </span>blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollmentCmpv1Settings:ManagementSubordinateCaAutomaticEnrollmentCmpv1Settings": {
      "properties": {
        "directTcpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings:ManagementSubordinateCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings",
          "description": "Direct tcp transport layer settings.<span pulumi-lang-nodejs=\" directTcpSettings \" pulumi-lang-dotnet=\" DirectTcpSettings \" pulumi-lang-go=\" directTcpSettings \" pulumi-lang-python=\" direct_tcp_settings \" pulumi-lang-yaml=\" directTcpSettings \" pulumi-lang-java=\" directTcpSettings \"> direct_tcp_settings </span>blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings:ManagementSubordinateCaAutomaticEnrollmentCmpv1SettingsDirectTcpSettings": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "Certificate authority IP address.\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollmentCmpv2Settings:ManagementSubordinateCaAutomaticEnrollmentCmpv2Settings": {
      "properties": {
        "directTcpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings:ManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings",
          "description": "Direct tcp transport layer settings.<span pulumi-lang-nodejs=\" directTcpSettings \" pulumi-lang-dotnet=\" DirectTcpSettings \" pulumi-lang-go=\" directTcpSettings \" pulumi-lang-python=\" direct_tcp_settings \" pulumi-lang-yaml=\" directTcpSettings \" pulumi-lang-java=\" directTcpSettings \"> direct_tcp_settings </span>blocks are documented below.\n"
        },
        "httpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsHttpSettings:ManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsHttpSettings",
          "description": "Http transport layer settings.<span pulumi-lang-nodejs=\" httpSettings \" pulumi-lang-dotnet=\" HttpSettings \" pulumi-lang-go=\" httpSettings \" pulumi-lang-python=\" http_settings \" pulumi-lang-yaml=\" httpSettings \" pulumi-lang-java=\" httpSettings \"> http_settings </span>blocks are documented below.\n"
        },
        "transportLayer": {
          "type": "string",
          "description": "Transport layer.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings:ManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsDirectTcpSettings": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "Certificate authority IP address.\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsHttpSettings:ManagementSubordinateCaAutomaticEnrollmentCmpv2SettingsHttpSettings": {
      "properties": {
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementSubordinateCaAutomaticEnrollmentScepSettings:ManagementSubordinateCaAutomaticEnrollmentScepSettings": {
      "properties": {
        "caIdentifier": {
          "type": "string",
          "description": "Certificate authority identifier.\n"
        },
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementThreatIndicatorObservable:ManagementThreatIndicatorObservable": {
      "properties": {
        "confidence": {
          "type": "string",
          "description": "The confidence level the indicator has that a real threat has been uncovered.\n"
        },
        "domain": {
          "type": "string",
          "description": "The name of a domain.\n"
        },
        "ipAddress": {
          "type": "string",
          "description": "A valid IP-Address.\n"
        },
        "ipAddressFirst": {
          "type": "string",
          "description": "A valid IP-Address, the beginning of the range. If you configure this parameter with a value, you must also configure the value of the 'ip-address-last' parameter.\n"
        },
        "ipAddressLast": {
          "type": "string",
          "description": "A valid IP-Address, the end of the range. If you configure this parameter with a value, you must also configure the value of the 'ip-address-first' parameter.\n"
        },
        "mailCc": {
          "type": "string",
          "description": "A valid E-Mail address, cc field.\n"
        },
        "mailFrom": {
          "type": "string",
          "description": "A valid E-Mail address, sender field.\n"
        },
        "mailReplyTo": {
          "type": "string",
          "description": "A valid E-Mail address, reply-to field.\n"
        },
        "mailSubject": {
          "type": "string",
          "description": "Subject of E-Mail.\n"
        },
        "mailTo": {
          "type": "string",
          "description": "A valid E-Mail address, recipient filed.\n"
        },
        "md5": {
          "type": "string",
          "description": "A valid MD5 sequence.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "product": {
          "type": "string",
          "description": "The software blade that processes the observable: AV - AntiVirus, AB - AntiBot.\n"
        },
        "severity": {
          "type": "string",
          "description": "The severity level of the threat.\n"
        },
        "url": {
          "type": "string",
          "description": "A valid URL.\n"
        }
      },
      "type": "object",
      "required": [
        "name"
      ]
    },
    "checkpoint:index/ManagementThreatIndicatorProfileOverride:ManagementThreatIndicatorProfileOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "The indicator's action in this profile.\n"
        },
        "profile": {
          "type": "string",
          "description": "The profile in which to override the indicator's action.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementThreatIocFeedCustomHeader:ManagementThreatIocFeedCustomHeader": {
      "properties": {
        "headerName": {
          "type": "string",
          "description": "The name of the HTTP header we wish to add.\n"
        },
        "headerValue": {
          "type": "string",
          "description": "The name of the HTTP value we wish to add.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementThreatProfileActivateProtectionsByExtendedAttribute:ManagementThreatProfileActivateProtectionsByExtendedAttribute": {
      "properties": {
        "category": {
          "type": "string",
          "description": "IPS tag category name.\n"
        },
        "name": {
          "type": "string",
          "description": "IPS tag name.\n"
        },
        "uid": {
          "type": "string",
          "description": "IPS tag unique identifier.\n"
        },
        "values": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileActivateProtectionsByExtendedAttributeValue:ManagementThreatProfileActivateProtectionsByExtendedAttributeValue"
          },
          "description": "Collection of IPS protection extended attribute values (name and uid).\n"
        }
      },
      "type": "object",
      "required": [
        "category",
        "name",
        "uid",
        "values"
      ]
    },
    "checkpoint:index/ManagementThreatProfileActivateProtectionsByExtendedAttributeValue:ManagementThreatProfileActivateProtectionsByExtendedAttributeValue": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "uid"
      ]
    },
    "checkpoint:index/ManagementThreatProfileDeactivateProtectionsByExtendedAttribute:ManagementThreatProfileDeactivateProtectionsByExtendedAttribute": {
      "properties": {
        "category": {
          "type": "string",
          "description": "IPS tag category name.\n"
        },
        "name": {
          "type": "string",
          "description": "IPS tag name.\n"
        },
        "uid": {
          "type": "string",
          "description": "IPS tag unique identifier.\n"
        },
        "values": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue:ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue"
          },
          "description": "Collection of IPS protection extended attribute values (name and uid).\n"
        }
      },
      "type": "object",
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "values"
          ]
        }
      }
    },
    "checkpoint:index/ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue:ManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "uid"
      ]
    },
    "checkpoint:index/ManagementThreatProfileIndicatorOverride:ManagementThreatProfileIndicatorOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "The indicator's action in this profile.\n"
        },
        "indicator": {
          "type": "string",
          "description": "The indicator whose action is to be overriden.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementThreatProfileOverride:ManagementThreatProfileOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "Protection action.\n"
        },
        "capturePackets": {
          "type": "boolean",
          "description": "Capture packets.\n"
        },
        "default": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Default settings. default blocks are documented below.\n"
        },
        "final": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Final settings. final blocks are documented below.\n"
        },
        "protection": {
          "type": "string",
          "description": "IPS protection identified by name.\n"
        },
        "protectionExternalInfos": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of industry reference (CVE).\n"
        },
        "protectionUid": {
          "type": "string",
          "description": "IPS protection unique identifier.\n"
        },
        "track": {
          "type": "string",
          "description": "Tracking method for protection.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "protection"
      ],
      "language": {
        "nodejs": {
          "requiredOutputs": [
            "action",
            "default",
            "final",
            "protection",
            "protectionExternalInfos",
            "protectionUid"
          ]
        }
      }
    },
    "checkpoint:index/ManagementTimeHoursRange:ManagementTimeHoursRange": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Is hour range enabled.\n"
        },
        "from": {
          "type": "string",
          "description": "Time in format HH:MM.\n"
        },
        "index": {
          "type": "number",
          "description": "Hour range index.\n"
        },
        "to": {
          "type": "string",
          "description": "Time in format HH:MM.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementTimeRecurrence:ManagementTimeRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Valid on specific days. Multiple options, support range of days in months. Example:[\"1\",\"3\",\"9-20\"].\n"
        },
        "month": {
          "type": "string",
          "description": "Valid on month. Example: \"1\", \"2\",\"12\",\"Any\".\n"
        },
        "pattern": {
          "type": "string",
          "description": "Valid on \"Daily\", \"Weekly\", \"Monthly\" base.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Valid on weekdays. Example: \"Sun\", \"Mon\"...\"Sat\".\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVoipDomainH323GatekeeperRoutingMode:ManagementVoipDomainH323GatekeeperRoutingMode": {
      "properties": {
        "callSetup": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes call setup (Q.931).\n"
        },
        "callSetupAndCallControl": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes both call setup (Q.931) and call control (H.245).\n"
        },
        "direct": {
          "type": "boolean",
          "description": "Indicates whether the routing mode is direct.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVoipDomainH323GatewayRoutingMode:ManagementVoipDomainH323GatewayRoutingMode": {
      "properties": {
        "callSetup": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes call setup (Q.931).\n"
        },
        "callSetupAndCallControl": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes both call setup (Q.931) and call control (H.245).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedAdvancedProperties:ManagementVpnCommunityMeshedAdvancedProperties": {
      "properties": {
        "supportIpCompression": {
          "type": "boolean",
          "description": "Indicates whether to support IP compression.\n"
        },
        "useAggressiveMode": {
          "type": "boolean",
          "description": "Indicates whether to use aggressive mode.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedEncryptedTraffic:ManagementVpnCommunityMeshedEncryptedTraffic": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to accept all encrypted traffic.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedGranularEncryption:ManagementVpnCommunityMeshedGranularEncryption": {
      "properties": {
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used: prefer ikev2 but support ikev1, ikev2 only, ikev1 for ipv4 and ikev2 for ipv6 only.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used: suite-b-gcm-256, custom, vpn b, vpn a, suite-b-gcm-128.\n"
        },
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "internalGateway": {
          "type": "string",
          "description": "Internally managed Check Point gateway identified by name or UID, or 'Any' for all internal-gateways participants in this community.\n"
        }
      },
      "type": "object",
      "required": [
        "externalGateway",
        "internalGateway"
      ]
    },
    "checkpoint:index/ManagementVpnCommunityMeshedOverrideInterface:ManagementVpnCommunityMeshedOverrideInterface": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant VPN Peer.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideInterfaceInterface:ManagementVpnCommunityMeshedOverrideInterfaceInterface"
          },
          "description": "Enhanced Link Selection Interfaces.\n"
        }
      },
      "type": "object",
      "required": [
        "interfaces"
      ]
    },
    "checkpoint:index/ManagementVpnCommunityMeshedOverrideInterfaceInterface:ManagementVpnCommunityMeshedOverrideInterfaceInterface": {
      "properties": {
        "interfaceName": {
          "type": "string",
          "description": "The name of the interface.\n"
        },
        "nextHopIp": {
          "type": "string",
          "description": "The IP address of the next hop.\n"
        },
        "priority": {
          "type": "number",
          "description": "Priority of a 'Backup' interface.\n"
        },
        "redundancyMode": {
          "type": "string",
          "description": "Interface redundancy mode (Active/Backup).\n"
        },
        "staticNatIp": {
          "type": "string",
          "description": "The NATed IPv4 address that hides the source IPv4 address of outgoing connections (applies only to IPv4).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedOverrideVpnDomain:ManagementVpnCommunityMeshedOverrideVpnDomain": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant gateway in override VPN domain identified by the name or UID.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN domain network identified by the name or UID.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedPermanentTunnels:ManagementVpnCommunityMeshedPermanentTunnels": {
      "properties": {
        "gateways": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedPermanentTunnelsGateway:ManagementVpnCommunityMeshedPermanentTunnelsGateway"
          },
          "description": "List of gateways to set all their tunnels to permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to all-tunnels-of-specific-gateways.gateways blocks are documented below.\n"
        },
        "rim": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedPermanentTunnelsRim:ManagementVpnCommunityMeshedPermanentTunnelsRim",
          "description": "Route Injection Mechanism settings.rim blocks are documented below.\n"
        },
        "setPermanentTunnels": {
          "type": "string",
          "description": "Indicates which tunnels to set as permanent.\n"
        },
        "tunnelDownTrack": {
          "type": "string",
          "description": "VPN community permanent tunnels down track option.\n"
        },
        "tunnelUpTrack": {
          "type": "string",
          "description": "Permanent tunnels up track option.\n"
        },
        "tunnels": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedPermanentTunnelsTunnel:ManagementVpnCommunityMeshedPermanentTunnelsTunnel"
          },
          "description": "List of tunnels to set as permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to specific-tunnels-in-the-community.tunnels blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedPermanentTunnelsGateway:ManagementVpnCommunityMeshedPermanentTunnelsGateway": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Gateway to set all is tunnels to permanent with specified track options.<br>\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedPermanentTunnelsRim:ManagementVpnCommunityMeshedPermanentTunnelsRim": {
      "properties": {
        "enableOnGateways": {
          "type": "boolean",
          "description": "Indicates whether to enable automatic Route Injection Mechanism for gateways.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether Route Injection Mechanism is enabled.\n"
        },
        "routeInjectionTrack": {
          "type": "string",
          "description": "Route injection track method.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedPermanentTunnelsTunnel:ManagementVpnCommunityMeshedPermanentTunnelsTunnel": {
      "properties": {
        "firstTunnelEndpoint": {
          "type": "string",
          "description": "First tunnel endpoint (center gateway).\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "secondTunnelEndpoint": {
          "type": "string",
          "description": "Second tunnel endpoint (center gateway for meshed VPN community and satellitegateway for star VPN community).\nIdentified by name or UID.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedSharedSecret:ManagementVpnCommunityMeshedSharedSecret": {
      "properties": {
        "externalGateway": {
          "type": "string",
          "description": "External gateway identified by the name or UID.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "Shared secret.\n",
          "secret": true
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityMeshedWireMode:ManagementVpnCommunityMeshedWireMode": {
      "properties": {
        "allowUninspectedEncryptedRouting": {
          "type": "boolean",
          "description": "Allow members to route uninspected encrypted traffic in VPN routing configurations.\n"
        },
        "allowUninspectedEncryptedTraffic": {
          "type": "boolean",
          "description": "Allow uninspected encrypted traffic between Wire mode interfaces of this Community members.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityRemoteAccessOverrideVpnDomain:ManagementVpnCommunityRemoteAccessOverrideVpnDomain": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant gateway in override VPN domain identified by the name or UID.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN domain network identified by the name or UID.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarAdvancedProperties:ManagementVpnCommunityStarAdvancedProperties": {
      "properties": {
        "supportIpCompression": {
          "type": "boolean",
          "description": "Indicates whether to support IP compression.\n"
        },
        "useAggressiveMode": {
          "type": "boolean",
          "description": "Indicates whether to use aggressive mode.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarEncryptedTraffic:ManagementVpnCommunityStarEncryptedTraffic": {
      "properties": {
        "communityMembers": {
          "type": "string",
          "description": "Indicates on which community members to accept all encrypted traffic.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to accept all encrypted traffic.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarGranularEncryption:ManagementVpnCommunityStarGranularEncryption": {
      "properties": {
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "internalGateway": {
          "type": "string",
          "description": "Internally managed Check Point gateway identified by name or UID, or 'Any' for all internal-gateways participants in this community.\n"
        }
      },
      "type": "object",
      "required": [
        "externalGateway",
        "internalGateway"
      ]
    },
    "checkpoint:index/ManagementVpnCommunityStarMep:ManagementVpnCommunityStarMep": {
      "properties": {
        "defaultPriorityRule": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarMepDefaultPriorityRule:ManagementVpnCommunityStarMepDefaultPriorityRule",
          "description": "Priority rule for all satellite gateways. Relevant only if 'entry-point-selection-mechanism' is set to 'manual'.default_priority_rule blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable center gateways as Multiple Entry Points.\n"
        },
        "entryPointFinalSelectionMechanism": {
          "type": "string",
          "description": "The method by which the final entry point gateway will be chosen when the chosen mechanism returns more than one optional entry point.\n"
        },
        "entryPointSelectionMechanism": {
          "type": "string",
          "description": "The method by which the entry point gateway will be chosen from the gateways in the center.\n"
        },
        "exceptionPriorityRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarMepExceptionPriorityRule:ManagementVpnCommunityStarMepExceptionPriorityRule"
          },
          "description": "Exception priority rules for specific satellites gateways. Relevant only if 'entry-point-selection-mechanism' is set to 'manual'.exception_priority_rules blocks are documented below.\n"
        },
        "tracking": {
          "type": "string",
          "description": "Tracking option for the MEP.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarMepDefaultPriorityRule:ManagementVpnCommunityStarMepDefaultPriorityRule": {
      "properties": {
        "firstPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of first priority center gateways identified by the name or UID.first_priority_center_gateways blocks are documented below.\n"
        },
        "secondPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of second priority center gateways identified by the name or UID.second_priority_center_gateways blocks are documented below.\n"
        },
        "thirdPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of third priority center gateways identified by the name or UID.third_priority_center_gateways blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarMepExceptionPriorityRule:ManagementVpnCommunityStarMepExceptionPriorityRule": {
      "properties": {
        "firstPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of first priority center gateways identified by the name or UID.first_priority_center_gateways blocks are documented below.\n"
        },
        "satelliteGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of satellite gateways to apply priority rules on identified by the name or UID.satellite_gateways blocks are documented below.\n"
        },
        "secondPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of second priority center gateways identified by the name or UID.second_priority_center_gateways blocks are documented below.\n"
        },
        "thirdPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of third priority center gateways identified by the name or UID.third_priority_center_gateways blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarOverrideInterface:ManagementVpnCommunityStarOverrideInterface": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant VPN Peer.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideInterfaceInterface:ManagementVpnCommunityStarOverrideInterfaceInterface"
          },
          "description": "Enhanced Link Selection Interfaces.\n"
        }
      },
      "type": "object",
      "required": [
        "interfaces"
      ]
    },
    "checkpoint:index/ManagementVpnCommunityStarOverrideInterfaceInterface:ManagementVpnCommunityStarOverrideInterfaceInterface": {
      "properties": {
        "interfaceName": {
          "type": "string",
          "description": "The name of the interface.\n"
        },
        "nextHopIp": {
          "type": "string",
          "description": "The IP address of the next hop.\n"
        },
        "priority": {
          "type": "number",
          "description": "Priority of a 'Backup' interface.\n"
        },
        "redundancyMode": {
          "type": "string",
          "description": "Interface redundancy mode (Active/Backup).\n"
        },
        "staticNatIp": {
          "type": "string",
          "description": "The NATed IPv4 address that hides the source IPv4 address of outgoing connections (applies only to IPv4).\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarOverrideVpnDomain:ManagementVpnCommunityStarOverrideVpnDomain": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant gateway in override VPN domain identified by the name or UID.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN domain network identified by the name or UID.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarPermanentTunnels:ManagementVpnCommunityStarPermanentTunnels": {
      "properties": {
        "gateways": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarPermanentTunnelsGateway:ManagementVpnCommunityStarPermanentTunnelsGateway"
          },
          "description": "List of gateways to set all their tunnels to permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to all-tunnels-of-specific-gateways.gateways blocks are documented below.\n"
        },
        "rim": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarPermanentTunnelsRim:ManagementVpnCommunityStarPermanentTunnelsRim",
          "description": "Route Injection Mechanism settings.rim blocks are documented below.\n"
        },
        "setPermanentTunnels": {
          "type": "string",
          "description": "Indicates which tunnels to set as permanent.\n"
        },
        "tunnelDownTrack": {
          "type": "string",
          "description": "VPN community permanent tunnels down track option.\n"
        },
        "tunnelUpTrack": {
          "type": "string",
          "description": "Permanent tunnels up track option.\n"
        },
        "tunnels": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarPermanentTunnelsTunnel:ManagementVpnCommunityStarPermanentTunnelsTunnel"
          },
          "description": "List of tunnels to set as permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to specific-tunnels-in-the-community.tunnels blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarPermanentTunnelsGateway:ManagementVpnCommunityStarPermanentTunnelsGateway": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Gateway to set all is tunnels to permanent with specified track options.<br>\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarPermanentTunnelsRim:ManagementVpnCommunityStarPermanentTunnelsRim": {
      "properties": {
        "enableOnCenterGateways": {
          "type": "boolean",
          "description": "Indicates whether to enable automatic Route Injection Mechanism on center gateways.\n"
        },
        "enableOnSatelliteGateways": {
          "type": "boolean",
          "description": "Indicates whether to enable automatic Route Injection Mechanism on satellite gateways.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether Route Injection Mechanism is enabled.\n"
        },
        "routeInjectionTrack": {
          "type": "string",
          "description": "Route injection track method.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarPermanentTunnelsTunnel:ManagementVpnCommunityStarPermanentTunnelsTunnel": {
      "properties": {
        "firstTunnelEndpoint": {
          "type": "string",
          "description": "First tunnel endpoint (center gateway).\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "secondTunnelEndpoint": {
          "type": "string",
          "description": "Second tunnel endpoint (center gateway for meshed VPN community and satellitegateway for star VPN community).\nIdentified by name or UID.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarSharedSecret:ManagementVpnCommunityStarSharedSecret": {
      "properties": {
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "Shared secret.\n\n<span pulumi-lang-nodejs=\"\ngranularEncryptions`\" pulumi-lang-dotnet=\"\nGranularEncryptions`\" pulumi-lang-go=\"\ngranularEncryptions`\" pulumi-lang-python=\"\ngranular_encryptions`\" pulumi-lang-yaml=\"\ngranularEncryptions`\" pulumi-lang-java=\"\ngranularEncryptions`\">\ngranular_encryptions`</span> supports the following:\n\n* `internal-gateway` - (Required) Internally managed Check Point gateway identified by name or UID, or 'Any' for all internal-gateways participants in this community.\n",
          "secret": true
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVpnCommunityStarWireMode:ManagementVpnCommunityStarWireMode": {
      "properties": {
        "allowUninspectedEncryptedRouting": {
          "type": "boolean",
          "description": "Allow members to route uninspected encrypted traffic in VPN routing configurations.\n"
        },
        "allowUninspectedEncryptedTraffic": {
          "type": "boolean",
          "description": "Allow uninspected encrypted traffic between Wire mode interfaces of this Community members.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddPhysicalInterfaceParams:ManagementVsxProvisioningToolAddPhysicalInterfaceParams": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "vlanTrunk": {
          "type": "boolean",
          "description": "True if this interface is a VLAN trunk.\n"
        },
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddRouteParam:ManagementVsxProvisioningToolAddRouteParam": {
      "properties": {
        "destination": {
          "type": "string",
          "description": "Route destination. To specify the default route, use 'default' for IPv4 and 'default6' for IPv6.\n"
        },
        "leadsTo": {
          "type": "string",
          "description": "Virtual Router for this route<br/>This VD must have an existing connection to the VR.\n"
        },
        "netmask": {
          "type": "string",
          "description": "Subnet mask for this route.\n"
        },
        "nextHop": {
          "type": "string",
          "description": "Next hop IP address.\n"
        },
        "prefix": {
          "type": "string",
          "description": "CIDR prefix for this route.\n"
        },
        "propagate": {
          "type": "boolean",
          "description": "Propagate this route to adjacent virtual devices.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVdInterfaceParam:ManagementVsxProvisioningToolAddVdInterfaceParam": {
      "properties": {
        "antiSpoofing": {
          "type": "string",
          "description": "The anti-spoofing enforcement setting of this interface.\n"
        },
        "antiSpoofingTracking": {
          "type": "string",
          "description": "The anti-spoofing tracking setting of this interface.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address of this interface with optional CIDR prefix.<br/>Required if this interface belongs to a Virtual System or Virtual Router.\n"
        },
        "ipv4Netmask": {
          "type": "string",
          "description": "IPv4 Subnet mask of this interface.\n"
        },
        "ipv4Prefix": {
          "type": "string",
          "description": "IPv4 CIDR prefix of this interface.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 Address of this interface<br/>Required if this interface belongs to a Virtual System or Virtual Router.\n"
        },
        "ipv6Netmask": {
          "type": "string",
          "description": "IPv6 Subnet mask of this interface.\n"
        },
        "ipv6Prefix": {
          "type": "string",
          "description": "IPv6 CIDR prefix of this interface.\n"
        },
        "leadsTo": {
          "type": "string",
          "description": "Virtual Switch or Virtual Router for this interface.\n"
        },
        "mtu": {
          "type": "number",
          "description": "MTU of this interface.\n"
        },
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "propagate": {
          "type": "boolean",
          "description": "Propagate IPv4 route to adjacent virtual devices.\n"
        },
        "propagate6": {
          "type": "boolean",
          "description": "Propagate IPv6 route to adjacent virtual devices.\n"
        },
        "specificGroup": {
          "type": "string",
          "description": "Specific group for interface topology.<br/>Only for use with topology option 'internal_specific'.\n"
        },
        "topology": {
          "type": "string",
          "description": "Topology of this interface.<br/>Automatic topology calculation based on routes must be disabled for this VS.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        },
        "vtiSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdInterfaceParamVtiSettings:ManagementVsxProvisioningToolAddVdInterfaceParamVtiSettings",
          "description": "VTI settings for this interface. This Virtual System must have VPN blade enabled.vti_settings blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVdInterfaceParamVtiSettings:ManagementVsxProvisioningToolAddVdInterfaceParamVtiSettings": {
      "properties": {
        "localIpv4Address": {
          "type": "string",
          "description": "The IPv4 address of the VPN tunnel on this Virtual System.\n"
        },
        "peerName": {
          "type": "string",
          "description": "The name of the remote peer object as defined in the VPN community.\n"
        },
        "remoteIpv4Address": {
          "type": "string",
          "description": "The IPv4 address of the VPN tunnel on the remote VPN peer.\n"
        },
        "tunnelId": {
          "type": "string",
          "description": "Optional unique Tunnel ID.<br/>Automatically assigned by the system if empty.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVdParams:ManagementVsxProvisioningToolAddVdParams": {
      "properties": {
        "calcTopologyAuto": {
          "type": "boolean",
          "description": "Calculate interface topology automatically based on routes.<br/>Relevant only for Virtual Systems.<br/>Do not use for virtual devices.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdParamsInterface:ManagementVsxProvisioningToolAddVdParamsInterface"
          },
          "description": "The list of interfaces for this new Virtual Device.<br/>Optional if this new VD is a Virtual Switch.interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "Main IPv4 Address.<br/>Required if this device is a Virtual System.<br/>Do not use for other virtual devices.\n"
        },
        "ipv4Instances": {
          "type": "number",
          "description": "Number of IPv4 instances for the Virtual System.<br/>Must be greater or equal to 1.<br/>Only relevant for Virtual Systems and Virtual Systems in bridge mode.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "Main IPv6 Address.<br/>Required if this device is a Virtual System.<br/>Do not use for other virtual devices.\n"
        },
        "ipv6Instances": {
          "type": "number",
          "description": "Number of IPv6 instances for the Virtual System.<br/>Only relevant for Virtual Systems and Virtual Systems in bridge mode.\n"
        },
        "routes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdParamsRoute:ManagementVsxProvisioningToolAddVdParamsRoute"
          },
          "description": "The list of routes for this new Virtual Device (VS or VR only).routes blocks are documented below.\n"
        },
        "type": {
          "type": "string",
          "description": "Type of the Virtual Device <br><br>vs - Virtual Firewall<br>vr - Virtual Router<br>vsw - Virtual Switch<br>vsbm - Virtual Firewall in bridge mode.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        },
        "vsMtu": {
          "type": "number",
          "description": "MTU of the Virtual System.<br/>Only relevant for Virtual Systems in bridge mode.<br/>Do not use for other virtual devices.\n"
        },
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object",
      "required": [
        "interfaces"
      ]
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVdParamsInterface:ManagementVsxProvisioningToolAddVdParamsInterface": {
      "properties": {
        "antiSpoofing": {
          "type": "string",
          "description": "The anti-spoofing enforcement setting of this interface.\n"
        },
        "antiSpoofingTracking": {
          "type": "string",
          "description": "The anti-spoofing tracking setting of this interface.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address of this interface with optional CIDR prefix.<br/>Required if this interface belongs to a Virtual System or Virtual Router.\n"
        },
        "ipv4Netmask": {
          "type": "string",
          "description": "IPv4 Subnet mask of this interface.\n"
        },
        "ipv4Prefix": {
          "type": "string",
          "description": "IPv4 CIDR prefix of this interface.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 Address of this interface<br/>Required if this interface belongs to a Virtual System or Virtual Router.\n"
        },
        "ipv6Netmask": {
          "type": "string",
          "description": "IPv6 Subnet mask of this interface.\n"
        },
        "ipv6Prefix": {
          "type": "string",
          "description": "IPv6 CIDR prefix of this interface.\n"
        },
        "leadsTo": {
          "type": "string",
          "description": "Virtual Switch or Virtual Router for this interface.\n"
        },
        "mtu": {
          "type": "number",
          "description": "MTU of this interface.\n"
        },
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "propagate": {
          "type": "boolean",
          "description": "Propagate IPv4 route to adjacent virtual devices.\n"
        },
        "propagate6": {
          "type": "boolean",
          "description": "Propagate IPv6 route to adjacent virtual devices.\n"
        },
        "specificGroup": {
          "type": "string",
          "description": "Specific group for interface topology.<br/>Only for use with topology option 'internal_specific'.\n"
        },
        "topology": {
          "type": "string",
          "description": "Topology of this interface.<br/>Automatic topology calculation based on routes must be disabled for this VS.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVdParamsRoute:ManagementVsxProvisioningToolAddVdParamsRoute": {
      "properties": {
        "destination": {
          "type": "string",
          "description": "Route destination. To specify the default route, use 'default' for IPv4 and 'default6' for IPv6.\n"
        },
        "leadsTo": {
          "type": "string",
          "description": "Virtual Router for this route<br/>This VD must have an existing connection to the VR.\n"
        },
        "netmask": {
          "type": "string",
          "description": "Subnet mask for this route.\n"
        },
        "nextHop": {
          "type": "string",
          "description": "Next hop IP address.\n"
        },
        "prefix": {
          "type": "string",
          "description": "CIDR prefix for this route.\n"
        },
        "propagate": {
          "type": "boolean",
          "description": "Propagate this route to adjacent virtual devices.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVsxClusterParams:ManagementVsxProvisioningToolAddVsxClusterParams": {
      "properties": {
        "clusterType": {
          "type": "string",
          "description": "Cluster type for the VSX Cluster Object.<br/>Starting in R81.10, only VSLS can be configured during cluster creation.<br/>To use High Availability ('ha'), first create the cluster as VSLS and then run<span pulumi-lang-nodejs=\" vsxUtil \" pulumi-lang-dotnet=\" VsxUtil \" pulumi-lang-go=\" vsxUtil \" pulumi-lang-python=\" vsx_util \" pulumi-lang-yaml=\" vsxUtil \" pulumi-lang-java=\" vsxUtil \"> vsx_util </span>on the Management.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "Main IPv4 Address of the VSX Gateway or Cluster object.<br/>Optional if main IPv6 Address is defined.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "Main IPv6 Address of the VSX Gateway or Cluster object.<br/>Optional if main IPv4 Address is defined.\n"
        },
        "members": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxClusterParamsMember:ManagementVsxProvisioningToolAddVsxClusterParamsMember"
          },
          "description": "The list of cluster members for this new VSX Cluster. Minimum: 2.members blocks are documented below.\n"
        },
        "ruleDrop": {
          "type": "string",
          "description": "Add a default drop rule to the VSX Gateway or Cluster initial policy.\n"
        },
        "ruleHttps": {
          "type": "string",
          "description": "Add a rule to allow HTTPS traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "rulePing": {
          "type": "string",
          "description": "Add a rule to allow ping traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "rulePing6": {
          "type": "string",
          "description": "Add a rule to allow ping6 traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "ruleSnmp": {
          "type": "string",
          "description": "Add a rule to allow SNMP traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "ruleSsh": {
          "type": "string",
          "description": "Add a rule to allow SSH traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "syncIfName": {
          "type": "string",
          "description": "Sync interface name for the VSX Cluster.\n"
        },
        "syncNetmask": {
          "type": "string",
          "description": "Sync interface netmask for the VSX Cluster.\n"
        },
        "version": {
          "type": "string",
          "description": "Version of the VSX Gateway or Cluster object.\n"
        },
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVsxClusterParamsMember:ManagementVsxProvisioningToolAddVsxClusterParamsMember": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "Main IPv4 Address of the VSX Cluster member.<br/>Mandatory if the VSX Cluster has an IPv4 Address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "Main IPv6 Address of the VSX Cluster member.<br/>Mandatory if the VSX Cluster has an IPv6 Address.\n"
        },
        "name": {
          "type": "string",
          "description": "Name of the new VSX Cluster member.\n"
        },
        "sicOtp": {
          "type": "string",
          "description": "SIC one-time-password of the VSX Gateway or Cluster member.<br/>Password must be between 4-127 characters in length.\n"
        },
        "syncIp": {
          "type": "string",
          "description": "Sync IP address for the VSX Cluster member.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAddVsxGatewayParams:ManagementVsxProvisioningToolAddVsxGatewayParams": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "Main IPv4 Address of the VSX Gateway or Cluster object.<br/>Optional if main IPv6 Address is defined.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "Main IPv6 Address of the VSX Gateway or Cluster object.<br/>Optional if main IPv4 Address is defined.\n"
        },
        "ruleDrop": {
          "type": "string",
          "description": "Add a default drop rule to the VSX Gateway or Cluster initial policy.\n"
        },
        "ruleHttps": {
          "type": "string",
          "description": "Add a rule to allow HTTPS traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "rulePing": {
          "type": "string",
          "description": "Add a rule to allow ping traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "rulePing6": {
          "type": "string",
          "description": "Add a rule to allow ping6 traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "ruleSnmp": {
          "type": "string",
          "description": "Add a rule to allow SNMP traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "ruleSsh": {
          "type": "string",
          "description": "Add a rule to allow SSH traffic to the VSX Gateway or Cluster initial policy.\n"
        },
        "sicOtp": {
          "type": "string",
          "description": "SIC one-time-password of the VSX Gateway or Cluster member.<br/>Password must be between 4-127 characters in length.\n"
        },
        "version": {
          "type": "string",
          "description": "Version of the VSX Gateway or Cluster object.\n"
        },
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolAttachBridgeParams:ManagementVsxProvisioningToolAttachBridgeParams": {
      "properties": {
        "ifs1": {
          "type": "string",
          "description": "Name of the first interface for the bridge.\n"
        },
        "ifs2": {
          "type": "string",
          "description": "Name of the second interface for the bridge.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolRemovePhysicalInterfaceParams:ManagementVsxProvisioningToolRemovePhysicalInterfaceParams": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolRemoveRouteParams:ManagementVsxProvisioningToolRemoveRouteParams": {
      "properties": {
        "destination": {
          "type": "string",
          "description": "Route destination. To specify the default route, use 'default' for IPv4 and 'default6' for IPv6.\n"
        },
        "netmask": {
          "type": "string",
          "description": "Subnet mask for this route.\n"
        },
        "prefix": {
          "type": "string",
          "description": "CIDR prefix for this route.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolRemoveVdInterfaceParams:ManagementVsxProvisioningToolRemoveVdInterfaceParams": {
      "properties": {
        "leadsTo": {
          "type": "string",
          "description": "Virtual Switch or Virtual Router for this interface.\n"
        },
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolRemoveVdParams:ManagementVsxProvisioningToolRemoveVdParams": {
      "properties": {
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolRemoveVsxParams:ManagementVsxProvisioningToolRemoveVsxParams": {
      "properties": {
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolSetPhysicalInterfaceParams:ManagementVsxProvisioningToolSetPhysicalInterfaceParams": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "vlanTrunk": {
          "type": "boolean",
          "description": "True if this interface is a VLAN trunk.\n"
        },
        "vsxName": {
          "type": "string",
          "description": "Name of the VSX Gateway or Cluster object.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolSetVdInterfaceParams:ManagementVsxProvisioningToolSetVdInterfaceParams": {
      "properties": {
        "antiSpoofing": {
          "type": "string",
          "description": "The anti-spoofing enforcement setting of this interface.\n"
        },
        "antiSpoofingTracking": {
          "type": "string",
          "description": "The anti-spoofing tracking setting of this interface.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address of this interface with optional CIDR prefix.<br/>Required if this interface belongs to a Virtual System or Virtual Router.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 Address of this interface<br/>Required if this interface belongs to a Virtual System or Virtual Router.\n"
        },
        "leadsTo": {
          "type": "string",
          "description": "Virtual Switch or Virtual Router for this interface.\n"
        },
        "mtu": {
          "type": "number",
          "description": "MTU of this interface.\n"
        },
        "name": {
          "type": "string",
          "description": "Name of the interface.\n"
        },
        "newLeadsTo": {
          "type": "string",
          "description": "New Virtual Switch or Virtual Router for this interface.\n"
        },
        "propagate": {
          "type": "boolean",
          "description": "Propagate IPv4 route to adjacent virtual devices.\n"
        },
        "propagate6": {
          "type": "boolean",
          "description": "Propagate IPv6 route to adjacent virtual devices.\n"
        },
        "specificGroup": {
          "type": "string",
          "description": "Specific group for interface topology.<br/>Only for use with topology option 'internal_specific'.\n"
        },
        "topology": {
          "type": "string",
          "description": "Topology of this interface.<br/>Automatic topology calculation based on routes must be disabled for this VS.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/ManagementVsxProvisioningToolSetVdParams:ManagementVsxProvisioningToolSetVdParams": {
      "properties": {
        "calcTopologyAuto": {
          "type": "boolean",
          "description": "Calculate interface topology automatically based on routes.<br/>Relevant only for Virtual Systems.<br/>Do not use for virtual devices.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "Main IPv4 Address.<br/>Relevant only if this device is a Virtual System.<br/>Do not use for other virtual devices.\n"
        },
        "ipv4Instances": {
          "type": "number",
          "description": "Number of IPv4 instances for the Virtual System.<br/>Must be greater or equal to 1.<br/>Only relevant for Virtual Systems and Virtual Systems in bridge mode.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "Main IPv6 Address.<br/>Relevant only if this device is a Virtual System.<br/>Do not use for other virtual devices.\n"
        },
        "ipv6Instances": {
          "type": "number",
          "description": "Number of IPv6 instances for the Virtual System.<br/>Only relevant for Virtual Systems and Virtual Systems in bridge mode.\n"
        },
        "vd": {
          "type": "string",
          "description": "Name of the Virtual System, Virtual Switch, or Virtual Router.\n"
        },
        "vsMtu": {
          "type": "number",
          "description": "MTU of the Virtual System.<br/>Only relevant for Virtual Systems in bridge mode.<br/>Do not use for other virtual devices.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementAccessRulebaseOrder:getManagementAccessRulebaseOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementAccessRulebaseRulebase:getManagementAccessRulebaseRulebase": {
      "properties": {
        "from": {
          "type": "number"
        },
        "objectsDictionaries": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAccessRulebaseRulebaseObjectsDictionary:getManagementAccessRulebaseRulebaseObjectsDictionary"
          }
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAccessRulebaseRulebaseRulebase:getManagementAccessRulebaseRulebaseRulebase"
          }
        },
        "to": {
          "type": "number"
        },
        "total": {
          "type": "number"
        }
      },
      "type": "object",
      "required": [
        "from",
        "objectsDictionaries",
        "rulebases",
        "to",
        "total"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAccessRulebaseRulebaseObjectsDictionary:getManagementAccessRulebaseRulebaseObjectsDictionary": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAccessRulebaseRulebaseRulebase:getManagementAccessRulebaseRulebaseRulebase": {
      "properties": {
        "action": {
          "type": "string"
        },
        "actionSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "comments": {
          "type": "string"
        },
        "contentDirection": {
          "type": "string"
        },
        "contentNegate": {
          "type": "boolean"
        },
        "contents": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "customFields": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "destinationNegate": {
          "type": "boolean"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "enabled": {
          "type": "boolean"
        },
        "from": {
          "type": "number"
        },
        "inlineLayer": {
          "type": "string"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "ruleNumber": {
          "type": "number"
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAccessRulebaseRulebaseRulebaseRulebase:getManagementAccessRulebaseRulebaseRulebaseRulebase"
          }
        },
        "serviceNegate": {
          "type": "boolean"
        },
        "serviceResource": {
          "type": "string"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "sourceNegate": {
          "type": "boolean"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "times": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "to": {
          "type": "number"
        },
        "track": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        },
        "vpns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "action",
        "actionSettings",
        "comments",
        "contentDirection",
        "contentNegate",
        "contents",
        "customFields",
        "destinationNegate",
        "destinations",
        "enabled",
        "from",
        "inlineLayer",
        "installOns",
        "name",
        "ruleNumber",
        "rulebases",
        "serviceNegate",
        "serviceResource",
        "services",
        "sourceNegate",
        "sources",
        "times",
        "to",
        "track",
        "type",
        "uid",
        "vpns"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAccessRulebaseRulebaseRulebaseRulebase:getManagementAccessRulebaseRulebaseRulebaseRulebase": {
      "properties": {
        "action": {
          "type": "string"
        },
        "actionSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "comments": {
          "type": "string"
        },
        "contentDirection": {
          "type": "string"
        },
        "contentNegate": {
          "type": "boolean"
        },
        "contents": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "customFields": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "destinationNegate": {
          "type": "boolean"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "enabled": {
          "type": "boolean"
        },
        "inlineLayer": {
          "type": "string"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "ruleNumber": {
          "type": "number"
        },
        "serviceNegate": {
          "type": "boolean"
        },
        "serviceResource": {
          "type": "string"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "sourceNegate": {
          "type": "boolean"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "times": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "track": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        },
        "vpns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "action",
        "actionSettings",
        "comments",
        "contentDirection",
        "contentNegate",
        "contents",
        "customFields",
        "destinationNegate",
        "destinations",
        "enabled",
        "inlineLayer",
        "installOns",
        "name",
        "ruleNumber",
        "serviceNegate",
        "serviceResource",
        "services",
        "sourceNegate",
        "sources",
        "times",
        "track",
        "type",
        "uid",
        "vpns"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAdministratorPermissionsProfile:getManagementAdministratorPermissionsProfile": {
      "properties": {
        "domain": {
          "type": "string",
          "description": "The domain's profile.\n"
        },
        "profile": {
          "type": "string",
          "description": "Permission profile.\n"
        }
      },
      "type": "object",
      "required": [
        "domain",
        "profile"
      ]
    },
    "checkpoint:index/getManagementAntiMalwareUpdateScheduleSchedule:getManagementAntiMalwareUpdateScheduleSchedule": {
      "properties": {
        "recurrences": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAntiMalwareUpdateScheduleScheduleRecurrence:getManagementAntiMalwareUpdateScheduleScheduleRecurrence"
          },
          "description": "Days recurrence.recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object",
      "required": [
        "recurrences",
        "time"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAntiMalwareUpdateScheduleScheduleRecurrence:getManagementAntiMalwareUpdateScheduleScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the month to run the update.<br> Valid values: interval in the range of 1 to 31.\n"
        },
        "intervalHours": {
          "type": "number",
          "description": "The amount of hours between updates.\n"
        },
        "intervalMinutes": {
          "type": "number",
          "description": "The amount of minutes between updates.\n"
        },
        "intervalSeconds": {
          "type": "number",
          "description": "The amount of seconds between updates.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Days recurrence pattern.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the week to run the update.<br> Valid values: group of values from {'Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat'}.\n"
        }
      },
      "type": "object",
      "required": [
        "days",
        "intervalHours",
        "intervalMinutes",
        "intervalSeconds",
        "pattern",
        "weekdays"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlAdvancedSettingsUrlFilteringSetting:getManagementAppControlAdvancedSettingsUrlFilteringSetting": {
      "properties": {
        "categorizeCachedAndTranslatedPages": {
          "type": "boolean",
          "description": "Select this option to assign categories to cached search engine results and translated pages.<br>When this option is selected, Application and URL Filtering assigns categories based on the original Web site instead of the 'search engine pages' category.<br>This property is not available in the Global domain of an MDS machine.\n"
        },
        "categorizeHttpsWebsites": {
          "type": "boolean",
          "description": "This option lets Application and URL Filtering assign categories to HTTPS sites without activating HTTPS inspection. It assigns a site category based on its domain name and whether the site has a valid certificate. If the server certificate is:<br> Trusted - Application and URL Filtering gets the domain name from the certificate and uses it to categorize the site.<br>Not Trusted - Application and URL Filtering assigns a category based on the IP address.<br>This property is not available in the Global domain of an MDS machine.\n"
        },
        "enforceSafeSearch": {
          "type": "boolean",
          "description": "Select this option to require use of the safe search feature in search engines. When activated, the URL Filtering Policy uses the strictest available safe search option for the specified search engine.<br>This option overrides user specified search engine options to block offensive material in search results.<br>This property is not available in the Global domain of an MDS machine.\n"
        }
      },
      "type": "object",
      "required": [
        "categorizeCachedAndTranslatedPages",
        "categorizeHttpsWebsites",
        "enforceSafeSearch"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlStatusInstalledVersionCreationTime:getManagementAppControlStatusInstalledVersionCreationTime": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970.\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlStatusLastUpdated:getManagementAppControlStatusLastUpdated": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970.\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlUpdateScheduleScheduleGatewayUpdate:getManagementAppControlUpdateScheduleScheduleGatewayUpdate": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable Application Control & URL Filtering Update Schedule on Gateway.\n"
        },
        "schedules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAppControlUpdateScheduleScheduleGatewayUpdateSchedule:getManagementAppControlUpdateScheduleScheduleGatewayUpdateSchedule"
          },
          "description": "Schedule Configuration.schedule blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "schedules"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlUpdateScheduleScheduleGatewayUpdateSchedule:getManagementAppControlUpdateScheduleScheduleGatewayUpdateSchedule": {
      "properties": {
        "recurrences": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence:getManagementAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence"
          },
          "description": "Days recurrence. recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object",
      "required": [
        "recurrences",
        "time"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence:getManagementAppControlUpdateScheduleScheduleGatewayUpdateScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the month to run the update.<br> Valid values: interval in the range of 1 to 31.\n"
        },
        "intervalHours": {
          "type": "number",
          "description": "The amount of hours between updates.\n"
        },
        "intervalMinutes": {
          "type": "number",
          "description": "The amount of minutes between updates.\n"
        },
        "intervalSeconds": {
          "type": "number",
          "description": "The amount of seconds between updates.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Days recurrence pattern.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the week to run the update.<br> Valid values: group of values from {'Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat'}.\n"
        }
      },
      "type": "object",
      "required": [
        "days",
        "intervalHours",
        "intervalMinutes",
        "intervalSeconds",
        "pattern",
        "weekdays"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlUpdateScheduleScheduleManagementUpdate:getManagementAppControlUpdateScheduleScheduleManagementUpdate": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable Application Control & URL Filtering Update Schedule on Management Server.\n"
        },
        "schedules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAppControlUpdateScheduleScheduleManagementUpdateSchedule:getManagementAppControlUpdateScheduleScheduleManagementUpdateSchedule"
          },
          "description": "Schedule Configuration.schedule blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "schedules"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlUpdateScheduleScheduleManagementUpdateSchedule:getManagementAppControlUpdateScheduleScheduleManagementUpdateSchedule": {
      "properties": {
        "recurrences": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence:getManagementAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence"
          },
          "description": "Days recurrence. recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object",
      "required": [
        "recurrences",
        "time"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence:getManagementAppControlUpdateScheduleScheduleManagementUpdateScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the month to run the update.<br> Valid values: interval in the range of 1 to 31.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Days recurrence pattern.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days of the week to run the update.<br> Valid values: group of values from {'Sun', 'Mon', 'Tue', 'Wed', 'Thu', 'Fri', 'Sat'}.\n"
        }
      },
      "type": "object",
      "required": [
        "days",
        "pattern",
        "weekdays"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAutomaticPurgeScheduling:getManagementAutomaticPurgeScheduling": {
      "properties": {
        "checkInterval": {
          "type": "number",
          "description": "Number of time-units between two purge checks.\n"
        },
        "lastCheck": {
          "type": "string",
          "description": "Last time purge check was executed.\n"
        },
        "nextCheck": {
          "type": "string",
          "description": "Next time purge check will be executed.\n"
        },
        "startDate": {
          "type": "string",
          "description": "The first time to check whether or not there are sessions to purge.\n"
        },
        "timeUnits": {
          "type": "string",
          "description": "The time units.\n"
        }
      },
      "type": "object",
      "required": [
        "checkInterval",
        "lastCheck",
        "nextCheck",
        "startDate",
        "timeUnits"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAzureAdContentObject:getManagementAzureAdContentObject": {
      "properties": {
        "additionalProperties": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementAzureAdContentObjectAdditionalProperty:getManagementAzureAdContentObjectAdditionalProperty"
          },
          "description": "Additional properties on the object.<span pulumi-lang-nodejs=\" additionalProperties \" pulumi-lang-dotnet=\" AdditionalProperties \" pulumi-lang-go=\" additionalProperties \" pulumi-lang-python=\" additional_properties \" pulumi-lang-yaml=\" additionalProperties \" pulumi-lang-java=\" additionalProperties \"> additional_properties </span>blocks are documented below.\n"
        },
        "azureAdObject": {
          "type": "string",
          "description": "The imported management object (if exists). Level of details in the output corresponds to the number of details for search. This table shows the level of details in the Standard level.\n"
        },
        "name": {
          "type": "string",
          "description": "Object management name.\n"
        },
        "nameInAzureAd": {
          "type": "string",
          "description": "Object name in the Azure AD.\n"
        },
        "typeInAzureAd": {
          "type": "string",
          "description": "Object type in Azure AD.\n"
        },
        "uidInAzureAd": {
          "type": "string",
          "description": "Unique identifier of the object in the Azure AD.\n"
        }
      },
      "type": "object",
      "required": [
        "additionalProperties",
        "azureAdObject",
        "name",
        "nameInAzureAd",
        "typeInAzureAd",
        "uidInAzureAd"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAzureAdContentObjectAdditionalProperty:getManagementAzureAdContentObjectAdditionalProperty": {
      "properties": {
        "name": {
          "type": "string"
        },
        "value": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementAzureAdContentOrder:getManagementAzureAdContentOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementAzureAdProperty:getManagementAzureAdProperty": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "value": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeRegulation:getManagementBestPracticeRegulation": {
      "properties": {
        "regulationName": {
          "type": "string",
          "description": "The name of the regulation.\n"
        },
        "requirementDescription": {
          "type": "string",
          "description": "The description of the requirement.\n"
        },
        "requirementId": {
          "type": "string",
          "description": "The id of the requirement.\n"
        },
        "requirementStatus": {
          "type": "string",
          "description": "The status of the requirement.\n"
        },
        "requirementUid": {
          "type": "string",
          "description": "The unique identifier of the requirement.\n"
        }
      },
      "type": "object",
      "required": [
        "regulationName",
        "requirementDescription",
        "requirementId",
        "requirementStatus",
        "requirementUid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeRelevantObject:getManagementBestPracticeRelevantObject": {
      "properties": {
        "accessRulesInfos": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeRelevantObjectAccessRulesInfo:getManagementBestPracticeRelevantObjectAccessRulesInfo"
          },
          "description": "The information about the relevant access rules. Appears only when <span pulumi-lang-nodejs=\"`relevantObjectsType`\" pulumi-lang-dotnet=\"`RelevantObjectsType`\" pulumi-lang-go=\"`relevantObjectsType`\" pulumi-lang-python=\"`relevant_objects_type`\" pulumi-lang-yaml=\"`relevantObjectsType`\" pulumi-lang-java=\"`relevantObjectsType`\">`relevant_objects_type`</span> is 'access-rule'.<span pulumi-lang-nodejs=\" accessRulesInfo \" pulumi-lang-dotnet=\" AccessRulesInfo \" pulumi-lang-go=\" accessRulesInfo \" pulumi-lang-python=\" access_rules_info \" pulumi-lang-yaml=\" accessRulesInfo \" pulumi-lang-java=\" accessRulesInfo \"> access_rules_info </span>blocks are documented below.\n"
        },
        "cpmRelevantObjectsInfos": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeRelevantObjectCpmRelevantObjectsInfo:getManagementBestPracticeRelevantObjectCpmRelevantObjectsInfo"
          },
          "description": "The information about the relevant objects. Appears only when <span pulumi-lang-nodejs=\"`relevantObjectsType`\" pulumi-lang-dotnet=\"`RelevantObjectsType`\" pulumi-lang-go=\"`relevantObjectsType`\" pulumi-lang-python=\"`relevant_objects_type`\" pulumi-lang-yaml=\"`relevantObjectsType`\" pulumi-lang-java=\"`relevantObjectsType`\">`relevant_objects_type`</span> is 'cpm-relevant-object'.<span pulumi-lang-nodejs=\" cpmRelevantObjectsInfo \" pulumi-lang-dotnet=\" CpmRelevantObjectsInfo \" pulumi-lang-go=\" cpmRelevantObjectsInfo \" pulumi-lang-python=\" cpm_relevant_objects_info \" pulumi-lang-yaml=\" cpmRelevantObjectsInfo \" pulumi-lang-java=\" cpmRelevantObjectsInfo \"> cpm_relevant_objects_info </span>blocks are documented below.\n"
        },
        "ipsProtectionsInfos": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeRelevantObjectIpsProtectionsInfo:getManagementBestPracticeRelevantObjectIpsProtectionsInfo"
          },
          "description": "The information about the relevant ips-protection objects. Appears only when <span pulumi-lang-nodejs=\"`relevantObjectsType`\" pulumi-lang-dotnet=\"`RelevantObjectsType`\" pulumi-lang-go=\"`relevantObjectsType`\" pulumi-lang-python=\"`relevant_objects_type`\" pulumi-lang-yaml=\"`relevantObjectsType`\" pulumi-lang-java=\"`relevantObjectsType`\">`relevant_objects_type`</span> is 'ips-protection'.<span pulumi-lang-nodejs=\" ipsProtectionsInfo \" pulumi-lang-dotnet=\" IpsProtectionsInfo \" pulumi-lang-go=\" ipsProtectionsInfo \" pulumi-lang-python=\" ips_protections_info \" pulumi-lang-yaml=\" ipsProtectionsInfo \" pulumi-lang-java=\" ipsProtectionsInfo \"> ips_protections_info </span>blocks are documented below.\n"
        },
        "relevantObjectsType": {
          "type": "string",
          "description": "The type of the relevant object.\n"
        }
      },
      "type": "object",
      "required": [
        "accessRulesInfos",
        "cpmRelevantObjectsInfos",
        "ipsProtectionsInfos",
        "relevantObjectsType"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeRelevantObjectAccessRulesInfo:getManagementBestPracticeRelevantObjectAccessRulesInfo": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Shows if the Compliance scan is enabled or not for this object.\n"
        },
        "layerName": {
          "type": "string",
          "description": "The name of the relevant policy layer.\n"
        },
        "layerUid": {
          "type": "string",
          "description": "The UID of the relevant policy layer.\n"
        },
        "policyName": {
          "type": "string",
          "description": "The name of the relevant policy.\n"
        },
        "ruleIndexes": {
          "type": "string",
          "description": "Comma-separated indexes of the relevant rules in the relevant policy and policy layer.\n"
        },
        "status": {
          "type": "string",
          "description": "The status of the relevant object.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "layerName",
        "layerUid",
        "policyName",
        "ruleIndexes",
        "status"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeRelevantObjectCpmRelevantObjectsInfo:getManagementBestPracticeRelevantObjectCpmRelevantObjectsInfo": {
      "properties": {
        "cpmRelevantObjectType": {
          "type": "string",
          "description": "The type of the relevant object.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Shows if the Compliance scan is enabled or not for this object.\n"
        },
        "name": {
          "type": "string",
          "description": "The name of the relevant object.\n"
        },
        "status": {
          "type": "string",
          "description": "The status of the relevant object.\n"
        }
      },
      "type": "object",
      "required": [
        "cpmRelevantObjectType",
        "enabled",
        "name",
        "status"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeRelevantObjectIpsProtectionsInfo:getManagementBestPracticeRelevantObjectIpsProtectionsInfo": {
      "properties": {
        "action": {
          "type": "string",
          "description": "The current action of the Threat Prevention profile.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Shows if the Compliance scan is enabled or not for this object.\n"
        },
        "profileName": {
          "type": "string",
          "description": "The name of the relevant Threat Prevention profile.\n"
        },
        "profileUid": {
          "type": "string",
          "description": "The UID of the relevant Threat Prevention profile.\n"
        },
        "protectionName": {
          "type": "string",
          "description": "The name of the relevant IPS protection.\n"
        },
        "status": {
          "type": "string",
          "description": "The status of the relevant object.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "enabled",
        "profileName",
        "profileUid",
        "protectionName",
        "status"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewall:getManagementBestPracticeUserDefinedFirewall": {
      "properties": {
        "policyRangePercentage": {
          "type": "number",
          "description": "User-defined policy range percentage to test.\n"
        },
        "policyRangePosition": {
          "type": "string",
          "description": "User-defined policy range position.\n"
        },
        "poorCondition": {
          "type": "string",
          "description": "User-defined poor condition.\n"
        },
        "secureCondition": {
          "type": "string",
          "description": "User-defined secure condition.\n"
        },
        "tolerance": {
          "type": "number",
          "description": "User-defined tolerance. Appears only when the value of the 'violation-condition' parameter is 'Rule found'.\n"
        },
        "userDefinedRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRule:getManagementBestPracticeUserDefinedFirewallUserDefinedRule"
          },
          "description": "User-defined Firewall rules.<span pulumi-lang-nodejs=\" userDefinedRules \" pulumi-lang-dotnet=\" UserDefinedRules \" pulumi-lang-go=\" userDefinedRules \" pulumi-lang-python=\" user_defined_rules \" pulumi-lang-yaml=\" userDefinedRules \" pulumi-lang-java=\" userDefinedRules \"> user_defined_rules </span>blocks are documented below.\n"
        },
        "violationCondition": {
          "type": "string",
          "description": "User-defined violation condition.\n"
        }
      },
      "type": "object",
      "required": [
        "policyRangePercentage",
        "policyRangePosition",
        "poorCondition",
        "secureCondition",
        "tolerance",
        "userDefinedRules",
        "violationCondition"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRule:getManagementBestPracticeUserDefinedFirewallUserDefinedRule": {
      "properties": {
        "actions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleAction:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleAction"
          },
          "description": "User-defined actions. action blocks are documented below.\n"
        },
        "comments": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleComment:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleComment"
          },
          "description": "User-defined comment. comment blocks are documented below.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestination:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestination"
          },
          "description": "User-defined destination objects. destination blocks are documented below.\n"
        },
        "hitCounts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCount:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCount"
          },
          "description": "User-defined hit count value.<span pulumi-lang-nodejs=\" hitCount \" pulumi-lang-dotnet=\" HitCount \" pulumi-lang-go=\" hitCount \" pulumi-lang-python=\" hit_count \" pulumi-lang-yaml=\" hitCount \" pulumi-lang-java=\" hitCount \"> hit_count </span>blocks are documented below.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOn:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOn"
          },
          "description": "User-defined \"Install On\" objects.<span pulumi-lang-nodejs=\" installOn \" pulumi-lang-dotnet=\" InstallOn \" pulumi-lang-go=\" installOn \" pulumi-lang-python=\" install_on \" pulumi-lang-yaml=\" installOn \" pulumi-lang-java=\" installOn \"> install_on </span>blocks are documented below.\n"
        },
        "names": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleName:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleName"
          },
          "description": "User-defined name. name blocks are documented below.\n"
        },
        "servicesAndApplications": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplication:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplication"
          },
          "description": "User-defined service and application objects.<span pulumi-lang-nodejs=\" servicesAndApplications \" pulumi-lang-dotnet=\" ServicesAndApplications \" pulumi-lang-go=\" servicesAndApplications \" pulumi-lang-python=\" services_and_applications \" pulumi-lang-yaml=\" servicesAndApplications \" pulumi-lang-java=\" servicesAndApplications \"> services_and_applications </span>blocks are documented below.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleSource:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleSource"
          },
          "description": "User-defined source objects. source blocks are documented below.\n"
        },
        "times": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleTime:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTime"
          },
          "description": "User-defined time. time blocks are documented below.\n"
        },
        "tracks": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrack:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrack"
          },
          "description": "User-defined track actions. track blocks are documented below.\n"
        },
        "vpns": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpn:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpn"
          },
          "description": "User-defined VPN objects. vpn blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "actions",
        "comments",
        "destinations",
        "hitCounts",
        "installOns",
        "names",
        "servicesAndApplications",
        "sources",
        "times",
        "tracks",
        "vpns"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleAction:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleAction": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleActionReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleActionReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleActionReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleActionReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleComment:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleComment": {
      "properties": {
        "conditionType": {
          "type": "string",
          "description": "The condition type.\n"
        },
        "value": {
          "type": "string",
          "description": "The condition match string. Appears only when the value of the 'condition-type' parameter is: 'Equals', 'Starts with', 'Ends with', 'Contains'.\n"
        }
      },
      "type": "object",
      "required": [
        "conditionType",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestination:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestination": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestinationReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestinationReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestinationReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleDestinationReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCount:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCount": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCountReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCountReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCountReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleHitCountReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOn:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOn": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOnReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOnReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOnReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleInstallOnReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleName:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleName": {
      "properties": {
        "conditionType": {
          "type": "string",
          "description": "The condition type.\n"
        },
        "value": {
          "type": "string",
          "description": "The condition match string. Appears only when the value of the 'condition-type' parameter is: 'Equals', 'Starts with', 'Ends with', 'Contains'.\n"
        }
      },
      "type": "object",
      "required": [
        "conditionType",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplication:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplication": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplicationReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplicationReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplicationReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleServicesAndApplicationReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleSource:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleSource": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleSourceReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleSourceReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleSourceReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleSourceReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTime:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTime": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleTimeReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTimeReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTimeReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTimeReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrack:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrack": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrackReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrackReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrackReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleTrackReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpn:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpn": {
      "properties": {
        "negate": {
          "type": "boolean",
          "description": "Shows if the rule is negated.\n"
        },
        "referenceObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpnReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpnReferenceObject"
          },
          "description": "The reference objects.<span pulumi-lang-nodejs=\" referenceObjects \" pulumi-lang-dotnet=\" ReferenceObjects \" pulumi-lang-go=\" referenceObjects \" pulumi-lang-python=\" reference_objects \" pulumi-lang-yaml=\" referenceObjects \" pulumi-lang-java=\" referenceObjects \"> reference_objects </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "negate",
        "referenceObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpnReferenceObject:getManagementBestPracticeUserDefinedFirewallUserDefinedRuleVpnReferenceObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the reference object.\n"
        },
        "referenceObjectType": {
          "type": "string",
          "description": "The type of the reference object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the reference object.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "referenceObjectType",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementBestPracticeUserDefinedGaiaO:getManagementBestPracticeUserDefinedGaiaO": {
      "properties": {
        "expectedOutputBase64": {
          "type": "string",
          "description": "The expected output of the script in the Base64.\n"
        },
        "practiceScriptBase64": {
          "type": "string",
          "description": "The script in Base64 to run on Gaia Security Gateways during the Compliance scans.\n"
        }
      },
      "type": "object",
      "required": [
        "expectedOutputBase64",
        "practiceScriptBase64"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCheckpointHostInterface:getManagementCheckpointHostInterface": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "subnetMask": {
          "type": "string",
          "description": "IPv4 network mask.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "comments",
        "maskLength4",
        "maskLength6",
        "name",
        "subnet4",
        "subnet6",
        "subnetMask"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCloudServicesGatewaysOnboardingSetting:getManagementCloudServicesGatewaysOnboardingSetting": {
      "properties": {
        "connectionMethod": {
          "type": "string",
          "description": "Indicate whether Gateways will be connected to Infinity Portal automatically or only after policy installation.\n"
        },
        "participantGateways": {
          "type": "string",
          "description": "Which Gateways will be connected to Infinity Portal.\n"
        },
        "specificGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of targets identified by Name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "connectionMethod",
        "participantGateways",
        "specificGateways"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementClusterMemberInterface:getManagementClusterMemberInterface": {
      "properties": {
        "ipv4Address": {
          "type": "string"
        },
        "ipv4MaskLength": {
          "type": "number"
        },
        "ipv4NetworkMask": {
          "type": "string"
        },
        "ipv6Address": {
          "type": "string"
        },
        "ipv6MaskLength": {
          "type": "number"
        },
        "ipv6NetworkMask": {
          "type": "string"
        },
        "name": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "ipv4Address",
        "ipv4MaskLength",
        "ipv4NetworkMask",
        "ipv6Address",
        "ipv6MaskLength",
        "ipv6NetworkMask",
        "name",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeAccountsAwsSubAccount:getManagementCmeAccountsAwsSubAccount": {
      "properties": {
        "accessKey": {
          "type": "string",
          "description": "Sub-account access key.\n"
        },
        "credentialsFile": {
          "type": "string",
          "description": "Sub-account credentials file.\n"
        },
        "name": {
          "type": "string",
          "description": "Sub-account name.\n"
        },
        "secretKey": {
          "type": "string",
          "description": "Sub-account secret key.\n"
        },
        "stsExternalId": {
          "type": "string",
          "description": "Sub-account STS external id. Must exist with STS role.\n"
        },
        "stsRole": {
          "type": "string",
          "description": "Sub-account STS role.\n"
        }
      },
      "type": "object",
      "required": [
        "accessKey",
        "credentialsFile",
        "name",
        "secretKey",
        "stsExternalId",
        "stsRole"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeAccountsResult:getManagementCmeAccountsResult": {
      "properties": {
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a GW until its\ndeletion.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n\nNote: To get the full data for each account, use the specific data source of the account platform (checkpoint_management_cme_accounts_<aws/azure/gcp>).\n"
        },
        "gwConfigurations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "A list of Gateway configurations attached to the account.\n"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification.\n"
        },
        "platform": {
          "type": "string",
          "description": "The platform of the account.\n"
        }
      },
      "type": "object",
      "required": [
        "deletionTolerance",
        "domain",
        "gwConfigurations",
        "name",
        "platform"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAwsBlade:getManagementCmeGwConfigurationsAwsBlade": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAwsIdentityAwarenessSetting:getManagementCmeGwConfigurationsAwsIdentityAwarenessSetting": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object",
      "required": [
        "enableCloudguardController",
        "receiveIdentitiesFroms"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAwsRepositoryGatewayScript:getManagementCmeGwConfigurationsAwsRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "Script parameters.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the script.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "parameters",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAzureBlade:getManagementCmeGwConfigurationsAzureBlade": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAzureIdentityAwarenessSetting:getManagementCmeGwConfigurationsAzureIdentityAwarenessSetting": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object",
      "required": [
        "enableCloudguardController",
        "receiveIdentitiesFroms"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAzureRepositoryGatewayScript:getManagementCmeGwConfigurationsAzureRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "Script parameters.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the script.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "parameters",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsGcpBlade:getManagementCmeGwConfigurationsGcpBlade": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsGcpIdentityAwarenessSetting:getManagementCmeGwConfigurationsGcpIdentityAwarenessSetting": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object",
      "required": [
        "enableCloudguardController",
        "receiveIdentitiesFroms"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsGcpRepositoryGatewayScript:getManagementCmeGwConfigurationsGcpRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "Script parameters.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the script.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "parameters",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsResult:getManagementCmeGwConfigurationsResult": {
      "properties": {
        "blades": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsResultBlade:getManagementCmeGwConfigurationsResultBlade"
          },
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "identityAwarenessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsResultIdentityAwarenessSetting:getManagementCmeGwConfigurationsResultIdentityAwarenessSetting"
          },
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The related CME account name associated with the Gateway configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsResultRepositoryGatewayScript:getManagementCmeGwConfigurationsResultRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in the\nscripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if the\nPrimary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\n"
        },
        "sicKey": {
          "type": "string",
          "description": "SIC key for trusted communication between the Management server and the Gateway.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "type": "object",
      "required": [
        "blades",
        "color",
        "communicationWithServersBehindNat",
        "identityAwarenessSettings",
        "name",
        "policy",
        "relatedAccount",
        "repositoryGatewayScripts",
        "sectionName",
        "sendAlertsToServers",
        "sendLogsToBackupServers",
        "sendLogsToServers",
        "sicKey",
        "version",
        "xForwardedFor"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsResultBlade:getManagementCmeGwConfigurationsResultBlade": {
      "properties": {
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade.\n"
        },
        "autonomousThreatPrevention": {
          "type": "boolean",
          "description": "ATP blade.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade.\n"
        },
        "httpsInspection": {
          "type": "boolean",
          "description": "HTTPS Inspection blade.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity Awareness blade.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "IPS blade.\n"
        },
        "ipsecVpn": {
          "type": "boolean",
          "description": "IPsec VPN blade.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade.\n"
        }
      },
      "type": "object",
      "required": [
        "antiBot",
        "antiVirus",
        "applicationControl",
        "autonomousThreatPrevention",
        "contentAwareness",
        "httpsInspection",
        "identityAwareness",
        "ips",
        "ipsecVpn",
        "threatEmulation",
        "urlFiltering",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsResultIdentityAwarenessSetting:getManagementCmeGwConfigurationsResultIdentityAwarenessSetting": {
      "properties": {
        "enableCloudguardController": {
          "type": "boolean",
          "description": "Enable the Web API identity source for CloudGuard Controller.\n"
        },
        "receiveIdentitiesFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of PDP gateway names from which to receive identities through Identity Sharing.\n"
        }
      },
      "type": "object",
      "required": [
        "enableCloudguardController",
        "receiveIdentitiesFroms"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsResultRepositoryGatewayScript:getManagementCmeGwConfigurationsResultRepositoryGatewayScript": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the script.\n"
        },
        "parameters": {
          "type": "string",
          "description": "Script parameters.\n"
        },
        "uid": {
          "type": "string",
          "description": "The UID of the script.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "parameters",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCpTrustedCaCertificateValidFrom:getManagementCpTrustedCaCertificateValidFrom": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCpTrustedCaCertificateValidTo:getManagementCpTrustedCaCertificateValidTo": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCustomTrustedCaCertificateValidFrom:getManagementCustomTrustedCaCertificateValidFrom": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementCustomTrustedCaCertificateValidTo:getManagementCustomTrustedCaCertificateValidTo": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataAccessRoleMachine:getManagementDataAccessRoleMachine": {
      "properties": {
        "baseDn": {
          "type": "string"
        },
        "selections": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "source": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "baseDn",
        "selections",
        "source"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataAccessRoleUser:getManagementDataAccessRoleUser": {
      "properties": {
        "baseDn": {
          "type": "string"
        },
        "selections": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "source": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "baseDn",
        "selections",
        "source"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataAccessRuleUserCheck:getManagementDataAccessRuleUserCheck": {
      "properties": {
        "confirm": {
          "type": "string"
        },
        "customFrequencies": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataAccessRuleUserCheckCustomFrequency:getManagementDataAccessRuleUserCheckCustomFrequency"
          },
          "description": "Custom Frequency blocks are documented below.\n"
        },
        "frequency": {
          "type": "string"
        },
        "interaction": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "confirm",
        "customFrequencies",
        "frequency",
        "interaction"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataAccessRuleUserCheckCustomFrequency:getManagementDataAccessRuleUserCheckCustomFrequency": {
      "properties": {
        "every": {
          "type": "number"
        },
        "unit": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "every",
        "unit"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataAccessRuleVpnDirectional:getManagementDataAccessRuleVpnDirectional": {
      "properties": {
        "from": {
          "type": "string",
          "description": "From VPN community.\n"
        },
        "to": {
          "type": "string",
          "description": "To VPN community.\n"
        }
      },
      "type": "object",
      "required": [
        "from",
        "to"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataCenterContentObject:getManagementDataCenterContentObject": {
      "properties": {
        "additionalProperties": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "dataCenterObject": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "name": {
          "type": "string"
        },
        "nameInDataCenter": {
          "type": "string"
        },
        "typeInDataCenter": {
          "type": "string"
        },
        "uidInDataCenter": {
          "type": "string",
          "description": "Return result matching the unique identifier of the object on the Data Center Server.\n"
        }
      },
      "type": "object",
      "required": [
        "additionalProperties",
        "dataCenterObject",
        "name",
        "nameInDataCenter",
        "typeInDataCenter",
        "uidInDataCenter"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataCenterContentOrder:getManagementDataCenterContentOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementDataCenterObjectAdditionalProperty:getManagementDataCenterObjectAdditionalProperty": {
      "properties": {
        "name": {
          "type": "string"
        },
        "value": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataCenterObjectDataCenter:getManagementDataCenterObjectDataCenter": {
      "properties": {
        "automaticRefresh": {
          "type": "boolean"
        },
        "dataCenterType": {
          "type": "string"
        },
        "name": {
          "type": "string"
        },
        "properties": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterObjectDataCenterProperty:getManagementDataCenterObjectDataCenterProperty"
          }
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "automaticRefresh",
        "dataCenterType",
        "name",
        "properties",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataCenterObjectDataCenterProperty:getManagementDataCenterObjectDataCenterProperty": {
      "properties": {
        "name": {
          "type": "string"
        },
        "value": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataCenterQueryQueryRule:getManagementDataCenterQueryQueryRule": {
      "properties": {
        "key": {
          "type": "string"
        },
        "keyType": {
          "type": "string"
        },
        "values": {
          "type": "array",
          "items": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "key",
        "keyType",
        "values"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataHostHostServer:getManagementDataHostHostServer": {
      "properties": {
        "dnsServer": {
          "type": "boolean",
          "description": "Gets True if this server is a DNS Server.\n"
        },
        "mailServer": {
          "type": "boolean",
          "description": "Gets True if this server is a Mail Server.\n"
        },
        "webServer": {
          "type": "boolean",
          "description": "Gets True if this server is a Web Server.\n"
        },
        "webServerConfigs": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataHostHostServerWebServerConfig:getManagementDataHostHostServerWebServerConfig"
          },
          "description": "Web Server configuration. Web Server configuration blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "dnsServer",
        "mailServer",
        "webServer",
        "webServerConfigs"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataHostHostServerWebServerConfig:getManagementDataHostHostServerWebServerConfig": {
      "properties": {
        "additionalPorts": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server additional ports.\n"
        },
        "applicationEngines": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Application engines of this web server.\n"
        },
        "listenStandardPort": {
          "type": "boolean",
          "description": "\"Whether server listens to standard port.\n"
        },
        "operatingSystem": {
          "type": "string",
          "description": "Operating System.\n"
        },
        "protectedBy": {
          "type": "string",
          "description": "Network object which protects this server identified by the name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "additionalPorts",
        "applicationEngines",
        "listenStandardPort",
        "operatingSystem",
        "protectedBy"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataHostInterface:getManagementDataHostInterface": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "comments",
        "maskLength4",
        "maskLength6",
        "name",
        "subnet4",
        "subnet6"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataThreatIndicatorProfileOverride:getManagementDataThreatIndicatorProfileOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "The indicator's action in this profile.\n"
        },
        "profile": {
          "type": "string",
          "description": "The profile in which to override the indicator's action.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "profile"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataTypeWeightedKeywordsWeightedKeyword:getManagementDataTypeWeightedKeywordsWeightedKeyword": {
      "properties": {
        "keyword": {
          "type": "string",
          "description": "keyword or regular expression to be weighted.\n"
        },
        "maxWeight": {
          "type": "number",
          "description": "Max weight of the expression.\n"
        },
        "regex": {
          "type": "boolean",
          "description": "Determine whether to consider the expression as a regular expression.\n"
        },
        "weight": {
          "type": "number",
          "description": "Weight of the expression.\n"
        }
      },
      "type": "object",
      "required": [
        "keyword",
        "maxWeight",
        "regex",
        "weight"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedAdvancedProperty:getManagementDataVpnCommunityMeshedAdvancedProperty": {
      "properties": {
        "supportIpCompression": {
          "type": "boolean",
          "description": "Indicates whether to support IP compression.\n"
        },
        "useAggressiveMode": {
          "type": "boolean",
          "description": "Indicates whether to use aggressive mode.\n"
        }
      },
      "type": "object",
      "required": [
        "supportIpCompression",
        "useAggressiveMode"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedEncryptedTraffic:getManagementDataVpnCommunityMeshedEncryptedTraffic": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to accept all encrypted traffic.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedGranularEncryption:getManagementDataVpnCommunityMeshedGranularEncryption": {
      "properties": {
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "internalGateway": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "encryptionMethod",
        "encryptionSuite",
        "externalGateway",
        "ikePhase1",
        "ikePhase2",
        "internalGateway"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedOverrideInterface:getManagementDataVpnCommunityMeshedOverrideInterface": {
      "properties": {
        "gateway": {
          "type": "string"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedOverrideInterfaceInterface:getManagementDataVpnCommunityMeshedOverrideInterfaceInterface"
          }
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "interfaces"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedOverrideInterfaceInterface:getManagementDataVpnCommunityMeshedOverrideInterfaceInterface": {
      "properties": {
        "interfaceName": {
          "type": "string"
        },
        "nextHopIp": {
          "type": "string"
        },
        "priority": {
          "type": "number"
        },
        "redundancyMode": {
          "type": "string"
        },
        "staticNatIp": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "interfaceName",
        "nextHopIp",
        "priority",
        "redundancyMode",
        "staticNatIp"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedOverrideVpnDomain:getManagementDataVpnCommunityMeshedOverrideVpnDomain": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant gateway in override VPN domain identified by the name or UID.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN domain network identified by the name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "vpnDomain"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedPermanentTunnel:getManagementDataVpnCommunityMeshedPermanentTunnel": {
      "properties": {
        "gateways": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedPermanentTunnelGateway:getManagementDataVpnCommunityMeshedPermanentTunnelGateway"
          },
          "description": "List of gateways to set all their tunnels to permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to all-tunnels-of-specific-gateways.gateways blocks are documented below.\n"
        },
        "rims": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedPermanentTunnelRim:getManagementDataVpnCommunityMeshedPermanentTunnelRim"
          },
          "description": "Route Injection Mechanism settings.rim blocks are documented below.\n"
        },
        "setPermanentTunnels": {
          "type": "string",
          "description": "Indicates which tunnels to set as permanent.\n"
        },
        "tunnelDownTrack": {
          "type": "string",
          "description": "VPN community permanent tunnels down track option.\n"
        },
        "tunnelUpTrack": {
          "type": "string",
          "description": "Permanent tunnels up track option.\n"
        },
        "tunnels": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedPermanentTunnelTunnel:getManagementDataVpnCommunityMeshedPermanentTunnelTunnel"
          },
          "description": "List of tunnels to set as permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to specific-tunnels-in-the-community.tunnels blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "gateways",
        "rims",
        "setPermanentTunnels",
        "tunnelDownTrack",
        "tunnelUpTrack",
        "tunnels"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedPermanentTunnelGateway:getManagementDataVpnCommunityMeshedPermanentTunnelGateway": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Gateway to set all is tunnels to permanent with specified track options.<br>\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "overrideTunnelDownTrack",
        "overrideTunnelUpTrack",
        "trackOptions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedPermanentTunnelRim:getManagementDataVpnCommunityMeshedPermanentTunnelRim": {
      "properties": {
        "enableOnGateways": {
          "type": "boolean",
          "description": "Indicates whether to enable automatic Route Injection Mechanism for gateways.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether Route Injection Mechanism is enabled.\n"
        },
        "routeInjectionTrack": {
          "type": "string",
          "description": "Route injection track method.\n"
        }
      },
      "type": "object",
      "required": [
        "enableOnGateways",
        "enabled",
        "routeInjectionTrack"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedPermanentTunnelTunnel:getManagementDataVpnCommunityMeshedPermanentTunnelTunnel": {
      "properties": {
        "firstTunnelEndpoint": {
          "type": "string",
          "description": "First tunnel endpoint (center gateway).\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "secondTunnelEndpoint": {
          "type": "string",
          "description": "Second tunnel endpoint (center gateway for meshed VPN community and satellitegateway for star VPN community).\nIdentified by name or UID.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object",
      "required": [
        "firstTunnelEndpoint",
        "overrideTunnelDownTrack",
        "overrideTunnelUpTrack",
        "secondTunnelEndpoint",
        "trackOptions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedSharedSecret:getManagementDataVpnCommunityMeshedSharedSecret": {
      "properties": {
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "Shared secret.\n<span pulumi-lang-nodejs=\"\ngranularEncryptions`\" pulumi-lang-dotnet=\"\nGranularEncryptions`\" pulumi-lang-go=\"\ngranularEncryptions`\" pulumi-lang-python=\"\ngranular_encryptions`\" pulumi-lang-yaml=\"\ngranularEncryptions`\" pulumi-lang-java=\"\ngranularEncryptions`\">\ngranular_encryptions`</span> supports the following:\n\n* `internal-gateway` - Internally managed Check Point gateway identified by name or UID, or 'Any' for all internal-gateways participants in this community.\n"
        }
      },
      "type": "object",
      "required": [
        "externalGateway",
        "sharedSecret"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshedWireMode:getManagementDataVpnCommunityMeshedWireMode": {
      "properties": {
        "allowUninspectedEncryptedRouting": {
          "type": "boolean",
          "description": "Allow members to route uninspected encrypted traffic in VPN routing configurations.\n"
        },
        "allowUninspectedEncryptedTraffic": {
          "type": "boolean",
          "description": "Allow uninspected encrypted traffic between Wire mode interfaces of this Community members.\n"
        }
      },
      "type": "object",
      "required": [
        "allowUninspectedEncryptedRouting",
        "allowUninspectedEncryptedTraffic"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarAdvancedProperty:getManagementDataVpnCommunityStarAdvancedProperty": {
      "properties": {
        "supportIpCompression": {
          "type": "boolean",
          "description": "Indicates whether to support IP compression.\n"
        },
        "useAggressiveMode": {
          "type": "boolean",
          "description": "Indicates whether to use aggressive mode.\n"
        }
      },
      "type": "object",
      "required": [
        "supportIpCompression",
        "useAggressiveMode"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarEncryptedTraffic:getManagementDataVpnCommunityStarEncryptedTraffic": {
      "properties": {
        "communityMembers": {
          "type": "string",
          "description": "Indicates on which community members to accept all encrypted traffic.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to accept all encrypted traffic.\n"
        }
      },
      "type": "object",
      "required": [
        "communityMembers",
        "enabled"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarGranularEncryption:getManagementDataVpnCommunityStarGranularEncryption": {
      "properties": {
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "internalGateway": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "encryptionMethod",
        "encryptionSuite",
        "externalGateway",
        "ikePhase1",
        "ikePhase2",
        "internalGateway"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarMep:getManagementDataVpnCommunityStarMep": {
      "properties": {
        "defaultPriorityRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarMepDefaultPriorityRule:getManagementDataVpnCommunityStarMepDefaultPriorityRule"
          },
          "description": "Priority rule for all satellite gateways. Relevant only if 'entry-point-selection-mechanism' is set to 'manual'.default_priority_rule blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable center gateways as Multiple Entry Points.\n"
        },
        "entryPointFinalSelectionMechanism": {
          "type": "string",
          "description": "The method by which the final entry point gateway will be chosen when the chosen mechanism returns more than one optional entry point.\n"
        },
        "entryPointSelectionMechanism": {
          "type": "string",
          "description": "The method by which the entry point gateway will be chosen from the gateways in the center.\n"
        },
        "exceptionPriorityRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarMepExceptionPriorityRule:getManagementDataVpnCommunityStarMepExceptionPriorityRule"
          },
          "description": "Exception priority rules for specific satellites gateways. Relevant only if 'entry-point-selection-mechanism' is set to 'manual'.exception_priority_rules blocks are documented below.\n"
        },
        "tracking": {
          "type": "string",
          "description": "Tracking option for the MEP.\n"
        }
      },
      "type": "object",
      "required": [
        "defaultPriorityRules",
        "enabled",
        "entryPointFinalSelectionMechanism",
        "entryPointSelectionMechanism",
        "exceptionPriorityRules",
        "tracking"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarMepDefaultPriorityRule:getManagementDataVpnCommunityStarMepDefaultPriorityRule": {
      "properties": {
        "firstPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of first priority center gateways identified by the name or UID.first_priority_center_gateways blocks are documented below.\n"
        },
        "secondPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of second priority center gateways identified by the name or UID.second_priority_center_gateways blocks are documented below.\n"
        },
        "thirdPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of third priority center gateways identified by the name or UID.third_priority_center_gateways blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "firstPriorityCenterGateways",
        "secondPriorityCenterGateways",
        "thirdPriorityCenterGateways"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarMepExceptionPriorityRule:getManagementDataVpnCommunityStarMepExceptionPriorityRule": {
      "properties": {
        "firstPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of first priority center gateways identified by the name or UID.first_priority_center_gateways blocks are documented below.\n"
        },
        "satelliteGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of satellite gateways to apply priority rules on identified by the name or UID.satellite_gateways blocks are documented below.\n"
        },
        "secondPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of second priority center gateways identified by the name or UID.second_priority_center_gateways blocks are documented below.\n"
        },
        "thirdPriorityCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of third priority center gateways identified by the name or UID.third_priority_center_gateways blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "firstPriorityCenterGateways",
        "satelliteGateways",
        "secondPriorityCenterGateways",
        "thirdPriorityCenterGateways"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarOverrideInterface:getManagementDataVpnCommunityStarOverrideInterface": {
      "properties": {
        "gateway": {
          "type": "string"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarOverrideInterfaceInterface:getManagementDataVpnCommunityStarOverrideInterfaceInterface"
          }
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "interfaces"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarOverrideInterfaceInterface:getManagementDataVpnCommunityStarOverrideInterfaceInterface": {
      "properties": {
        "interfaceName": {
          "type": "string"
        },
        "nextHopIp": {
          "type": "string"
        },
        "priority": {
          "type": "number"
        },
        "redundancyMode": {
          "type": "string"
        },
        "staticNatIp": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "interfaceName",
        "nextHopIp",
        "priority",
        "redundancyMode",
        "staticNatIp"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarOverrideVpnDomain:getManagementDataVpnCommunityStarOverrideVpnDomain": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant gateway in override VPN domain identified by the name or UID.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN domain network identified by the name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "vpnDomain"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarPermanentTunnel:getManagementDataVpnCommunityStarPermanentTunnel": {
      "properties": {
        "gateways": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarPermanentTunnelGateway:getManagementDataVpnCommunityStarPermanentTunnelGateway"
          },
          "description": "List of gateways to set all their tunnels to permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to all-tunnels-of-specific-gateways.gateways blocks are documented below.\n"
        },
        "rims": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarPermanentTunnelRim:getManagementDataVpnCommunityStarPermanentTunnelRim"
          },
          "description": "Route Injection Mechanism settings.rim blocks are documented below.\n"
        },
        "setPermanentTunnels": {
          "type": "string",
          "description": "Indicates which tunnels to set as permanent.\n"
        },
        "tunnelDownTrack": {
          "type": "string",
          "description": "VPN community permanent tunnels down track option.\n"
        },
        "tunnelUpTrack": {
          "type": "string",
          "description": "Permanent tunnels up track option.\n"
        },
        "tunnels": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarPermanentTunnelTunnel:getManagementDataVpnCommunityStarPermanentTunnelTunnel"
          },
          "description": "List of tunnels to set as permanent with specified track options. Will take effect only if set-permanent-tunnels-on is set to specific-tunnels-in-the-community.tunnels blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "gateways",
        "rims",
        "setPermanentTunnels",
        "tunnelDownTrack",
        "tunnelUpTrack",
        "tunnels"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarPermanentTunnelGateway:getManagementDataVpnCommunityStarPermanentTunnelGateway": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Gateway to set all is tunnels to permanent with specified track options.<br>\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "overrideTunnelDownTrack",
        "overrideTunnelUpTrack",
        "trackOptions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarPermanentTunnelRim:getManagementDataVpnCommunityStarPermanentTunnelRim": {
      "properties": {
        "enableOnCenterGateways": {
          "type": "boolean",
          "description": "Indicates whether to enable automatic Route Injection Mechanism on center gateways.\n"
        },
        "enableOnSatelliteGateways": {
          "type": "boolean",
          "description": "Indicates whether to enable automatic Route Injection Mechanism on satellite gateways.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether Route Injection Mechanism is enabled.\n"
        },
        "routeInjectionTrack": {
          "type": "string",
          "description": "Route injection track method.\n"
        }
      },
      "type": "object",
      "required": [
        "enableOnCenterGateways",
        "enableOnSatelliteGateways",
        "enabled",
        "routeInjectionTrack"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarPermanentTunnelTunnel:getManagementDataVpnCommunityStarPermanentTunnelTunnel": {
      "properties": {
        "firstTunnelEndpoint": {
          "type": "string",
          "description": "First tunnel endpoint (center gateway).\nIdentified by name or UID.\n"
        },
        "overrideTunnelDownTrack": {
          "type": "string",
          "description": "Gateway tunnel down track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "overrideTunnelUpTrack": {
          "type": "string",
          "description": "Gateway tunnel up track option. Relevant only if the track-options is set to 'override track options'.\n"
        },
        "secondTunnelEndpoint": {
          "type": "string",
          "description": "Second tunnel endpoint (center gateway for meshed VPN community and satellitegateway for star VPN community).\nIdentified by name or UID.\n"
        },
        "trackOptions": {
          "type": "string",
          "description": "Indicates whether to use the community track options or to override track options for the permanent tunnels.\n"
        }
      },
      "type": "object",
      "required": [
        "firstTunnelEndpoint",
        "overrideTunnelDownTrack",
        "overrideTunnelUpTrack",
        "secondTunnelEndpoint",
        "trackOptions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarSharedSecret:getManagementDataVpnCommunityStarSharedSecret": {
      "properties": {
        "externalGateway": {
          "type": "string",
          "description": "Externally managed or 3rd party gateway identified by name or UID.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "Shared secret.\n\n<span pulumi-lang-nodejs=\"\ngranularEncryptions`\" pulumi-lang-dotnet=\"\nGranularEncryptions`\" pulumi-lang-go=\"\ngranularEncryptions`\" pulumi-lang-python=\"\ngranular_encryptions`\" pulumi-lang-yaml=\"\ngranularEncryptions`\" pulumi-lang-java=\"\ngranularEncryptions`\">\ngranular_encryptions`</span> supports the following:\n\n* `internal-gateway` - Internally managed Check Point gateway identified by name or UID, or 'Any' for all internal-gateways participants in this community.\n"
        }
      },
      "type": "object",
      "required": [
        "externalGateway",
        "sharedSecret"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStarWireMode:getManagementDataVpnCommunityStarWireMode": {
      "properties": {
        "allowUninspectedEncryptedRouting": {
          "type": "boolean",
          "description": "Allow members to route uninspected encrypted traffic in VPN routing configurations.\n"
        },
        "allowUninspectedEncryptedTraffic": {
          "type": "boolean",
          "description": "Allow uninspected encrypted traffic between Wire mode interfaces of this Community members.\n"
        }
      },
      "type": "object",
      "required": [
        "allowUninspectedEncryptedRouting",
        "allowUninspectedEncryptedTraffic"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDefaultAdministratorSettingsExpirationDate:getManagementDefaultAdministratorSettingsExpirationDate": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Date and time represented in international ISO 8601 format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Number of milliseconds that have elapsed since 00:00:00, 1 January 1970.\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDomainPermissionsProfileAccessControl:getManagementDomainPermissionsProfileAccessControl": {
      "properties": {
        "accessControlObjectsAndSettings": {
          "type": "string"
        },
        "appControlAndUrlFilteringUpdate": {
          "type": "boolean"
        },
        "dlpPolicy": {
          "type": "string"
        },
        "geoControlPolicy": {
          "type": "string"
        },
        "installPolicy": {
          "type": "boolean"
        },
        "natPolicy": {
          "type": "string"
        },
        "policyLayers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementDomainPermissionsProfileAccessControlPolicyLayer:getManagementDomainPermissionsProfileAccessControlPolicyLayer"
          }
        },
        "qosPolicy": {
          "type": "string"
        },
        "showPolicy": {
          "type": "boolean"
        }
      },
      "type": "object",
      "required": [
        "accessControlObjectsAndSettings",
        "appControlAndUrlFilteringUpdate",
        "dlpPolicy",
        "geoControlPolicy",
        "installPolicy",
        "natPolicy",
        "policyLayers",
        "qosPolicy",
        "showPolicy"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDomainPermissionsProfileAccessControlPolicyLayer:getManagementDomainPermissionsProfileAccessControlPolicyLayer": {
      "properties": {
        "appControlAndUrlFiltering": {
          "type": "boolean"
        },
        "contentAwareness": {
          "type": "boolean"
        },
        "editLayers": {
          "type": "string"
        },
        "firewall": {
          "type": "boolean"
        },
        "mobileAccess": {
          "type": "boolean"
        }
      },
      "type": "object",
      "required": [
        "appControlAndUrlFiltering",
        "contentAwareness",
        "editLayers",
        "firewall",
        "mobileAccess"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementDomainServer:getManagementDomainServer": {
      "properties": {
        "active": {
          "type": "boolean"
        },
        "ipv4Address": {
          "type": "string"
        },
        "ipv6Address": {
          "type": "string"
        },
        "multiDomainServer": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "skipStartDomainServer": {
          "type": "boolean"
        },
        "type": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "active",
        "ipv4Address",
        "ipv6Address",
        "multiDomainServer",
        "name",
        "skipStartDomainServer",
        "type"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGaiaBestPracticeRegulation:getManagementGaiaBestPracticeRegulation": {
      "properties": {
        "regulationName": {
          "type": "string",
          "description": "The name of the regulation.\n"
        },
        "requirementDescription": {
          "type": "string",
          "description": "The description of the requirement.\n"
        },
        "requirementId": {
          "type": "string",
          "description": "The id of the requirement.\n"
        },
        "requirementStatus": {
          "type": "string",
          "description": "The status of the requirement.\n"
        }
      },
      "type": "object",
      "required": [
        "regulationName",
        "requirementDescription",
        "requirementId",
        "requirementStatus"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGaiaBestPracticeRelevantObject:getManagementGaiaBestPracticeRelevantObject": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Determines if the relevant object is enabled or not.\n"
        },
        "name": {
          "type": "string",
          "description": "The name of the relevant object.\n"
        },
        "status": {
          "type": "string",
          "description": "The status of the relevant object.\n"
        },
        "uid": {
          "type": "string",
          "description": "The uid of the relevant object.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "name",
        "status",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedBlade:getManagementGatewayCapabilitiesSupportedBlade": {
      "properties": {
        "managements": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedBladeManagement:getManagementGatewayCapabilitiesSupportedBladeManagement"
          },
          "description": "Management blades.\n"
        },
        "networkSecurities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedBladeNetworkSecurity:getManagementGatewayCapabilitiesSupportedBladeNetworkSecurity"
          },
          "description": "Network Security blades.\n"
        },
        "threatPreventions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedBladeThreatPrevention:getManagementGatewayCapabilitiesSupportedBladeThreatPrevention"
          },
          "description": "Threat Prevention blades.\n"
        }
      },
      "type": "object",
      "required": [
        "managements",
        "networkSecurities",
        "threatPreventions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedBladeManagement:getManagementGatewayCapabilitiesSupportedBladeManagement": {
      "properties": {
        "default": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "name": {
          "type": "string",
          "description": "N/A\n"
        },
        "readonly": {
          "type": "boolean",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "name",
        "readonly"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedBladeNetworkSecurity:getManagementGatewayCapabilitiesSupportedBladeNetworkSecurity": {
      "properties": {
        "default": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "name": {
          "type": "string",
          "description": "N/A\n"
        },
        "readonly": {
          "type": "boolean",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "name",
        "readonly"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedBladeThreatPrevention:getManagementGatewayCapabilitiesSupportedBladeThreatPrevention": {
      "properties": {
        "autonomouses": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedBladeThreatPreventionAutonomouse:getManagementGatewayCapabilitiesSupportedBladeThreatPreventionAutonomouse"
          },
          "description": "N/A\n"
        },
        "customs": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedBladeThreatPreventionCustom:getManagementGatewayCapabilitiesSupportedBladeThreatPreventionCustom"
          },
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "autonomouses",
        "customs"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedBladeThreatPreventionAutonomouse:getManagementGatewayCapabilitiesSupportedBladeThreatPreventionAutonomouse": {
      "properties": {
        "default": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "name": {
          "type": "string",
          "description": "N/A\n"
        },
        "readonly": {
          "type": "boolean",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "name",
        "readonly"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedBladeThreatPreventionCustom:getManagementGatewayCapabilitiesSupportedBladeThreatPreventionCustom": {
      "properties": {
        "default": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "name": {
          "type": "string",
          "description": "N/A\n"
        },
        "readonly": {
          "type": "boolean",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "name",
        "readonly"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedFirmwarePlatform:getManagementGatewayCapabilitiesSupportedFirmwarePlatform": {
      "properties": {
        "default": {
          "type": "string",
          "description": "Default gateway firmware platform.\n* `firmwarePlatforms` - List of gateway firmware platforms.\n"
        },
        "firmwarePlatforms": {
          "type": "array",
          "items": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "default",
        "firmwarePlatforms"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedHardware:getManagementGatewayCapabilitiesSupportedHardware": {
      "properties": {
        "default": {
          "type": "string",
          "description": "Default hardware.\n"
        },
        "hardwares": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of Check Point hardware.\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "hardwares"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedPlatform:getManagementGatewayCapabilitiesSupportedPlatform": {
      "properties": {
        "default": {
          "type": "string",
          "description": "Default platform.\n"
        },
        "platforms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of Check Point gateway platforms.\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "platforms"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGatewayCapabilitiesSupportedVersion:getManagementGatewayCapabilitiesSupportedVersion": {
      "properties": {
        "default": {
          "type": "string",
          "description": "Default gateway platform version.\n"
        },
        "versions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of gateway platform versions.\n"
        }
      },
      "type": "object",
      "required": [
        "default",
        "versions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGlobalDomainGlobalDomainAssignment:getManagementGlobalDomainGlobalDomainAssignment": {
      "properties": {
        "assignmentStatus": {
          "type": "string",
          "description": "The status of the assignment.\n"
        },
        "assignmentUpToDate": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "The time when the assignment was assigned.<span pulumi-lang-nodejs=\" assignmentUpToDate \" pulumi-lang-dotnet=\" AssignmentUpToDate \" pulumi-lang-go=\" assignmentUpToDate \" pulumi-lang-python=\" assignment_up_to_date \" pulumi-lang-yaml=\" assignmentUpToDate \" pulumi-lang-java=\" assignmentUpToDate \"> assignment_up_to_date </span>blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Object color.\n"
        },
        "comments": {
          "type": "string",
          "description": "Coemmnet string.\n"
        },
        "dependentDomain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Dependent domain. Level of details in the output corresponds to the number of details for search. This table shows the level of details in the Standard level.<span pulumi-lang-nodejs=\" dependentDomain \" pulumi-lang-dotnet=\" DependentDomain \" pulumi-lang-go=\" dependentDomain \" pulumi-lang-python=\" dependent_domain \" pulumi-lang-yaml=\" dependentDomain \" pulumi-lang-java=\" dependentDomain \"> dependent_domain </span>blocks are documented below.\n"
        },
        "globalAccessPolicy": {
          "type": "string",
          "description": "Global domain access policy that is assigned to a dependent domain.\n"
        },
        "globalThreatPreventionPolicy": {
          "type": "string",
          "description": "Global domain threat prevention policy that is assigned to a dependent domain.\n"
        },
        "manageProtectionActions": {
          "type": "boolean"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementGlobalDomainGlobalDomainAssignmentTag:getManagementGlobalDomainGlobalDomainAssignmentTag"
          },
          "description": "Collection of tag objects identified by the name or UID.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "assignmentStatus",
        "assignmentUpToDate",
        "color",
        "comments",
        "dependentDomain",
        "globalAccessPolicy",
        "globalThreatPreventionPolicy",
        "manageProtectionActions",
        "name",
        "tags",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGlobalDomainGlobalDomainAssignmentTag:getManagementGlobalDomainGlobalDomainAssignmentTag": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGlobalDomainServer:getManagementGlobalDomainServer": {
      "properties": {
        "active": {
          "type": "boolean",
          "description": "Domain server status.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "multiDomainServer": {
          "type": "string",
          "description": "Multi Domain server name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "skipStartDomainServer": {
          "type": "boolean",
          "description": "Set this value to be true to prevent starting the new created domain.\n"
        },
        "type": {
          "type": "string",
          "description": "Domain server type.\n"
        }
      },
      "type": "object",
      "required": [
        "active",
        "ipv4Address",
        "ipv6Address",
        "multiDomainServer",
        "name",
        "skipStartDomainServer",
        "type"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementGlobalDomainTag:getManagementGlobalDomainTag": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHostsObject:getManagementHostsObject": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Information about the domain that holds the Object. Domain information blocks are documented below.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.\n"
        },
        "hostServers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHostsObjectHostServer:getManagementHostsObjectHostServer"
          },
          "description": "Servers Configuration. Servers Configuration blocks are documented below.\n"
        },
        "icon": {
          "type": "string",
          "description": "Object icon.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHostsObjectInterface:getManagementHostsObjectInterface"
          },
          "description": "Host interfaces. Host interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHostsObjectNatSetting:getManagementHostsObjectNatSetting"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "comments",
        "domain",
        "groups",
        "hostServers",
        "icon",
        "interfaces",
        "ipv4Address",
        "ipv6Address",
        "name",
        "natSettings",
        "tags",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHostsObjectHostServer:getManagementHostsObjectHostServer": {
      "properties": {
        "dnsServer": {
          "type": "boolean",
          "description": "Gets True if this server is a DNS Server.\n"
        },
        "mailServer": {
          "type": "boolean",
          "description": "Gets True if this server is a Mail Server.\n"
        },
        "webServer": {
          "type": "boolean",
          "description": "Gets True if this server is a Web Server.\n"
        },
        "webServerConfigs": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHostsObjectHostServerWebServerConfig:getManagementHostsObjectHostServerWebServerConfig"
          },
          "description": "Web Server configuration. Web Server configuration blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "dnsServer",
        "mailServer",
        "webServer",
        "webServerConfigs"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHostsObjectHostServerWebServerConfig:getManagementHostsObjectHostServerWebServerConfig": {
      "properties": {
        "additionalPorts": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server additional ports.\n"
        },
        "applicationEngines": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Application engines of this web server.\n"
        },
        "listenStandardPort": {
          "type": "boolean",
          "description": "\"Whether server listens to standard port.\n"
        },
        "operatingSystem": {
          "type": "string",
          "description": "Operating System.\n"
        },
        "protectedBy": {
          "type": "string",
          "description": "Network object which protects this server identified by the name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "additionalPorts",
        "applicationEngines",
        "listenStandardPort",
        "operatingSystem",
        "protectedBy"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHostsObjectInterface:getManagementHostsObjectInterface": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "comments",
        "maskLength4",
        "maskLength6",
        "name",
        "subnet4",
        "subnet6"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHostsObjectNatSetting:getManagementHostsObjectNatSetting": {
      "properties": {
        "autoRule": {
          "type": "boolean",
          "description": "Whether to add automatic address translation rules.\n"
        },
        "hideBehind": {
          "type": "string",
          "description": "Hide behind method. This parameter is not required in case \\\"method\\\" parameter is \\\"static\\\".\n"
        },
        "installOn": {
          "type": "string",
          "description": "Which gateway should apply the NAT translation.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "method": {
          "type": "string",
          "description": "NAT translation method.\n"
        }
      },
      "type": "object",
      "required": [
        "autoRule",
        "hideBehind",
        "installOn",
        "ipv4Address",
        "ipv6Address",
        "method"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHostsOrder:getManagementHostsOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementHttpsAdvancedSettingsBlockedCertificate:getManagementHttpsAdvancedSettingsBlockedCertificate": {
      "properties": {
        "certSerialNumber": {
          "type": "string",
          "description": "Certificate Serial Number (unique) in hexadecimal format HH:HH.\n"
        },
        "comments": {
          "type": "string",
          "description": "Describes the certificate by default, can be overridden by any text.\n"
        },
        "name": {
          "type": "string",
          "description": "Describes the name, cannot be overridden.\n"
        }
      },
      "type": "object",
      "required": [
        "certSerialNumber",
        "comments",
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHttpsAdvancedSettingsServerCertificateValidationAction:getManagementHttpsAdvancedSettingsServerCertificateValidationAction": {
      "properties": {
        "blockExpired": {
          "type": "boolean",
          "description": "Set to be true in order to drop traffic from servers with expired server certificate.\n"
        },
        "blockRevoked": {
          "type": "boolean",
          "description": "Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).\n"
        },
        "blockUntrusted": {
          "type": "boolean",
          "description": "Set to be true in order to drop traffic from servers with untrusted server certificate.\n"
        },
        "trackErrors": {
          "type": "string",
          "description": "Whether to log and send a notification for the server validation errors:<br><ul style=\"list-style-type:square\"><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.\n"
        }
      },
      "type": "object",
      "required": [
        "blockExpired",
        "blockRevoked",
        "blockUntrusted",
        "trackErrors"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHttpsRulebaseOrder:getManagementHttpsRulebaseOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementHttpsRulebaseRulebase:getManagementHttpsRulebaseRulebase": {
      "properties": {
        "from": {
          "type": "number"
        },
        "objectsDictionaries": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHttpsRulebaseRulebaseObjectsDictionary:getManagementHttpsRulebaseRulebaseObjectsDictionary"
          }
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHttpsRulebaseRulebaseRulebase:getManagementHttpsRulebaseRulebaseRulebase"
          }
        },
        "to": {
          "type": "number"
        },
        "total": {
          "type": "number"
        }
      },
      "type": "object",
      "required": [
        "from",
        "objectsDictionaries",
        "rulebases",
        "to",
        "total"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHttpsRulebaseRulebaseObjectsDictionary:getManagementHttpsRulebaseRulebaseObjectsDictionary": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHttpsRulebaseRulebaseRulebase:getManagementHttpsRulebaseRulebaseRulebase": {
      "properties": {
        "action": {
          "type": "string"
        },
        "blades": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "certificate": {
          "type": "string"
        },
        "comments": {
          "type": "string"
        },
        "destinationNegate": {
          "type": "boolean"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "enabled": {
          "type": "boolean"
        },
        "from": {
          "type": "number"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "layer": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "ruleNumber": {
          "type": "number"
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementHttpsRulebaseRulebaseRulebaseRulebase:getManagementHttpsRulebaseRulebaseRulebaseRulebase"
          }
        },
        "serviceNegate": {
          "type": "boolean"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "siteCategories": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "siteCategoryNegate": {
          "type": "boolean"
        },
        "sourceNegate": {
          "type": "boolean"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "to": {
          "type": "number"
        },
        "track": {
          "type": "string"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "blades",
        "certificate",
        "comments",
        "destinationNegate",
        "destinations",
        "enabled",
        "from",
        "installOns",
        "layer",
        "name",
        "ruleNumber",
        "rulebases",
        "serviceNegate",
        "services",
        "siteCategories",
        "siteCategoryNegate",
        "sourceNegate",
        "sources",
        "to",
        "track",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementHttpsRulebaseRulebaseRulebaseRulebase:getManagementHttpsRulebaseRulebaseRulebaseRulebase": {
      "properties": {
        "action": {
          "type": "string"
        },
        "blades": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "certificate": {
          "type": "string"
        },
        "comments": {
          "type": "string"
        },
        "destinationNegate": {
          "type": "boolean"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "enabled": {
          "type": "boolean"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "layer": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "ruleNumber": {
          "type": "number"
        },
        "serviceNegate": {
          "type": "boolean"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "siteCategories": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "siteCategoryNegate": {
          "type": "boolean"
        },
        "sourceNegate": {
          "type": "boolean"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "track": {
          "type": "string"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "blades",
        "certificate",
        "comments",
        "destinationNegate",
        "destinations",
        "enabled",
        "installOns",
        "layer",
        "name",
        "ruleNumber",
        "serviceNegate",
        "services",
        "siteCategories",
        "siteCategoryNegate",
        "sourceNegate",
        "sources",
        "track",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementIdpAdministratorGroupPermissionsProfile:getManagementIdpAdministratorGroupPermissionsProfile": {
      "properties": {
        "domain": {
          "type": "string"
        },
        "profile": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "domain",
        "profile"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementIfMapServerAuthentication:getManagementIfMapServerAuthentication": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method for the IF-MAP server.\n"
        },
        "password": {
          "type": "string",
          "description": "Username for the IF-MAP server authentication.\n"
        },
        "username": {
          "type": "string",
          "description": "Username for the IF-MAP server authentication.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "password",
        "username"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementIfMapServerMonitoredIp:getManagementIfMapServerMonitoredIp": {
      "properties": {
        "firstIp": {
          "type": "string",
          "description": "First IPv4 address in the range to be monitored.\n"
        },
        "lastIp": {
          "type": "string",
          "description": "Last IPv4 address in the range to be monitored.\n"
        }
      },
      "type": "object",
      "required": [
        "firstIp",
        "lastIp"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInterfaceAntiSpoofingSetting:getManagementInterfaceAntiSpoofingSetting": {
      "properties": {
        "action": {
          "type": "string",
          "description": "If packets will be rejected (the Prevent option) or whether the packets will be monitored (the Detect option).\n"
        },
        "excludePackets": {
          "type": "boolean",
          "description": "Don't check packets from excluded network.\n"
        },
        "excludedNetworkName": {
          "type": "string",
          "description": "Excluded network name.\n"
        },
        "excludedNetworkUid": {
          "type": "string",
          "description": "Excluded network UID.\n"
        },
        "spoofTracking": {
          "type": "string",
          "description": "Spoof tracking.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "excludePackets",
        "excludedNetworkName",
        "excludedNetworkUid",
        "spoofTracking"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInterfaceClusterMember:getManagementInterfaceClusterMember": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "memberName": {
          "type": "string",
          "description": "Cluster member object name.\n"
        },
        "memberUid": {
          "type": "string",
          "description": "Cluster member object uid.\n"
        },
        "name": {
          "type": "string",
          "description": "Cluster member network interface name.\n"
        },
        "networkMask": {
          "type": "string",
          "description": "IPv4 or IPv6 network mask. If both masks are required use ipv4-network-mask and ipv6-network-mask fields explicitly. Instead of providing mask itself it is possible to specify IPv4 or IPv6 mask length in mask-length field. If both masks length are required use ipv4-mask-length and  ipv6-mask-length fields explicitly.\n"
        }
      },
      "type": "object",
      "required": [
        "ipv4Address",
        "ipv4MaskLength",
        "ipv4NetworkMask",
        "ipv6Address",
        "ipv6MaskLength",
        "ipv6NetworkMask",
        "memberName",
        "memberUid",
        "name",
        "networkMask"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInterfaceSecurityZoneSetting:getManagementInterfaceSecurityZoneSetting": {
      "properties": {
        "autoCalculated": {
          "type": "boolean",
          "description": "Security Zone is calculated according to where the interface leads to.\n"
        },
        "autoCalculatedZone": {
          "type": "string",
          "description": "N/A\n"
        },
        "autoCalculatedZoneUid": {
          "type": "string",
          "description": "N/A\n"
        },
        "specificSecurityZoneEnabled": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "specificZone": {
          "type": "string",
          "description": "Security Zone specified manually.\n"
        },
        "specificZoneUid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "autoCalculated",
        "autoCalculatedZone",
        "autoCalculatedZoneUid",
        "specificSecurityZoneEnabled",
        "specificZone",
        "specificZoneUid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInterfaceTopologySetting:getManagementInterfaceTopologySetting": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        },
        "specificNetworkUid": {
          "type": "string",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "interfaceLeadsToDmz",
        "ipAddressBehindThisInterface",
        "specificNetwork",
        "specificNetworkUid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInterfaceTopologySettingsAutomatic:getManagementInterfaceTopologySettingsAutomatic": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        },
        "specificNetworkUid": {
          "type": "string",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "interfaceLeadsToDmz",
        "ipAddressBehindThisInterface",
        "specificNetwork",
        "specificNetworkUid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInterfaceTopologySettingsManual:getManagementInterfaceTopologySettingsManual": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean",
          "description": "Whether this interface leads to demilitarized zone (perimeter network).\n"
        },
        "ipAddressBehindThisInterface": {
          "type": "string",
          "description": "Network settings behind this interface.\n"
        },
        "specificNetwork": {
          "type": "string",
          "description": "Network behind this interface.\n"
        },
        "specificNetworkUid": {
          "type": "string",
          "description": "N/A\n"
        }
      },
      "type": "object",
      "required": [
        "interfaceLeadsToDmz",
        "ipAddressBehindThisInterface",
        "specificNetwork",
        "specificNetworkUid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInteroperableDeviceGroup:getManagementInteroperableDeviceGroup": {
      "properties": {
        "color": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInteroperableDeviceInterface:getManagementInteroperableDeviceInterface": {
      "properties": {
        "color": {
          "type": "string"
        },
        "comments": {
          "type": "string"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "ignoreErrors": {
          "type": "boolean"
        },
        "ignoreWarnings": {
          "type": "boolean"
        },
        "ipv4Address": {
          "type": "string"
        },
        "ipv4MaskLength": {
          "type": "string"
        },
        "ipv4NetworkMask": {
          "type": "string"
        },
        "ipv6Address": {
          "type": "string"
        },
        "ipv6MaskLength": {
          "type": "string"
        },
        "ipv6NetworkMask": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "topology": {
          "type": "string"
        },
        "topologySettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementInteroperableDeviceInterfaceTopologySetting:getManagementInteroperableDeviceInterfaceTopologySetting"
          }
        }
      },
      "type": "object",
      "required": [
        "color",
        "comments",
        "domainsToProcesses",
        "ignoreErrors",
        "ignoreWarnings",
        "ipv4Address",
        "ipv4MaskLength",
        "ipv4NetworkMask",
        "ipv6Address",
        "ipv6MaskLength",
        "ipv6NetworkMask",
        "name",
        "tags",
        "topology",
        "topologySettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementInteroperableDeviceInterfaceTopologySetting:getManagementInteroperableDeviceInterfaceTopologySetting": {
      "properties": {
        "interfaceLeadsToDmz": {
          "type": "boolean"
        },
        "ipAddressBehindThisInterface": {
          "type": "string"
        },
        "specificNetwork": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "interfaceLeadsToDmz",
        "ipAddressBehindThisInterface",
        "specificNetwork"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementIpsProtectionExtendedAttributeValue:getManagementIpsProtectionExtendedAttributeValue": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementIpsUpdateScheduleRecurrence:getManagementIpsUpdateScheduleRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Valid on specific days. Multiple options, support range of days in months. Example:[\"1\",\"3\",\"9-20\"].\n"
        },
        "minutes": {
          "type": "number",
          "description": "Valid on interval. The length of time in minutes between updates.\n"
        },
        "pattern": {
          "type": "string",
          "description": "Valid on \"Interval\", \"Daily\", \"Weekly\", \"Monthly\" base.\n"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Valid on weekdays. Example: \"Sun\", \"Mon\"...\"Sat\".\n"
        }
      },
      "type": "object",
      "required": [
        "days",
        "minutes",
        "pattern",
        "weekdays"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLogExporterAttachment:getManagementLogExporterAttachment": {
      "properties": {
        "addLinkToLogAttachment": {
          "type": "boolean",
          "description": "Indicates whether to add link to log attachment in SmartView.\n"
        },
        "addLinkToLogDetails": {
          "type": "boolean",
          "description": "Indicates whether to add link to log details in SmartView.\n"
        },
        "addLogAttachmentId": {
          "type": "boolean",
          "description": "Indicates whether to add log attachment ID.\n"
        }
      },
      "type": "object",
      "required": [
        "addLinkToLogAttachment",
        "addLinkToLogDetails",
        "addLogAttachmentId"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLogExporterDataManipulation:getManagementLogExporterDataManipulation": {
      "properties": {
        "aggregateLogUpdates": {
          "type": "boolean",
          "description": "Indicates whether to aggregate log updates.\n"
        },
        "format": {
          "type": "string",
          "description": "Logs format.\n"
        }
      },
      "type": "object",
      "required": [
        "aggregateLogUpdates",
        "format"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterDynamicObject:getManagementLsmClusterDynamicObject": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "resolvedIpAddresses": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterDynamicObjectResolvedIpAddress:getManagementLsmClusterDynamicObjectResolvedIpAddress"
          },
          "description": "Single IP-address or a range of addresses.resolved_ip_addresses blocks are documented below.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object uid.\n"
        }
      },
      "type": "object",
      "required": [
        "comments",
        "name",
        "resolvedIpAddresses",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterDynamicObjectResolvedIpAddress:getManagementLsmClusterDynamicObjectResolvedIpAddress": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address.\n"
        },
        "ipv4AddressRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange:getManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange"
          },
          "description": "IPv4 Address range.ipv4_address_range blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "ipv4Address",
        "ipv4AddressRanges"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange:getManagementLsmClusterDynamicObjectResolvedIpAddressIpv4AddressRange": {
      "properties": {
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object",
      "required": [
        "fromIpv4Address",
        "toIpv4Address"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterInterface:getManagementLsmClusterInterface": {
      "properties": {
        "clusterIpAddressOverride": {
          "type": "string",
          "description": "IP address override. Net mask is defined by the attached LSM profile.\n"
        },
        "ipAddressOverride": {
          "type": "string",
          "description": "IP address override. Net mask is defined by the attached LSM profile.\n"
        },
        "memberNetworkOverride": {
          "type": "string",
          "description": "Member network override. Net mask is defined by the attached LSM profile.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name. \n* `ip-address-override` Cluster IP address override.\n"
        },
        "newName": {
          "type": "string",
          "description": "New name. Overrides the interface name on profile.\n"
        }
      },
      "type": "object",
      "required": [
        "clusterIpAddressOverride",
        "newName"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterMember:getManagementLsmClusterMember": {
      "properties": {
        "deviceId": {
          "type": "string",
          "description": "Device ID.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterMemberInterface:getManagementLsmClusterMemberInterface"
          },
          "description": "Interfaces.interfaces blocks are documented below.\n"
        },
        "mainIpAddress": {
          "type": "string",
          "description": "Main IP address.\n"
        },
        "memberName": {
          "type": "string"
        },
        "memberUid": {
          "type": "string"
        },
        "provisioningSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterMemberProvisioningSetting:getManagementLsmClusterMemberProvisioningSetting"
          },
          "description": "Provisioning settings. This field is relevant just for SMB clusters.provisioning_settings blocks are documented below.\n"
        },
        "provisioningState": {
          "type": "string",
          "description": "Provisioning state. This field is relevant just for SMB clusters. By default the state is 'manual'- enable provisioning but not attach to profile.If 'using-profile' state is provided a provisioning profile must be provided in provisioning-settings.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Secure Internal Communication name.\n"
        },
        "sicState": {
          "type": "string",
          "description": "Secure Internal Communication state.\n"
        }
      },
      "type": "object",
      "required": [
        "deviceId",
        "interfaces",
        "mainIpAddress",
        "memberName",
        "memberUid",
        "provisioningSettings",
        "provisioningState",
        "sicName",
        "sicState"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterMemberInterface:getManagementLsmClusterMemberInterface": {
      "properties": {
        "ipAddress": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Interface name. \n* `ip-address-override` Cluster IP address override.\n"
        }
      },
      "type": "object",
      "required": [
        "ipAddress",
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterMemberProvisioningSetting:getManagementLsmClusterMemberProvisioningSetting": {
      "properties": {
        "provisioningProfile": {
          "type": "string",
          "description": "Provisioning profile.\n"
        }
      },
      "type": "object",
      "required": [
        "provisioningProfile"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileAdvancedSetting:getManagementLsmClusterProfileAdvancedSetting": {
      "properties": {
        "connectionPersistence": {
          "type": "string"
        },
        "sams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileAdvancedSettingSam:getManagementLsmClusterProfileAdvancedSettingSam"
          }
        }
      },
      "type": "object",
      "required": [
        "connectionPersistence",
        "sams"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileAdvancedSettingSam:getManagementLsmClusterProfileAdvancedSettingSam": {
      "properties": {
        "forwardToOtherSamServers": {
          "type": "boolean"
        },
        "purgeSamFile": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "useEarlyVersions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "forwardToOtherSamServers",
        "purgeSamFile",
        "useEarlyVersions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileApplicationControlAndUrlFilteringSetting:getManagementLsmClusterProfileApplicationControlAndUrlFilteringSetting": {
      "properties": {
        "globalSettingsMode": {
          "type": "string"
        },
        "overrideGlobalSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "globalSettingsMode",
        "overrideGlobalSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileClusterInterface:getManagementLsmClusterProfileClusterInterface": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "networkAddress": {
          "type": "string"
        },
        "networkMask": {
          "type": "string"
        },
        "networkType": {
          "type": "string"
        },
        "topology": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "name",
        "networkAddress",
        "networkMask",
        "networkType",
        "topology"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileClusterMember:getManagementLsmClusterProfileClusterMember": {
      "properties": {
        "comments": {
          "type": "string"
        },
        "ipAddress": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "comments",
        "ipAddress",
        "name",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileGroup:getManagementLsmClusterProfileGroup": {
      "properties": {
        "color": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterProfileHttpsInspection:getManagementLsmClusterProfileHttpsInspection": {
      "properties": {
        "bypassOnFailure": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "denyExpiredServerCert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "denyRevokedServerCert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "denyUntrustedServerCert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "siteCategorizationAllowMode": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "bypassOnFailure",
        "denyExpiredServerCert",
        "denyRevokedServerCert",
        "denyUntrustedServerCert",
        "siteCategorizationAllowMode"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterTopology:getManagementLsmClusterTopology": {
      "properties": {
        "manualVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterTopologyManualVpnDomain:getManagementLsmClusterTopologyManualVpnDomain"
          },
          "description": "A list of IP-addresses ranges, defined the VPN community network.\nThis field is relevant only when 'manual' option of vpn-domain is checked.manual_vpn_domain blocks are documented below.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN Domain type.\n'external-interfaces-only' is relevnt only for Gaia devices.\n'hide-behind-gateway-external-ip-address' is relevant only for SMB devices.\n"
        }
      },
      "type": "object",
      "required": [
        "manualVpnDomains",
        "vpnDomain"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmClusterTopologyManualVpnDomain:getManagementLsmClusterTopologyManualVpnDomain": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object",
      "required": [
        "comments",
        "fromIpv4Address",
        "toIpv4Address"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayDynamicObject:getManagementLsmGatewayDynamicObject": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "resolvedIpAddresses": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayDynamicObjectResolvedIpAddress:getManagementLsmGatewayDynamicObjectResolvedIpAddress"
          },
          "description": "Single IP-address or a range of addresses.resolved_ip_addresses blocks are documented below.\n"
        },
        "uid": {
          "type": "string",
          "description": "Dynamic Object UID.\n"
        }
      },
      "type": "object",
      "required": [
        "comments",
        "name",
        "resolvedIpAddresses",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayDynamicObjectResolvedIpAddress:getManagementLsmGatewayDynamicObjectResolvedIpAddress": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 Address.\n"
        },
        "ipv4AddressRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange:getManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange"
          },
          "description": "IPv4 Address range.ipv4_address_range blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "ipv4Address",
        "ipv4AddressRanges"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange:getManagementLsmGatewayDynamicObjectResolvedIpAddressIpv4AddressRange": {
      "properties": {
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object",
      "required": [
        "fromIpv4Address",
        "toIpv4Address"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayProfileAdvancedSetting:getManagementLsmGatewayProfileAdvancedSetting": {
      "properties": {
        "connectionPersistence": {
          "type": "string"
        },
        "sams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayProfileAdvancedSettingSam:getManagementLsmGatewayProfileAdvancedSettingSam"
          }
        }
      },
      "type": "object",
      "required": [
        "connectionPersistence",
        "sams"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayProfileAdvancedSettingSam:getManagementLsmGatewayProfileAdvancedSettingSam": {
      "properties": {
        "forwardToOtherSamServers": {
          "type": "boolean"
        },
        "purgeSamFile": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "useEarlyVersions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "forwardToOtherSamServers",
        "purgeSamFile",
        "useEarlyVersions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayProfileApplicationControlAndUrlFilteringSetting:getManagementLsmGatewayProfileApplicationControlAndUrlFilteringSetting": {
      "properties": {
        "globalSettingsMode": {
          "type": "string"
        },
        "overrideGlobalSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "globalSettingsMode",
        "overrideGlobalSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayProfileGroup:getManagementLsmGatewayProfileGroup": {
      "properties": {
        "color": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayProfileHttpsInspection:getManagementLsmGatewayProfileHttpsInspection": {
      "properties": {
        "bypassOnFailure": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "denyExpiredServerCert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "denyRevokedServerCert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "denyUntrustedServerCert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "siteCategorizationAllowMode": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "bypassOnFailure",
        "denyExpiredServerCert",
        "denyRevokedServerCert",
        "denyUntrustedServerCert",
        "siteCategorizationAllowMode"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayTopology:getManagementLsmGatewayTopology": {
      "properties": {
        "manualVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayTopologyManualVpnDomain:getManagementLsmGatewayTopologyManualVpnDomain"
          },
          "description": "A list of IP-addresses ranges, defined the VPN community network.\nThis field is relevant only when 'manual' option of vpn-domain is checked.manual_vpn_domain blocks are documented below.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN Domain type.\n'external-interfaces-only' is relevnt only for Gaia devices.\n'hide-behind-gateway-external-ip-address' is relevant only for SMB devices.\n"
        }
      },
      "type": "object",
      "required": [
        "manualVpnDomains",
        "vpnDomain"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementLsmGatewayTopologyManualVpnDomain:getManagementLsmGatewayTopologyManualVpnDomain": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "fromIpv4Address": {
          "type": "string",
          "description": "First IPv4 address of the IP address range.\n"
        },
        "toIpv4Address": {
          "type": "string",
          "description": "Last IPv4 address of the IP address range.\n"
        }
      },
      "type": "object",
      "required": [
        "comments",
        "fromIpv4Address",
        "toIpv4Address"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementMobileProfileApplication:getManagementMobileProfileApplication": {
      "properties": {
        "allowCachingDocsecCredentials": {
          "type": "boolean",
          "description": "Allow store encrypted document credentials in application secure storage.\n"
        },
        "allowCachingDocsecKeys": {
          "type": "boolean",
          "description": "Allow store encrypted document keys in application secure storage.\n"
        },
        "allowCalendarSync": {
          "type": "boolean",
          "description": "Allow synchronization between business calendar to device calendar.\n"
        },
        "allowContactsFromGlobalAddressList": {
          "type": "boolean",
          "description": "Allow to add additional contacts from Global Address List to the app.\n"
        },
        "allowContactsFromLocalPhone": {
          "type": "boolean",
          "description": "Allow to add additional contacts from local phone to the app.\n"
        },
        "allowPushNotification": {
          "type": "boolean",
          "description": "Allow to receive push notifications of mails and meetings.\n"
        },
        "calendarFromTheLast": {
          "type": "number",
          "description": "How far back to see your Calendar from the current date - you can choose a unit (day, week, month) in \"calendar-from-the-last-unit\" field.\n"
        },
        "calendarFromTheLastUnit": {
          "type": "string",
          "description": "Unit for \"calendar-from-the-last\" numeric value.\n"
        },
        "calendarToTheFollowing": {
          "type": "number",
          "description": "How much ahead to see your Calendar from the current date - you can choose a unit (day, week, month) in \"calendar-to-the-following-unit\" field.\n"
        },
        "calendarToTheFollowingUnit": {
          "type": "string",
          "description": "Unit for \"calendar-to-the-following\" numeric value.\n"
        },
        "enablePrintMails": {
          "type": "boolean",
          "description": "Allow to print mails.\n"
        },
        "mailFromTheLast": {
          "type": "number",
          "description": "How far back to see your emails from the current date - choose a unit (day, week, month) in \"mail-from-the-last-unit\" field.\n"
        },
        "mailFromTheLastUnit": {
          "type": "string",
          "description": "Unit for \"mail-from-the-last\" numeric value.\n"
        },
        "maxAttachmentsSize": {
          "type": "number",
          "description": "Maximum size of attachments allowed for downloading -  you can choose a unit (gbs, kbs, mbs, bytes) in \"max-attachments-unit\" field.\n"
        },
        "saveLocalWebCache": {
          "type": "boolean",
          "description": "Configure whether local cache data generated by web browser should be preserved.\n"
        },
        "synchronizeContacts": {
          "type": "string",
          "description": "Contacts synchronization method - from the mail server to device and the app and vice versa or from the mail server to device and the app or from the mail server to the app.\n"
        }
      },
      "type": "object",
      "required": [
        "allowCachingDocsecCredentials",
        "allowCachingDocsecKeys",
        "allowCalendarSync",
        "allowContactsFromGlobalAddressList",
        "allowContactsFromLocalPhone",
        "allowPushNotification",
        "calendarFromTheLast",
        "calendarFromTheLastUnit",
        "calendarToTheFollowing",
        "calendarToTheFollowingUnit",
        "enablePrintMails",
        "mailFromTheLast",
        "mailFromTheLastUnit",
        "maxAttachmentsSize",
        "saveLocalWebCache",
        "synchronizeContacts"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementMobileProfileClientCustomization:getManagementMobileProfileClientCustomization": {
      "properties": {
        "allowCalendar": {
          "type": "boolean",
          "description": "Allow sync business calendar to device calendar.\n"
        },
        "allowContacts": {
          "type": "boolean",
          "description": "Enable/Disable contacts app.\n"
        },
        "allowMail": {
          "type": "boolean",
          "description": "Enable/Disable email app.\n"
        },
        "allowNotesSync": {
          "type": "boolean",
          "description": "Allow sync business notes to device notes.\n"
        },
        "allowSavedFileApps": {
          "type": "boolean",
          "description": "Allow the appearance of 'Saved file app' in the app list.\n"
        },
        "allowSecureChat": {
          "type": "boolean",
          "description": "Enable/Disable Messages app (depends on Mail app).\n"
        },
        "allowTasks": {
          "type": "boolean",
          "description": "Enable/Disable Tasks app.\n"
        },
        "appThemeColorDark": {
          "type": "string",
          "description": "Configure the application display colors in Dark mode. 6 hex digits that define RGB color - relevant for IOS.\n"
        },
        "appThemeColorLight": {
          "type": "string",
          "description": "Configure the application display colors in light mode. 6 hex digits that define RGB color - relevant for IOS.\n"
        },
        "certificateExpireMessage": {
          "type": "string",
          "description": "message to show users when certificate is expired - for admin to fill - can contain only English characters, digits, comma, spaces and points.\n"
        }
      },
      "type": "object",
      "required": [
        "allowCalendar",
        "allowContacts",
        "allowMail",
        "allowNotesSync",
        "allowSavedFileApps",
        "allowSecureChat",
        "allowTasks",
        "appThemeColorDark",
        "appThemeColorLight",
        "certificateExpireMessage"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementMobileProfileDataLeakPrevention:getManagementMobileProfileDataLeakPrevention": {
      "properties": {
        "acceptProtectedFileExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Accept protected files with these extensions from external apps to your app.accept_protected_file_extensions blocks are documented below.\n"
        },
        "acceptUnprotectedFileExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Accept unprotected files with these extensions from external apps to your app.accept_unprotected_file_extensions blocks are documented below.\n"
        },
        "allowCopyPaste": {
          "type": "boolean",
          "description": "Allow copy paste of mail content.\n"
        },
        "allowImportFromGallery": {
          "type": "boolean",
          "description": "Allow import media from gallery.\n"
        },
        "allowTakingPhotosAndVideos": {
          "type": "boolean",
          "description": "Allow the camera to be used from your app.\n"
        },
        "allowedDomainsForwardAttachment": {
          "type": "string",
          "description": "exclusion of domains which attachments are allowed to be sent, even that shared policy prevents sharing these kinds of attached files - can contain only English characters, digits, comma, spaces and points.\n"
        },
        "blockForwardAttachments": {
          "type": "boolean",
          "description": "Allow share mail attachments with external mails.\n"
        },
        "blockScreenshot": {
          "type": "boolean",
          "description": "If true - you can't make a screenshot from your app.\n"
        },
        "offerCapsuleAsViewer": {
          "type": "boolean",
          "description": "Offer Capsule as a viewer for external protected documents.\n"
        },
        "openExtensionWithExternalApps": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Open the following extensions from your app with external apps when they cannot be opened with Capsule viewer.open_extension_with_external_app blocks are documented below.\n"
        },
        "shareProtectedExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Share protected files extensions to external apps.share_protected_extension blocks are documented below.\n"
        },
        "shareUnprotectedExtensions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Share unprotected files extensions to external apps.share_unprotected_extension blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "acceptProtectedFileExtensions",
        "acceptUnprotectedFileExtensions",
        "allowCopyPaste",
        "allowImportFromGallery",
        "allowTakingPhotosAndVideos",
        "allowedDomainsForwardAttachment",
        "blockForwardAttachments",
        "blockScreenshot",
        "offerCapsuleAsViewer",
        "openExtensionWithExternalApps",
        "shareProtectedExtensions",
        "shareUnprotectedExtensions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementMobileProfileHarmonyMobile:getManagementMobileProfileHarmonyMobile": {
      "properties": {
        "compromisedBehavior": {
          "type": "string",
          "description": "Device configuration - response to malicious behavior (configuration for Harmony SDK).\n"
        },
        "enableHarmonyMobileSdk": {
          "type": "boolean",
          "description": "Enable/disable Harmony SDK - cannot be enable if Harmony Mobile Application is enable.\n"
        },
        "harmonyMobileSdkLicense": {
          "type": "string",
          "description": "License for Harmony Mobile Sdk (configuration for Harmony SDK) - can contain only English characters, digits, comma, spaces and point.\n"
        },
        "malwareBehavior": {
          "type": "string",
          "description": "Behavior when App is identified as malicious (configuration for Harmony SDK).\n"
        },
        "manInTheMiddleAttack": {
          "type": "string",
          "description": "Behavior when there is a network man-in-the-middle attack (configuration for Harmony SDK).\n"
        },
        "osIntegrityCompromised": {
          "type": "string",
          "description": "Behavior when Device OS is compromised (configuration for Harmony SDK).\n"
        },
        "protectHighRiskAction": {
          "type": "string",
          "description": "What is the action if there is high risk found by Harmony Mobile.\n"
        },
        "protectHighRiskMessage": {
          "type": "string",
          "description": "The message can contain only English characters, digits, comma, spaces and points.\n"
        },
        "protectMediumRiskAction": {
          "type": "string",
          "description": "What is the action if there is medium risk found by Harmony Mobile.\n"
        },
        "protectMediumRiskMessage": {
          "type": "string",
          "description": "The message can contain only English characters, digits, comma, spaces and points.\n"
        },
        "protectNotActivatedAction": {
          "type": "string",
          "description": "What is the action if there is policy violation (configuration for Harmony Mobile).\n"
        },
        "protectNotActivatedMessage": {
          "type": "string",
          "description": "The message can contain only English characters, digits, comma, spaces and points.\n"
        },
        "protectPolicyEnabled": {
          "type": "boolean",
          "description": "Enable/disable Protect Application- cannot be enable if Harmony SDK is enable.\n"
        },
        "suspiciousApp": {
          "type": "string",
          "description": "Behavior when App is suspected as malicious (configuration for Harmony SDK).\n"
        },
        "suspiciousEnterpriseCertificate": {
          "type": "string",
          "description": "Behavior when a certificate profile has been installed allowing the installing of apps on device from unknown source - iOS only (configuration for Harmony SDK).\n"
        }
      },
      "type": "object",
      "required": [
        "compromisedBehavior",
        "enableHarmonyMobileSdk",
        "harmonyMobileSdkLicense",
        "malwareBehavior",
        "manInTheMiddleAttack",
        "osIntegrityCompromised",
        "protectHighRiskAction",
        "protectHighRiskMessage",
        "protectMediumRiskAction",
        "protectMediumRiskMessage",
        "protectNotActivatedAction",
        "protectNotActivatedMessage",
        "protectPolicyEnabled",
        "suspiciousApp",
        "suspiciousEnterpriseCertificate"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementMobileProfileSecurity:getManagementMobileProfileSecurity": {
      "properties": {
        "activatePasscodeLock": {
          "type": "boolean",
          "description": "Require passcode to the application.\n"
        },
        "allowStoreCredentials": {
          "type": "boolean",
          "description": "Allow storing the credentials on the device.\n"
        },
        "block3rdPartyKeyboard": {
          "type": "boolean",
          "description": "Block 3rd party keyboard.\n"
        },
        "blockJailbroken": {
          "type": "string",
          "description": "Action upon detection of jail broken devices.\n"
        },
        "hideSslConnectAnywayButton": {
          "type": "boolean",
          "description": "Hide connect button on critical SSL trust failures.\n"
        },
        "passcodeProfile": {
          "type": "string",
          "description": "Passcode Policy object identified by the name.\n"
        },
        "reportJailbroken": {
          "type": "boolean",
          "description": "Issue log when device is detected as jail broken.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Session timeout - you can choose a unit (day, week, month) in \"session-timeout-unit\" field.\n"
        },
        "sessionTimeoutUnit": {
          "type": "string",
          "description": "Unit for \"session-timeout\" numeric value.\n"
        }
      },
      "type": "object",
      "required": [
        "activatePasscodeLock",
        "allowStoreCredentials",
        "block3rdPartyKeyboard",
        "blockJailbroken",
        "hideSslConnectAnywayButton",
        "passcodeProfile",
        "reportJailbroken",
        "sessionTimeout",
        "sessionTimeoutUnit"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNatRulebaseOrder:getManagementNatRulebaseOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementNatRulebaseRulebase:getManagementNatRulebaseRulebase": {
      "properties": {
        "from": {
          "type": "number"
        },
        "objectsDictionaries": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementNatRulebaseRulebaseObjectsDictionary:getManagementNatRulebaseRulebaseObjectsDictionary"
          }
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementNatRulebaseRulebaseRulebase:getManagementNatRulebaseRulebaseRulebase"
          }
        },
        "to": {
          "type": "number"
        },
        "total": {
          "type": "number"
        }
      },
      "type": "object",
      "required": [
        "from",
        "objectsDictionaries",
        "rulebases",
        "to",
        "total"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNatRulebaseRulebaseObjectsDictionary:getManagementNatRulebaseRulebaseObjectsDictionary": {
      "properties": {
        "name": {
          "type": "string"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNatRulebaseRulebaseRulebase:getManagementNatRulebaseRulebaseRulebase": {
      "properties": {
        "autoGenerated": {
          "type": "boolean"
        },
        "comments": {
          "type": "string"
        },
        "enabled": {
          "type": "boolean"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "method": {
          "type": "string"
        },
        "name": {
          "type": "string"
        },
        "originalDestination": {
          "type": "string"
        },
        "originalService": {
          "type": "string"
        },
        "originalSource": {
          "type": "string"
        },
        "ruleNumber": {
          "type": "number"
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementNatRulebaseRulebaseRulebaseRulebase:getManagementNatRulebaseRulebaseRulebaseRulebase"
          }
        },
        "translatedDestination": {
          "type": "string"
        },
        "translatedService": {
          "type": "string"
        },
        "translatedSource": {
          "type": "string"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "autoGenerated",
        "comments",
        "enabled",
        "installOns",
        "method",
        "name",
        "originalDestination",
        "originalService",
        "originalSource",
        "ruleNumber",
        "rulebases",
        "translatedDestination",
        "translatedService",
        "translatedSource",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNatRulebaseRulebaseRulebaseRulebase:getManagementNatRulebaseRulebaseRulebaseRulebase": {
      "properties": {
        "autoGenerated": {
          "type": "boolean"
        },
        "comments": {
          "type": "string"
        },
        "enabled": {
          "type": "boolean"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "method": {
          "type": "string"
        },
        "name": {
          "type": "string"
        },
        "originalDestination": {
          "type": "string"
        },
        "originalService": {
          "type": "string"
        },
        "originalSource": {
          "type": "string"
        },
        "ruleNumber": {
          "type": "number"
        },
        "translatedDestination": {
          "type": "string"
        },
        "translatedService": {
          "type": "string"
        },
        "translatedSource": {
          "type": "string"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "autoGenerated",
        "comments",
        "enabled",
        "installOns",
        "method",
        "name",
        "originalDestination",
        "originalService",
        "originalSource",
        "ruleNumber",
        "translatedDestination",
        "translatedService",
        "translatedSource",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNetworkFeedCustomHeader:getManagementNetworkFeedCustomHeader": {
      "properties": {
        "headerName": {
          "type": "string"
        },
        "headerValue": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "headerName",
        "headerValue"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNetworksObject:getManagementNetworksObject": {
      "properties": {
        "broadcast": {
          "type": "string",
          "description": "Allow broadcast address inclusion.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Information about the domain that holds the Object. domain blocks are documented below.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.\n"
        },
        "icon": {
          "type": "string",
          "description": "Object icon.\n"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.<span pulumi-lang-nodejs=\" natSettings \" pulumi-lang-dotnet=\" NatSettings \" pulumi-lang-go=\" natSettings \" pulumi-lang-python=\" nat_settings \" pulumi-lang-yaml=\" natSettings \" pulumi-lang-java=\" natSettings \"> nat_settings </span>blocks are documented below.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "subnetMask": {
          "type": "string",
          "description": "IPv4 network mask.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "broadcast",
        "color",
        "comments",
        "domain",
        "groups",
        "icon",
        "maskLength4",
        "maskLength6",
        "name",
        "natSettings",
        "subnet4",
        "subnet6",
        "subnetMask",
        "tags",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementNetworksOrder:getManagementNetworksOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementNutanixDataCenterServerProperty:getManagementNutanixDataCenterServerProperty": {
      "properties": {
        "name": {
          "type": "string"
        },
        "value": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementObjectsObject:getManagementObjectsObject": {
      "properties": {
        "color": {
          "type": "string"
        },
        "name": {
          "type": "string"
        },
        "type": {
          "type": "string",
          "description": "The objects' type, e.g.: host, service-tcp, network, address-range...\n"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementObjectsOrder:getManagementObjectsOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollment:getManagementOpsecTrustedCaAutomaticEnrollment": {
      "properties": {
        "automaticallyEnrollCertificate": {
          "type": "boolean",
          "description": "Whether to automatically enroll certificate.\n"
        },
        "cmpv1Settings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Setting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Setting"
          },
          "description": "Cmpv1 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".cmpv1_settings blocks are documented below.\n"
        },
        "cmpv2Settings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Setting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Setting"
          },
          "description": "Cmpv2 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".cmpv2_settings blocks are documented below.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Protocol that communicates with the certificate authority. Available only if \"automatically-enroll-certificate\" parameter is set to true.\n"
        },
        "scepSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollmentScepSetting:getManagementOpsecTrustedCaAutomaticEnrollmentScepSetting"
          },
          "description": "Scep protocol settings. Available only if \"protocol\" is set to \"scep\".scep_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "automaticallyEnrollCertificate",
        "cmpv1Settings",
        "cmpv2Settings",
        "protocol",
        "scepSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Setting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv1Setting": {
      "properties": {
        "directTcpSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting"
          },
          "description": "Direct tcp transport layer settings.direct_tcp_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "directTcpSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "IP Address\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object",
      "required": [
        "ipAddress",
        "port"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Setting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2Setting": {
      "properties": {
        "directTcpSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting"
          },
          "description": "Direct tcp transport layer settings.direct_tcp_settings blocks are documented below.\n"
        },
        "httpSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingHttpSetting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingHttpSetting"
          },
          "description": "Http transport layer settings.http_settings blocks are documented below.\n"
        },
        "transportLayer": {
          "type": "string",
          "description": "Transport layer.\n"
        }
      },
      "type": "object",
      "required": [
        "directTcpSettings",
        "httpSettings",
        "transportLayer"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting": {
      "properties": {
        "ipAddress": {
          "type": "string",
          "description": "IP Address\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object",
      "required": [
        "ipAddress",
        "port"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingHttpSetting:getManagementOpsecTrustedCaAutomaticEnrollmentCmpv2SettingHttpSetting": {
      "properties": {
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object",
      "required": [
        "url"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCaAutomaticEnrollmentScepSetting:getManagementOpsecTrustedCaAutomaticEnrollmentScepSetting": {
      "properties": {
        "caIdentifier": {
          "type": "string",
          "description": "Certificate authority identifier.\n"
        },
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object",
      "required": [
        "caIdentifier",
        "url"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementOracleCloudDataCenterServerProperty:getManagementOracleCloudDataCenterServerProperty": {
      "properties": {
        "name": {
          "type": "string"
        },
        "value": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementProvisioningProfileGroup:getManagementProvisioningProfileGroup": {
      "properties": {
        "color": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "color",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementProvisioningProfileHost:getManagementProvisioningProfileHost": {
      "properties": {
        "hosts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementProvisioningProfileHostHost:getManagementProvisioningProfileHostHost"
          }
        },
        "manageSettings": {
          "type": "string"
        },
        "overrideSettings": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "hosts",
        "manageSettings",
        "overrideSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementProvisioningProfileHostHost:getManagementProvisioningProfileHostHost": {
      "properties": {
        "hostIpAddress": {
          "type": "string"
        },
        "hostName": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "hostIpAddress",
        "hostName"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementProvisioningProfileHotspot:getManagementProvisioningProfileHotspot": {
      "properties": {
        "allowUsersFromSpecificGroup": {
          "type": "boolean"
        },
        "allowedUsersGroups": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "displayTermsOfUse": {
          "type": "boolean"
        },
        "enabled": {
          "type": "boolean"
        },
        "manageSettings": {
          "type": "string"
        },
        "overrideSettings": {
          "type": "string"
        },
        "portalMessage": {
          "type": "string"
        },
        "portalTitle": {
          "type": "string"
        },
        "requireAuthentication": {
          "type": "boolean"
        },
        "termsOfUse": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "allowUsersFromSpecificGroup",
        "allowedUsersGroups",
        "displayTermsOfUse",
        "enabled",
        "manageSettings",
        "overrideSettings",
        "portalMessage",
        "portalTitle",
        "requireAuthentication",
        "termsOfUse"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementProvisioningProfileRadius:getManagementProvisioningProfileRadius": {
      "properties": {
        "allowAdministratorsFromSpecificRadiusGroupOnly": {
          "type": "boolean"
        },
        "allowedRadiusGroups": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "enabled": {
          "type": "boolean"
        },
        "manageSettings": {
          "type": "string"
        },
        "overrideSettings": {
          "type": "string"
        },
        "radiusServers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementProvisioningProfileRadiusRadiusServer:getManagementProvisioningProfileRadiusRadiusServer"
          }
        }
      },
      "type": "object",
      "required": [
        "allowAdministratorsFromSpecificRadiusGroupOnly",
        "allowedRadiusGroups",
        "enabled",
        "manageSettings",
        "overrideSettings",
        "radiusServers"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementProvisioningProfileRadiusRadiusServer:getManagementProvisioningProfileRadiusRadiusServer": {
      "properties": {
        "radiusServerName": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "radiusServerName"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceCifsAllowedDiskAndPrintShare:getManagementResourceCifsAllowedDiskAndPrintShare": {
      "properties": {
        "serverName": {
          "type": "string",
          "description": "Blocks the ability to remotely manipulate a the window's registry.\n"
        },
        "shareName": {
          "type": "string",
          "description": "Disk shares.\n"
        }
      },
      "type": "object",
      "required": [
        "serverName",
        "shareName"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceFtpCvp:getManagementResourceFtpCvp": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "enableCvp": {
          "type": "boolean",
          "description": "Select to enable the Content Vectoring Protocol.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the CVP server, make sure the CVP server is already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object",
      "required": [
        "allowedToModifyContent",
        "enableCvp",
        "replyOrder",
        "server"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceSmtpAction1:getManagementResourceSmtpAction1": {
      "properties": {
        "customFields": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementResourceSmtpAction1CustomField:getManagementResourceSmtpAction1CustomField"
          },
          "description": "The name of the header.custom_field blocks are documented below.\n"
        },
        "recipients": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementResourceSmtpAction1Recipient:getManagementResourceSmtpAction1Recipient"
          },
          "description": "Rewrite Recipient header.recipient blocks are documented below.\n"
        },
        "senders": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementResourceSmtpAction1Sender:getManagementResourceSmtpAction1Sender"
          },
          "description": "Rewrite Sender header.sender blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "customFields",
        "recipients",
        "senders"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceSmtpAction1CustomField:getManagementResourceSmtpAction1CustomField": {
      "properties": {
        "field": {
          "type": "string",
          "description": "The name of the header.\n"
        },
        "original": {
          "type": "string",
          "description": "Original field.\n"
        },
        "rewritten": {
          "type": "string",
          "description": "Replacement field.\n"
        }
      },
      "type": "object",
      "required": [
        "field",
        "original",
        "rewritten"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceSmtpAction1Recipient:getManagementResourceSmtpAction1Recipient": {
      "properties": {
        "original": {
          "type": "string",
          "description": "Original field.\n"
        },
        "rewritten": {
          "type": "string",
          "description": "Replacement field.\n"
        }
      },
      "type": "object",
      "required": [
        "original",
        "rewritten"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceSmtpAction1Sender:getManagementResourceSmtpAction1Sender": {
      "properties": {
        "original": {
          "type": "string",
          "description": "Original field.\n"
        },
        "rewritten": {
          "type": "string",
          "description": "Replacement field.\n"
        }
      },
      "type": "object",
      "required": [
        "original",
        "rewritten"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceSmtpAction2:getManagementResourceSmtpAction2": {
      "properties": {
        "allowedCharacters": {
          "type": "string",
          "description": "The MIME email headers can consist of 8 or 7 bit characters (7 ASCII and 8 for sending Binary characters) in order to encode mail data.\n"
        },
        "mailCapacity": {
          "type": "number",
          "description": "Restrict the size (in kb) of incoming email attachments.\n"
        },
        "stripActivexTags": {
          "type": "boolean",
          "description": "Strip activeX tags.\n"
        },
        "stripAppletTags": {
          "type": "boolean",
          "description": "Strip JAVA applets.\n"
        },
        "stripFileByName": {
          "type": "string",
          "description": "Strips file attachments of the specified name from the message.\n"
        },
        "stripFtpLinks": {
          "type": "boolean",
          "description": "Strip ftp links.\n"
        },
        "stripMimeOfType": {
          "type": "string",
          "description": "Specifies the MIME type to strip from the message.\n"
        },
        "stripPortStrings": {
          "type": "boolean",
          "description": "Strip ports.\n"
        },
        "stripScriptTags": {
          "type": "boolean",
          "description": "Strip JAVA scripts.\n"
        }
      },
      "type": "object",
      "required": [
        "allowedCharacters",
        "mailCapacity",
        "stripActivexTags",
        "stripAppletTags",
        "stripFileByName",
        "stripFtpLinks",
        "stripMimeOfType",
        "stripPortStrings",
        "stripScriptTags"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceSmtpCvp:getManagementResourceSmtpCvp": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "enableCvp": {
          "type": "boolean",
          "description": "Select to enable the Content Vectoring Protocol.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the CVP server, make sure the CVP server is already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object",
      "required": [
        "allowedToModifyContent",
        "enableCvp",
        "replyOrder",
        "server"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceTcpCvpSetting:getManagementResourceTcpCvpSetting": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "server": {
          "type": "string",
          "description": "CVP server identified by name or UID.\nThe CVP server must already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object",
      "required": [
        "allowedToModifyContent",
        "replyOrder",
        "server"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceTcpUfpSetting:getManagementResourceTcpUfpSetting": {
      "properties": {
        "cachingControl": {
          "type": "string",
          "description": "Specifies if and how caching is to be enabled.\n"
        },
        "ignoreUfpServerAfterFailure": {
          "type": "boolean",
          "description": "The UFP server will be ignored after numerous UFP server connections were unsuccessful.\n"
        },
        "numberOfFailuresBeforeIgnore": {
          "type": "number",
          "description": "Signifies at what point the UFP server should be ignored, Applicable only if 'ignore after fail' is enabled.\n"
        },
        "server": {
          "type": "string",
          "description": "UFP server identified by name or UID.\nThe UFP server must already be defined as an OPSEC Application.\n"
        },
        "timeoutBeforeReconnecting": {
          "type": "number",
          "description": "The amount of time, in seconds, that must pass before a UFP server connection should be attempted, Applicable only if 'ignore after fail' is enabled.\n"
        }
      },
      "type": "object",
      "required": [
        "cachingControl",
        "ignoreUfpServerAfterFailure",
        "numberOfFailuresBeforeIgnore",
        "server",
        "timeoutBeforeReconnecting"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceUriAction:getManagementResourceUriAction": {
      "properties": {
        "replacementUri": {
          "type": "string",
          "description": "If the Action in a rule which uses this resource is Drop or Reject, then the Replacement URI is displayed instead of the one requested by the user.\n"
        },
        "stripActivexTags": {
          "type": "boolean",
          "description": "Strip activeX tags.\n"
        },
        "stripAppletTags": {
          "type": "boolean",
          "description": "Strip JAVA applets.\n"
        },
        "stripFtpLinks": {
          "type": "boolean",
          "description": "Strip ftp links.\n"
        },
        "stripPortStrings": {
          "type": "boolean",
          "description": "Strip ports.\n"
        },
        "stripScriptTags": {
          "type": "boolean",
          "description": "Strip JAVA scripts.\n"
        }
      },
      "type": "object",
      "required": [
        "replacementUri",
        "stripActivexTags",
        "stripAppletTags",
        "stripFtpLinks",
        "stripPortStrings",
        "stripScriptTags"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceUriCvp:getManagementResourceUriCvp": {
      "properties": {
        "allowedToModifyContent": {
          "type": "boolean",
          "description": "Configures the CVP server to inspect but not modify content.\n"
        },
        "enableCvp": {
          "type": "boolean",
          "description": "Select to enable the Content Vectoring Protocol.\n"
        },
        "replyOrder": {
          "type": "string",
          "description": "Designates when the CVP server returns data to the Security Gateway security server.\n"
        },
        "sendHttpHeadersToCvp": {
          "type": "boolean",
          "description": "Select, if you would like the CVP server to check the HTTP headers of the message packets.\n"
        },
        "sendHttpRequestToCvp": {
          "type": "boolean",
          "description": "Used to protect against undesirable content in the HTTP request, for example, when inspecting peer-to-peer connections.\n"
        },
        "sendOnlyUnsafeFileTypes": {
          "type": "boolean",
          "description": "Improves the performance of the CVP server. This option does not send to the CVP server traffic that is considered safe.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the CVP server, make sure the CVP server is already be defined as an OPSEC Application.\n"
        }
      },
      "type": "object",
      "required": [
        "allowedToModifyContent",
        "enableCvp",
        "replyOrder",
        "sendHttpHeadersToCvp",
        "sendHttpRequestToCvp",
        "sendOnlyUnsafeFileTypes",
        "server"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceUriMatchUfp:getManagementResourceUriMatchUfp": {
      "properties": {
        "cachingControl": {
          "type": "string",
          "description": "Specifies if and how caching is to be enabled.\n"
        },
        "ignoreUfpServerAfterFailure": {
          "type": "boolean",
          "description": "The UFP server will be ignored after numerous UFP server connections were unsuccessful.\n"
        },
        "numberOfFailuresBeforeIgnore": {
          "type": "number",
          "description": "Signifies at what point the UFP server should be ignored.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the UFP server that is an OPSEC certified third party application that checks URLs against a list of permitted categories.\n"
        },
        "timeoutBeforeReconnecting": {
          "type": "number",
          "description": "The amount of time that must pass before a UFP server connection should be attempted.\n"
        }
      },
      "type": "object",
      "required": [
        "cachingControl",
        "ignoreUfpServerAfterFailure",
        "numberOfFailuresBeforeIgnore",
        "server",
        "timeoutBeforeReconnecting"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceUriMatchWildcard:getManagementResourceUriMatchWildcard": {
      "properties": {
        "host": {
          "type": "string",
          "description": "The functionality of the Host parameter depends on the DNS setup of the addressed server. For the host, only the IP address or the full DNS name should be used.\n"
        },
        "methods": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementResourceUriMatchWildcardMethod:getManagementResourceUriMatchWildcardMethod"
          },
          "description": "Select the URI Schemes to which this resource applies.methods blocks are documented below.\n"
        },
        "path": {
          "type": "string",
          "description": "Name matching is based on appending the file name in the request to the current working directory (unless the file name is already a full path name) and comparing the result to the path specified in the Resource definition.\n"
        },
        "query": {
          "type": "string",
          "description": "The parameters that are sent to the URI when it is accessed.\n"
        },
        "schemes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementResourceUriMatchWildcardScheme:getManagementResourceUriMatchWildcardScheme"
          },
          "description": "Select the URI Schemes to which this resource applies.schemes blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "host",
        "methods",
        "path",
        "query",
        "schemes"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceUriMatchWildcardMethod:getManagementResourceUriMatchWildcardMethod": {
      "properties": {
        "get": {
          "type": "boolean",
          "description": "GET method.\n"
        },
        "head": {
          "type": "boolean",
          "description": "HEAD method.\n"
        },
        "other": {
          "type": "string",
          "description": "You can specify another method in the Other field. You can use wildcards.\n"
        },
        "post": {
          "type": "boolean",
          "description": "POST method.\n"
        },
        "put": {
          "type": "boolean",
          "description": "PUT method.\n"
        }
      },
      "type": "object",
      "required": [
        "get",
        "head",
        "other",
        "post",
        "put"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementResourceUriMatchWildcardScheme:getManagementResourceUriMatchWildcardScheme": {
      "properties": {
        "ftp": {
          "type": "boolean",
          "description": "Ftp scheme.\n"
        },
        "gopher": {
          "type": "boolean",
          "description": "Gopher scheme.\n"
        },
        "http": {
          "type": "boolean",
          "description": "Http scheme.\n"
        },
        "mailto": {
          "type": "boolean",
          "description": "Mailto scheme.\n"
        },
        "news": {
          "type": "boolean",
          "description": "News scheme.\n"
        },
        "other": {
          "type": "string",
          "description": "You can specify another scheme in the Other field. You can use wildcards.\n"
        },
        "wais": {
          "type": "boolean",
          "description": "Wais scheme.\n"
        }
      },
      "type": "object",
      "required": [
        "ftp",
        "gopher",
        "http",
        "mailto",
        "news",
        "other",
        "wais"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSecuremoteDnsServerDomain:getManagementSecuremoteDnsServerDomain": {
      "properties": {
        "domainSuffix": {
          "type": "string",
          "description": "DNS Domain suffix.\n"
        },
        "maximumPrefixLabelCount": {
          "type": "number",
          "description": "Maximum number of matching labels preceding the suffix.\n"
        }
      },
      "type": "object",
      "required": [
        "domainSuffix",
        "maximumPrefixLabelCount"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServiceGtpRadioAccessTechnology:getManagementServiceGtpRadioAccessTechnology": {
      "properties": {
        "eutran": {
          "type": "boolean",
          "description": ".\n"
        },
        "gan": {
          "type": "boolean",
          "description": ".\n"
        },
        "geran": {
          "type": "boolean",
          "description": ".\n"
        },
        "hspaEvolution": {
          "type": "boolean",
          "description": ".\n"
        },
        "nbIot": {
          "type": "boolean",
          "description": ".\n"
        },
        "otherTypesRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementServiceGtpRadioAccessTechnologyOtherTypesRange:getManagementServiceGtpRadioAccessTechnologyOtherTypesRange"
          },
          "description": ".other_types_range blocks are documented below.\n"
        },
        "utran": {
          "type": "boolean",
          "description": ".\n"
        },
        "virtual": {
          "type": "boolean",
          "description": ".\n"
        },
        "wlan": {
          "type": "boolean",
          "description": ".\n"
        }
      },
      "type": "object",
      "required": [
        "eutran",
        "gan",
        "geran",
        "hspaEvolution",
        "nbIot",
        "otherTypesRanges",
        "utran",
        "virtual",
        "wlan"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServiceGtpRadioAccessTechnologyOtherTypesRange:getManagementServiceGtpRadioAccessTechnologyOtherTypesRange": {
      "properties": {
        "enable": {
          "type": "boolean"
        },
        "types": {
          "type": "string",
          "description": "Other RAT Types. To specify other RAT ranges, add a hyphen between the lowest and the highest numbers, for example: 11-15. Multiple Ranges can be chosen when separated with comma.\n"
        }
      },
      "type": "object",
      "required": [
        "enable",
        "types"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServiceGtpSelectionMode:getManagementServiceGtpSelectionMode": {
      "properties": {
        "enable": {
          "type": "boolean"
        },
        "mode": {
          "type": "number",
          "description": "The mode as integer. [0 - Verified, 1 - MS - Not verified, 2 - Network - Not verified].\n"
        }
      },
      "type": "object",
      "required": [
        "enable",
        "mode"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServicesTcpObject:getManagementServicesTcpObject": {
      "properties": {
        "aggressiveAgings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementServicesTcpObjectAggressiveAging:getManagementServicesTcpObjectAggressiveAging"
          },
          "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "delayedSyncValue": {
          "type": "number",
          "description": "Specify the delay (in seconds) in which a synchronization will start after connection initiation.\n"
        },
        "domain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Information about the domain that holds the Object. domain blocks are documented below.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.\n"
        },
        "icon": {
          "type": "string",
          "description": "Object icon.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "matchByProtocolSignature": {
          "type": "boolean",
          "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "port": {
          "type": "string",
          "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        },
        "useDelayedSync": {
          "type": "boolean",
          "description": "Enable this option to delay notifying the Security Gateway about a connection, so that the connection will only be synchronized if it still exists x seconds after the connection is initiated.\n"
        }
      },
      "type": "object",
      "required": [
        "aggressiveAgings",
        "color",
        "comments",
        "delayedSyncValue",
        "domain",
        "groups",
        "icon",
        "keepConnectionsOpenAfterPolicyInstallation",
        "matchByProtocolSignature",
        "matchForAny",
        "name",
        "overrideDefaultSettings",
        "port",
        "protocol",
        "sessionTimeout",
        "sourcePort",
        "syncConnectionsOnCluster",
        "tags",
        "uid",
        "useDefaultSessionTimeout",
        "useDelayedSync"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServicesTcpObjectAggressiveAging:getManagementServicesTcpObjectAggressiveAging": {
      "properties": {
        "defaultTimeout": {
          "type": "number",
          "description": "Default aggressive aging timeout in seconds.\n"
        },
        "enable": {
          "type": "boolean"
        },
        "timeout": {
          "type": "number",
          "description": "Aggressive aging timeout in seconds.\n"
        },
        "useDefaultTimeout": {
          "type": "boolean"
        }
      },
      "type": "object",
      "required": [
        "defaultTimeout",
        "enable",
        "timeout",
        "useDefaultTimeout"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServicesTcpOrder:getManagementServicesTcpOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementServicesUdpObject:getManagementServicesUdpObject": {
      "properties": {
        "acceptReplies": {
          "type": "boolean"
        },
        "aggressiveAgings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementServicesUdpObjectAggressiveAging:getManagementServicesUdpObjectAggressiveAging"
          },
          "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Information about the domain that holds the Object. domain blocks are documented below.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.\n"
        },
        "icon": {
          "type": "string",
          "description": "Object icon.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "matchByProtocolSignature": {
          "type": "boolean",
          "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "port": {
          "type": "string",
          "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "type": "object",
      "required": [
        "acceptReplies",
        "aggressiveAgings",
        "color",
        "comments",
        "domain",
        "groups",
        "icon",
        "keepConnectionsOpenAfterPolicyInstallation",
        "matchByProtocolSignature",
        "matchForAny",
        "name",
        "overrideDefaultSettings",
        "port",
        "protocol",
        "sessionTimeout",
        "sourcePort",
        "syncConnectionsOnCluster",
        "tags",
        "uid",
        "useDefaultSessionTimeout"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServicesUdpObjectAggressiveAging:getManagementServicesUdpObjectAggressiveAging": {
      "properties": {
        "defaultTimeout": {
          "type": "number",
          "description": "Default aggressive aging timeout in seconds.\n"
        },
        "enable": {
          "type": "boolean"
        },
        "timeout": {
          "type": "number",
          "description": "Aggressive aging timeout in seconds.\n"
        },
        "useDefaultTimeout": {
          "type": "boolean"
        }
      },
      "type": "object",
      "required": [
        "defaultTimeout",
        "enable",
        "timeout",
        "useDefaultTimeout"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementServicesUdpOrder:getManagementServicesUdpOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementShowObjectsObject:getManagementShowObjectsObject": {
      "properties": {
        "domain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Information about the domain that holds the Object. domain blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "domain",
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementShowObjectsOrder:getManagementShowObjectsOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementShowUpdatableObjectsRepositoryContentObject:getManagementShowUpdatableObjectsRepositoryContentObject": {
      "properties": {
        "additionalProperties": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional properties on the object.<span pulumi-lang-nodejs=\" additionalProperties \" pulumi-lang-dotnet=\" AdditionalProperties \" pulumi-lang-go=\" additionalProperties \" pulumi-lang-python=\" additional_properties \" pulumi-lang-yaml=\" additionalProperties \" pulumi-lang-java=\" additionalProperties \"> additional_properties </span>blocks are documented below.\n"
        },
        "nameInUpdatableObjectsRepository": {
          "type": "string",
          "description": "Object name in the Updatable Objects Repository.\n"
        },
        "uidInUpdatableObjectsRepository": {
          "type": "string",
          "description": "Unique identifier of the object in the Updatable Objects Repository.\n"
        },
        "updatableObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementShowUpdatableObjectsRepositoryContentObjectUpdatableObject:getManagementShowUpdatableObjectsRepositoryContentObjectUpdatableObject"
          },
          "description": "The imported management object (if exists).<span pulumi-lang-nodejs=\" updatableObject \" pulumi-lang-dotnet=\" UpdatableObject \" pulumi-lang-go=\" updatableObject \" pulumi-lang-python=\" updatable_object \" pulumi-lang-yaml=\" updatableObject \" pulumi-lang-java=\" updatableObject \"> updatable_object </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "additionalProperties",
        "nameInUpdatableObjectsRepository",
        "uidInUpdatableObjectsRepository",
        "updatableObjects"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementShowUpdatableObjectsRepositoryContentObjectUpdatableObject:getManagementShowUpdatableObjectsRepositoryContentObjectUpdatableObject": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementShowUpdatableObjectsRepositoryContentOrder:getManagementShowUpdatableObjectsRepositoryContentOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementSimpleClusterAdvancedSetting:getManagementSimpleClusterAdvancedSetting": {
      "properties": {
        "connectionPersistence": {
          "type": "string",
          "description": "Handling established connections when installing a new policy.\n"
        },
        "sams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterAdvancedSettingSam:getManagementSimpleClusterAdvancedSettingSam"
          },
          "description": "SAM.sam blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "connectionPersistence",
        "sams"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterAdvancedSettingSam:getManagementSimpleClusterAdvancedSettingSam": {
      "properties": {
        "forwardToOtherSamServers": {
          "type": "boolean",
          "description": "Forward SAM clients' requests to other SAM servers.\n"
        },
        "purgeSamFiles": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterAdvancedSettingSamPurgeSamFile:getManagementSimpleClusterAdvancedSettingSamPurgeSamFile"
          },
          "description": "Purge SAM File.purge_sam_file blocks are documented below.\n"
        },
        "useEarlyVersions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterAdvancedSettingSamUseEarlyVersion:getManagementSimpleClusterAdvancedSettingSamUseEarlyVersion"
          },
          "description": "Use early versions compatibility mode.use_early_versions blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "forwardToOtherSamServers",
        "purgeSamFiles",
        "useEarlyVersions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterAdvancedSettingSamPurgeSamFile:getManagementSimpleClusterAdvancedSettingSamPurgeSamFile": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Purge SAM File.\n"
        },
        "purgeWhenSizeReachesTo": {
          "type": "number",
          "description": "Purge SAM File When it Reaches to.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "purgeWhenSizeReachesTo"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterAdvancedSettingSamUseEarlyVersion:getManagementSimpleClusterAdvancedSettingSamUseEarlyVersion": {
      "properties": {
        "compatibilityMode": {
          "type": "string",
          "description": "Early versions compatibility mode.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Use early versions compatibility mode.\n"
        }
      },
      "type": "object",
      "required": [
        "compatibilityMode",
        "enabled"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterHttpsInspection:getManagementSimpleClusterHttpsInspection": {
      "properties": {
        "bypassOnFailures": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterHttpsInspectionBypassOnFailure:getManagementSimpleClusterHttpsInspectionBypassOnFailure"
          },
          "description": "Set to be true in order to bypass all requests (Fail-open) in case of internal system error.bypass_on_failure blocks are documented below.\n"
        },
        "denyExpiredServerCerts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterHttpsInspectionDenyExpiredServerCert:getManagementSimpleClusterHttpsInspectionDenyExpiredServerCert"
          },
          "description": "Set to be true in order to drop traffic from servers with expired server certificate.deny_expired_server_cert blocks are documented below.\n"
        },
        "denyRevokedServerCerts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterHttpsInspectionDenyRevokedServerCert:getManagementSimpleClusterHttpsInspectionDenyRevokedServerCert"
          },
          "description": "Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).deny_revoked_server_cert blocks are documented below.\n"
        },
        "denyUntrustedServerCerts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert:getManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert"
          },
          "description": "Set to be true in order to drop traffic from servers with untrusted server certificate.deny_untrusted_server_cert blocks are documented below.\n"
        },
        "siteCategorizationAllowModes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode:getManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode"
          },
          "description": "Set to 'background' in order to allowed requests until categorization is complete.site_categorization_allow_mode blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "bypassOnFailures",
        "denyExpiredServerCerts",
        "denyRevokedServerCerts",
        "denyUntrustedServerCerts",
        "siteCategorizationAllowModes"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterHttpsInspectionBypassOnFailure:getManagementSimpleClusterHttpsInspectionBypassOnFailure": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterHttpsInspectionDenyExpiredServerCert:getManagementSimpleClusterHttpsInspectionDenyExpiredServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterHttpsInspectionDenyRevokedServerCert:getManagementSimpleClusterHttpsInspectionDenyRevokedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert:getManagementSimpleClusterHttpsInspectionDenyUntrustedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode:getManagementSimpleClusterHttpsInspectionSiteCategorizationAllowMode": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "string",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSetting:getManagementSimpleClusterIdentityAwarenessSetting": {
      "properties": {
        "browserBasedAuthentication": {
          "type": "boolean",
          "description": "Enable Browser Based Authentication source.\n"
        },
        "browserBasedAuthenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSetting"
          },
          "description": "Browser Based Authentication settings.browser_based_authentication_settings blocks are documented below.\n"
        },
        "identityAgent": {
          "type": "boolean",
          "description": "Enable Identity Agent source.\n"
        },
        "identityAgentSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSetting"
          },
          "description": "Identity Agent settings.identity_agent_settings blocks are documented below.\n"
        },
        "identityCollector": {
          "type": "boolean",
          "description": "Enable Identity Collector source.\n"
        },
        "identityCollectorSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSetting"
          },
          "description": "Identity Collector settings.identity_collector_settings blocks are documented below.\n"
        },
        "identitySharingSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentitySharingSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentitySharingSetting"
          },
          "description": "Identity sharing settings.identity_sharing_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingProxySetting:getManagementSimpleClusterIdentityAwarenessSettingProxySetting"
          },
          "description": "Identity-Awareness Proxy settings.proxy_settings blocks are documented below.\n"
        },
        "remoteAccess": {
          "type": "boolean",
          "description": "Enable Remote Access Identity source.\n"
        }
      },
      "type": "object",
      "required": [
        "browserBasedAuthentication",
        "browserBasedAuthenticationSettings",
        "identityAgent",
        "identityAgentSettings",
        "identityCollector",
        "identityCollectorSettings",
        "identitySharingSettings",
        "proxySettings",
        "remoteAccess"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSetting": {
      "properties": {
        "authenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting"
          },
          "description": "Authentication Settings for Browser Based Authentication.authentication_settings blocks are documented below.\n"
        },
        "browserBasedAuthenticationPortalSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting"
          },
          "description": "Browser Based Authentication portal settings.browser_based_authentication_portal_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationSettings",
        "browserBasedAuthenticationPortalSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "identityProviders": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Identity provider object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"identity provider\".identity_provider blocks are documented below.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory"
          },
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "identityProviders",
        "radius",
        "usersDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object",
      "required": [
        "externalUserProfile",
        "internalUsers",
        "specifics",
        "usersFromExternalDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting"
          },
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting"
          },
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities",
        "certificateSettings",
        "portalWebSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding.\nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting:getManagementSimpleClusterIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object",
      "required": [
        "aliases",
        "mainUrl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSetting": {
      "properties": {
        "agentsIntervalKeepalive": {
          "type": "number",
          "description": "Agents send keepalive period (minutes).\n"
        },
        "authenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting"
          },
          "description": "Authentication Settings for Identity Agent.authentication_settings blocks are documented below.\n"
        },
        "identityAgentPortalSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting"
          },
          "description": "Identity Agent accessibility settings.identity_agent_portal_settings blocks are documented below.\n"
        },
        "userReauthenticateInterval": {
          "type": "number",
          "description": "Agent reauthenticate time interval (minutes).\n"
        }
      },
      "type": "object",
      "required": [
        "agentsIntervalKeepalive",
        "authenticationSettings",
        "identityAgentPortalSettings",
        "userReauthenticateInterval"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory"
          },
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "radius",
        "usersDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object",
      "required": [
        "externalUserProfile",
        "internalUsers",
        "specifics",
        "usersFromExternalDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSetting": {
      "properties": {
        "authenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting"
          },
          "description": "Authentication Settings for Identity Collector.authentication_settings blocks are documented below.\n"
        },
        "authorizedClients": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient"
          },
          "description": "Authorized Clients.authorized_clients blocks are documented below.\n"
        },
        "clientAccessPermissions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission"
          },
          "description": "Identity Collector accessibility settings.client_access_permissions blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationSettings",
        "authorizedClients",
        "clientAccessPermissions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting": {
      "properties": {
        "usersDirectories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory"
          },
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "usersDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object",
      "required": [
        "externalUserProfile",
        "internalUsers",
        "specifics",
        "usersFromExternalDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient": {
      "properties": {
        "client": {
          "type": "string",
          "description": "Host / Network Group Name or UID.\n"
        },
        "clientSecret": {
          "type": "string",
          "description": "Client Secret.\n"
        }
      },
      "type": "object",
      "required": [
        "client",
        "clientSecret"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingIdentitySharingSetting:getManagementSimpleClusterIdentityAwarenessSettingIdentitySharingSetting": {
      "properties": {
        "receiveFromOtherGateways": {
          "type": "boolean",
          "description": "Enable receiving identity from other gateways.\n"
        },
        "receiveFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Gateway(s) to receive identity from.receive_from blocks are documented below.\n"
        },
        "shareWithOtherGateways": {
          "type": "boolean",
          "description": "Enable identity sharing with other gateways.\n"
        }
      },
      "type": "object",
      "required": [
        "receiveFromOtherGateways",
        "receiveFroms",
        "shareWithOtherGateways"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIdentityAwarenessSettingProxySetting:getManagementSimpleClusterIdentityAwarenessSettingProxySetting": {
      "properties": {
        "detectUsingXForwardFor": {
          "type": "boolean",
          "description": "Whether to use X-Forward-For HTTP header, which is added by the proxy server to keep track of the original source IP.\n"
        }
      },
      "type": "object",
      "required": [
        "detectUsingXForwardFor"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterInterface:getManagementSimpleClusterInterface": {
      "properties": {
        "antiSpoofing": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "antiSpoofingSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Aanti_spoofing_settings blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "interfaceType": {
          "type": "string",
          "description": "Cluster interface type.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "multicastAddress": {
          "type": "string",
          "description": "Multicast IP Address.\n"
        },
        "multicastAddressType": {
          "type": "string",
          "description": "Multicast Address Type.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "securityZone": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "securityZoneSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Asecurity_zone_settings blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "N/A\n"
        },
        "topologyAutomaticCalculation": {
          "type": "string"
        },
        "topologySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Atopology_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "antiSpoofing",
        "antiSpoofingSettings",
        "color",
        "comments",
        "interfaceType",
        "ipv4Address",
        "ipv4MaskLength",
        "ipv4NetworkMask",
        "ipv6Address",
        "ipv6MaskLength",
        "ipv6NetworkMask",
        "multicastAddress",
        "multicastAddressType",
        "name",
        "securityZone",
        "securityZoneSettings",
        "topology",
        "topologyAutomaticCalculation",
        "topologySettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIpsSetting:getManagementSimpleClusterIpsSetting": {
      "properties": {
        "activationMode": {
          "type": "string",
          "description": "Defines whether the IPS blade operates in Detect Only mode or enforces the configured IPS Policy.\n"
        },
        "bypassAllUnderLoad": {
          "type": "boolean",
          "description": "Disable/enable all IPS protections until CPU and memory levels are back to normal.\n"
        },
        "bypassTrackMethod": {
          "type": "string",
          "description": "Track options when all IPS protections are disabled until CPU/memory levels are back to normal.\n"
        },
        "cpuUsageHighThreshold": {
          "type": "number",
          "description": "CPU usage high threshold percentage (1-99).\n"
        },
        "cpuUsageLowThreshold": {
          "type": "number",
          "description": "CPU usage low threshold percentage (1-99).\n"
        },
        "memoryUsageHighThreshold": {
          "type": "number",
          "description": "Memory usage high threshold percentage (1-99).\n"
        },
        "memoryUsageLowThreshold": {
          "type": "number",
          "description": "Memory usage low threshold percentage (1-99).\n"
        },
        "rejectOnClusterFailOver": {
          "type": "boolean",
          "description": "Define the IPS connections during fail over reject packets or accept packets.\n"
        },
        "sendThreatCloudInfo": {
          "type": "boolean",
          "description": "Help improve Check Point Threat Prevention product by sending anonymous information.\n"
        },
        "topCpuConsumingProtections": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIpsSettingTopCpuConsumingProtection:getManagementSimpleClusterIpsSettingTopCpuConsumingProtection"
          },
          "description": "Provides a way to reduce CPU levels on machines under load by disabling the top CPU consuming IPS protections.top_cpu_consuming_protections blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "activationMode",
        "bypassAllUnderLoad",
        "bypassTrackMethod",
        "cpuUsageHighThreshold",
        "cpuUsageLowThreshold",
        "memoryUsageHighThreshold",
        "memoryUsageLowThreshold",
        "rejectOnClusterFailOver",
        "sendThreatCloudInfo",
        "topCpuConsumingProtections"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterIpsSettingTopCpuConsumingProtection:getManagementSimpleClusterIpsSettingTopCpuConsumingProtection": {
      "properties": {
        "disablePeriod": {
          "type": "number"
        },
        "disableUnderLoad": {
          "type": "boolean"
        }
      },
      "type": "object",
      "required": [
        "disablePeriod",
        "disableUnderLoad"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterMember:getManagementSimpleClusterMember": {
      "properties": {
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterMemberInterface:getManagementSimpleClusterMemberInterface"
          },
          "description": "Cluster Member network interfaces.interfaces blocks are documented below.\n"
        },
        "ipAddress": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "sicMessage": {
          "type": "string"
        },
        "sicState": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "interfaces",
        "ipAddress",
        "name",
        "sicMessage",
        "sicState"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterMemberInterface:getManagementSimpleClusterMemberInterface": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "type": "object",
      "required": [
        "ipv4Address",
        "ipv4MaskLength",
        "ipv4NetworkMask",
        "ipv6Address",
        "ipv6MaskLength",
        "ipv6NetworkMask",
        "name"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterPlatformPortalSetting:getManagementSimpleClusterPlatformPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterPlatformPortalSettingAccessibility:getManagementSimpleClusterPlatformPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterPlatformPortalSettingCertificateSetting:getManagementSimpleClusterPlatformPortalSettingCertificateSetting"
          },
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterPlatformPortalSettingPortalWebSetting:getManagementSimpleClusterPlatformPortalSettingPortalWebSetting"
          },
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities",
        "certificateSettings",
        "portalWebSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterPlatformPortalSettingAccessibility:getManagementSimpleClusterPlatformPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterPlatformPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterPlatformPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterPlatformPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterPlatformPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterPlatformPortalSettingCertificateSetting:getManagementSimpleClusterPlatformPortalSettingCertificateSetting": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding.\nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterPlatformPortalSettingPortalWebSetting:getManagementSimpleClusterPlatformPortalSettingPortalWebSetting": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object",
      "required": [
        "aliases",
        "mainUrl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterUsercheckPortalSetting:getManagementSimpleClusterUsercheckPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterUsercheckPortalSettingAccessibility:getManagementSimpleClusterUsercheckPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterUsercheckPortalSettingCertificateSetting:getManagementSimpleClusterUsercheckPortalSettingCertificateSetting"
          },
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "State of the web portal (enabled or disabled). The supported blades are: {'Application Control', 'URL Filtering', 'Data Loss Prevention', 'Anti Virus', 'Anti Bot', 'Threat Emulation', 'Threat Extraction', 'Data Awareness'}.\n"
        },
        "portalWebSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterUsercheckPortalSettingPortalWebSetting:getManagementSimpleClusterUsercheckPortalSettingPortalWebSetting"
          },
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities",
        "certificateSettings",
        "enabled",
        "portalWebSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterUsercheckPortalSettingAccessibility:getManagementSimpleClusterUsercheckPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterUsercheckPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterUsercheckPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterUsercheckPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleClusterUsercheckPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterUsercheckPortalSettingCertificateSetting:getManagementSimpleClusterUsercheckPortalSettingCertificateSetting": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding.\nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleClusterUsercheckPortalSettingPortalWebSetting:getManagementSimpleClusterUsercheckPortalSettingPortalWebSetting": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object",
      "required": [
        "aliases",
        "mainUrl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayAdvancedSetting:getManagementSimpleGatewayAdvancedSetting": {
      "properties": {
        "connectionPersistence": {
          "type": "string",
          "description": "Handling established connections when installing a new policy.\n"
        },
        "sams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayAdvancedSettingSam:getManagementSimpleGatewayAdvancedSettingSam"
          },
          "description": "SAM.sam blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "connectionPersistence",
        "sams"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayAdvancedSettingSam:getManagementSimpleGatewayAdvancedSettingSam": {
      "properties": {
        "forwardToOtherSamServers": {
          "type": "boolean",
          "description": "Forward SAM clients' requests to other SAM servers.\n"
        },
        "purgeSamFiles": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayAdvancedSettingSamPurgeSamFile:getManagementSimpleGatewayAdvancedSettingSamPurgeSamFile"
          },
          "description": "Purge SAM File.purge_sam_file blocks are documented below.\n"
        },
        "useEarlyVersions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayAdvancedSettingSamUseEarlyVersion:getManagementSimpleGatewayAdvancedSettingSamUseEarlyVersion"
          },
          "description": "Use early versions compatibility mode.use_early_versions blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "forwardToOtherSamServers",
        "purgeSamFiles",
        "useEarlyVersions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayAdvancedSettingSamPurgeSamFile:getManagementSimpleGatewayAdvancedSettingSamPurgeSamFile": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Purge SAM File.\n"
        },
        "purgeWhenSizeReachesTo": {
          "type": "number",
          "description": "Purge SAM File When it Reaches to.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "purgeWhenSizeReachesTo"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayAdvancedSettingSamUseEarlyVersion:getManagementSimpleGatewayAdvancedSettingSamUseEarlyVersion": {
      "properties": {
        "compatibilityMode": {
          "type": "string",
          "description": "Early versions compatibility mode.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Use early versions compatibility mode.\n"
        }
      },
      "type": "object",
      "required": [
        "compatibilityMode",
        "enabled"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayApplicationControlAndUrlFilteringSetting:getManagementSimpleGatewayApplicationControlAndUrlFilteringSetting": {
      "properties": {
        "globalSettingsMode": {
          "type": "string",
          "description": "Whether to override global settings or not.\n"
        },
        "overrideGlobalSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "override global settings object.override_global_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "globalSettingsMode",
        "overrideGlobalSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayHttpsInspection:getManagementSimpleGatewayHttpsInspection": {
      "properties": {
        "bypassOnFailures": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayHttpsInspectionBypassOnFailure:getManagementSimpleGatewayHttpsInspectionBypassOnFailure"
          },
          "description": "Set to be true in order to bypass all requests (Fail-open) in case of internal system error.bypass_on_failure blocks are documented below.\n"
        },
        "denyExpiredServerCerts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert:getManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert"
          },
          "description": "Set to be true in order to drop traffic from servers with expired server certificate.deny_expired_server_cert blocks are documented below.\n"
        },
        "denyRevokedServerCerts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert:getManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert"
          },
          "description": "Set to be true in order to drop traffic from servers with revoked server certificate (validate CRL).deny_revoked_server_cert blocks are documented below.\n"
        },
        "denyUntrustedServerCerts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert:getManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert"
          },
          "description": "Set to be true in order to drop traffic from servers with untrusted server certificate.deny_untrusted_server_cert blocks are documented below.\n"
        },
        "siteCategorizationAllowModes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode:getManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode"
          },
          "description": "Set to 'background' in order to allowed requests until categorization is complete.site_categorization_allow_mode blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "bypassOnFailures",
        "denyExpiredServerCerts",
        "denyRevokedServerCerts",
        "denyUntrustedServerCerts",
        "siteCategorizationAllowModes"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayHttpsInspectionBypassOnFailure:getManagementSimpleGatewayHttpsInspectionBypassOnFailure": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert:getManagementSimpleGatewayHttpsInspectionDenyExpiredServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert:getManagementSimpleGatewayHttpsInspectionDenyRevokedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert:getManagementSimpleGatewayHttpsInspectionDenyUntrustedServerCert": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "boolean",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode:getManagementSimpleGatewayHttpsInspectionSiteCategorizationAllowMode": {
      "properties": {
        "overrideProfile": {
          "type": "boolean",
          "description": "Override profile of global configuration.\n"
        },
        "value": {
          "type": "string",
          "description": "Override value.<br><font color=\"red\">Required only for</font> 'override-profile' is True.\n"
        }
      },
      "type": "object",
      "required": [
        "overrideProfile",
        "value"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSetting:getManagementSimpleGatewayIdentityAwarenessSetting": {
      "properties": {
        "browserBasedAuthentication": {
          "type": "boolean",
          "description": "Enable Browser Based Authentication source.\n"
        },
        "browserBasedAuthenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSetting"
          },
          "description": "Browser Based Authentication settings.browser_based_authentication_settings blocks are documented below.\n"
        },
        "identityAgent": {
          "type": "boolean",
          "description": "Enable Identity Agent source.\n"
        },
        "identityAgentSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSetting"
          },
          "description": "Identity Agent settings.identity_agent_settings blocks are documented below.\n"
        },
        "identityCollector": {
          "type": "boolean",
          "description": "Enable Identity Collector source.\n"
        },
        "identityCollectorSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSetting"
          },
          "description": "Identity Collector settings.identity_collector_settings blocks are documented below.\n"
        },
        "identitySharingSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentitySharingSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentitySharingSetting"
          },
          "description": "Identity sharing settings.identity_sharing_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingProxySetting:getManagementSimpleGatewayIdentityAwarenessSettingProxySetting"
          },
          "description": "Identity-Awareness Proxy settings.proxy_settings blocks are documented below.\n"
        },
        "remoteAccess": {
          "type": "boolean",
          "description": "Enable Remote Access Identity source.\n"
        }
      },
      "type": "object",
      "required": [
        "browserBasedAuthentication",
        "browserBasedAuthenticationSettings",
        "identityAgent",
        "identityAgentSettings",
        "identityCollector",
        "identityCollectorSettings",
        "identitySharingSettings",
        "proxySettings",
        "remoteAccess"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSetting": {
      "properties": {
        "authenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting"
          },
          "description": "Authentication Settings for Browser Based Authentication.authentication_settings blocks are documented below.\n"
        },
        "browserBasedAuthenticationPortalSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting"
          },
          "description": "Browser Based Authentication portal settings.browser_based_authentication_portal_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationSettings",
        "browserBasedAuthenticationPortalSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSetting": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "identityProviders": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Identity provider object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"identity provider\".identity_provider blocks are documented below.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory"
          },
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "identityProviders",
        "radius",
        "usersDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingAuthenticationSettingUsersDirectory": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object",
      "required": [
        "externalUserProfile",
        "internalUsers",
        "specifics",
        "usersFromExternalDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting"
          },
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting"
          },
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities",
        "certificateSettings",
        "portalWebSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingCertificateSetting": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding.\nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting:getManagementSimpleGatewayIdentityAwarenessSettingBrowserBasedAuthenticationSettingBrowserBasedAuthenticationPortalSettingPortalWebSetting": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object",
      "required": [
        "aliases",
        "mainUrl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSetting": {
      "properties": {
        "agentsIntervalKeepalive": {
          "type": "number",
          "description": "Agents send keepalive period (minutes).\n"
        },
        "authenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting"
          },
          "description": "Authentication Settings for Identity Agent.authentication_settings blocks are documented below.\n"
        },
        "identityAgentPortalSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting"
          },
          "description": "Identity Agent accessibility settings.identity_agent_portal_settings blocks are documented below.\n"
        },
        "userReauthenticateInterval": {
          "type": "number",
          "description": "Agent reauthenticate time interval (minutes).\n"
        }
      },
      "type": "object",
      "required": [
        "agentsIntervalKeepalive",
        "authenticationSettings",
        "identityAgentPortalSettings",
        "userReauthenticateInterval"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSetting": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "radius": {
          "type": "string",
          "description": "Radius server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"radius\".\n"
        },
        "usersDirectories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory"
          },
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "radius",
        "usersDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingAuthenticationSettingUsersDirectory": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object",
      "required": [
        "externalUserProfile",
        "internalUsers",
        "specifics",
        "usersFromExternalDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityAgentSettingIdentityAgentPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSetting": {
      "properties": {
        "authenticationSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting"
          },
          "description": "Authentication Settings for Identity Collector.authentication_settings blocks are documented below.\n"
        },
        "authorizedClients": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient"
          },
          "description": "Authorized Clients.authorized_clients blocks are documented below.\n"
        },
        "clientAccessPermissions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission"
          },
          "description": "Identity Collector accessibility settings.client_access_permissions blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationSettings",
        "authorizedClients",
        "clientAccessPermissions"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSetting": {
      "properties": {
        "usersDirectories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory"
          },
          "description": "Users directories.users_directories blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "usersDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthenticationSettingUsersDirectory": {
      "properties": {
        "externalUserProfile": {
          "type": "boolean",
          "description": "External user profile.\n"
        },
        "internalUsers": {
          "type": "boolean",
          "description": "Internal users.\n"
        },
        "specifics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "LDAP AU objects identified by the name or UID. Must be set when \"users-from-external-directories\" was selected to be \"specific\".specific blocks are documented below.\n"
        },
        "usersFromExternalDirectories": {
          "type": "string",
          "description": "Users from external directories.\n"
        }
      },
      "type": "object",
      "required": [
        "externalUserProfile",
        "internalUsers",
        "specifics",
        "usersFromExternalDirectories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingAuthorizedClient": {
      "properties": {
        "client": {
          "type": "string",
          "description": "Host / Network Group Name or UID.\n"
        },
        "clientSecret": {
          "type": "string",
          "description": "Client Secret.\n"
        }
      },
      "type": "object",
      "required": [
        "client",
        "clientSecret"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermission": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentityCollectorSettingClientAccessPermissionAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingIdentitySharingSetting:getManagementSimpleGatewayIdentityAwarenessSettingIdentitySharingSetting": {
      "properties": {
        "receiveFromOtherGateways": {
          "type": "boolean",
          "description": "Enable receiving identity from other gateways.\n"
        },
        "receiveFroms": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Gateway(s) to receive identity from.receive_from blocks are documented below.\n"
        },
        "shareWithOtherGateways": {
          "type": "boolean",
          "description": "Enable identity sharing with other gateways.\n"
        }
      },
      "type": "object",
      "required": [
        "receiveFromOtherGateways",
        "receiveFroms",
        "shareWithOtherGateways"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIdentityAwarenessSettingProxySetting:getManagementSimpleGatewayIdentityAwarenessSettingProxySetting": {
      "properties": {
        "detectUsingXForwardFor": {
          "type": "boolean",
          "description": "Whether to use X-Forward-For HTTP header, which is added by the proxy server to keep track of the original source IP.\n"
        }
      },
      "type": "object",
      "required": [
        "detectUsingXForwardFor"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayInterface:getManagementSimpleGatewayInterface": {
      "properties": {
        "antiSpoofing": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "antiSpoofingSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Aanti_spoofing_settings blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskLength": {
          "type": "string",
          "description": "IPv4 network mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "string",
          "description": "IPv6 network mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network address.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "securityZone": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "securityZoneSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Asecurity_zone_settings blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "N/A\n"
        },
        "topologyAutomaticCalculation": {
          "type": "string"
        },
        "topologySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Atopology_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "antiSpoofing",
        "antiSpoofingSettings",
        "color",
        "comments",
        "ipv4Address",
        "ipv4MaskLength",
        "ipv4NetworkMask",
        "ipv6Address",
        "ipv6MaskLength",
        "ipv6NetworkMask",
        "name",
        "securityZone",
        "securityZoneSettings",
        "topology",
        "topologyAutomaticCalculation",
        "topologySettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayIpsSettings:getManagementSimpleGatewayIpsSettings": {
      "properties": {
        "activationMode": {
          "type": "string",
          "description": "Defines whether the IPS blade operates in Detect Only mode or enforces the configured IPS Policy.\n"
        },
        "bypassAllUnderLoad": {
          "type": "boolean",
          "description": "Disable/enable all IPS protections until CPU and memory levels are back to normal.\n"
        },
        "bypassTrackMethod": {
          "type": "string",
          "description": "Track options when all IPS protections are disabled until CPU/memory levels are back to normal.\n"
        },
        "cpuUsageHighThreshold": {
          "type": "number",
          "description": "CPU usage high threshold percentage (1-99).\n"
        },
        "cpuUsageLowThreshold": {
          "type": "number",
          "description": "CPU usage low threshold percentage (1-99).\n"
        },
        "memoryUsageHighThreshold": {
          "type": "number",
          "description": "Memory usage high threshold percentage (1-99).\n"
        },
        "memoryUsageLowThreshold": {
          "type": "number",
          "description": "Memory usage low threshold percentage (1-99).\n"
        },
        "sendThreatCloudInfo": {
          "type": "boolean",
          "description": "Help improve Check Point Threat Prevention product by sending anonymous information.\n"
        },
        "topCpuConsumingProtections": {
          "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections:getManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections",
          "description": "Provides a way to reduce CPU levels on machines under load by disabling the top CPU consuming IPS protections.top_cpu_consuming_protections blocks are documented below.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections:getManagementSimpleGatewayIpsSettingsTopCpuConsumingProtections": {
      "properties": {
        "disablePeriod": {
          "type": "number",
          "description": "Duration (in hours) for disabling the protections.\n"
        },
        "disableUnderLoad": {
          "type": "boolean",
          "description": "Temporarily disable/enable top CPU consuming IPS protections.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementSimpleGatewayPlatformPortalSetting:getManagementSimpleGatewayPlatformPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayPlatformPortalSettingAccessibility:getManagementSimpleGatewayPlatformPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayPlatformPortalSettingCertificateSetting:getManagementSimpleGatewayPlatformPortalSettingCertificateSetting"
          },
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "portalWebSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayPlatformPortalSettingPortalWebSetting:getManagementSimpleGatewayPlatformPortalSettingPortalWebSetting"
          },
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities",
        "certificateSettings",
        "portalWebSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayPlatformPortalSettingAccessibility:getManagementSimpleGatewayPlatformPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayPlatformPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayPlatformPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayPlatformPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayPlatformPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayPlatformPortalSettingCertificateSetting:getManagementSimpleGatewayPlatformPortalSettingCertificateSetting": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding.\nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayPlatformPortalSettingPortalWebSetting:getManagementSimpleGatewayPlatformPortalSettingPortalWebSetting": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object",
      "required": [
        "aliases",
        "mainUrl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayUsercheckPortalSetting:getManagementSimpleGatewayUsercheckPortalSetting": {
      "properties": {
        "accessibilities": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayUsercheckPortalSettingAccessibility:getManagementSimpleGatewayUsercheckPortalSettingAccessibility"
          },
          "description": "Configuration of the portal access settings.accessibility blocks are documented below.\n"
        },
        "certificateSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayUsercheckPortalSettingCertificateSetting:getManagementSimpleGatewayUsercheckPortalSettingCertificateSetting"
          },
          "description": "Configuration of the portal certificate settings.certificate_settings blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "State of the web portal (enabled or disabled). The supported blades are: {'Application Control', 'URL Filtering', 'Data Loss Prevention', 'Anti Virus', 'Anti Bot', 'Threat Emulation', 'Threat Extraction', 'Data Awareness'}.\n"
        },
        "portalWebSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayUsercheckPortalSettingPortalWebSetting:getManagementSimpleGatewayUsercheckPortalSettingPortalWebSetting"
          },
          "description": "Configuration of the portal web settings.portal_web_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accessibilities",
        "certificateSettings",
        "enabled",
        "portalWebSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayUsercheckPortalSettingAccessibility:getManagementSimpleGatewayUsercheckPortalSettingAccessibility": {
      "properties": {
        "allowAccessFrom": {
          "type": "string",
          "description": "Allowed access to the web portal (based on interfaces, or security policy).\n"
        },
        "internalAccessSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayUsercheckPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayUsercheckPortalSettingAccessibilityInternalAccessSetting"
          },
          "description": "Configuration of the additional portal access settings for internal interfaces only.internal_access_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowAccessFrom",
        "internalAccessSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayUsercheckPortalSettingAccessibilityInternalAccessSetting:getManagementSimpleGatewayUsercheckPortalSettingAccessibilityInternalAccessSetting": {
      "properties": {
        "dmz": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'DMZ'.\n"
        },
        "undefined": {
          "type": "boolean",
          "description": "Controls portal access settings for internal interfaces, whose topology is set to 'Undefined'.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "Controls portal access settings for interfaces that are part of a VPN Encryption Domain.\n"
        }
      },
      "type": "object",
      "required": [
        "dmz",
        "undefined",
        "vpn"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayUsercheckPortalSettingCertificateSetting:getManagementSimpleGatewayUsercheckPortalSettingCertificateSetting": {
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "The certificate file encoded in Base64 with padding.\nThis file must be in the *.p12 format.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSimpleGatewayUsercheckPortalSettingPortalWebSetting:getManagementSimpleGatewayUsercheckPortalSettingPortalWebSetting": {
      "properties": {
        "aliases": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of URL aliases that are redirected to the main portal URL.aliases blocks are documented below.\n"
        },
        "mainUrl": {
          "type": "string",
          "description": "The main URL for the web portal.\n"
        }
      },
      "type": "object",
      "required": [
        "aliases",
        "mainUrl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSmartTaskAction:getManagementSmartTaskAction": {
      "properties": {
        "runScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSmartTaskActionRunScript:getManagementSmartTaskActionRunScript"
          },
          "description": "When the trigger is fired, runs the configured Repository Script on the defined targets.<br>The trigger data is then passed to the script as the first parameter. The parameter is JSON encoded in Base64 format.run_script blocks are documented below.\n"
        },
        "sendMails": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSmartTaskActionSendMail:getManagementSmartTaskActionSendMail"
          },
          "description": "When the trigger is fired, sends the configured email to the defined recipients.send_mail blocks are documented below.\n"
        },
        "sendWebRequests": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSmartTaskActionSendWebRequest:getManagementSmartTaskActionSendWebRequest"
          },
          "description": "When the trigger is fired, sends an HTTPS POST web request to the configured URL.<br>The trigger data will be passed along with the SmartTask's custom data in the request's payload.send_web_request blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "runScripts",
        "sendMails",
        "sendWebRequests"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSmartTaskActionRunScript:getManagementSmartTaskActionRunScript": {
      "properties": {
        "repositoryScript": {
          "type": "string",
          "description": "Repository script that is executed when the trigger is fired.,  identified by the name or UID.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Targets to execute the script on.targets blocks are documented below.\n"
        },
        "timeOut": {
          "type": "number",
          "description": "Script execution time-out in seconds.\n"
        }
      },
      "type": "object",
      "required": [
        "repositoryScript",
        "targets",
        "timeOut"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSmartTaskActionSendMail:getManagementSmartTaskActionSendMail": {
      "properties": {
        "mailSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSmartTaskActionSendMailMailSetting:getManagementSmartTaskActionSendMailMailSetting"
          },
          "description": "The required settings to send the mail by.mail_settings blocks are documented below.\n"
        },
        "smtpServers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSmartTaskActionSendMailSmtpServer:getManagementSmartTaskActionSendMailSmtpServer"
          },
          "description": "The UID or the name a preconfigured SMTP server object.\n"
        }
      },
      "type": "object",
      "required": [
        "mailSettings",
        "smtpServers"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSmartTaskActionSendMailMailSetting:getManagementSmartTaskActionSendMailMailSetting": {
      "properties": {
        "attachment": {
          "type": "string",
          "description": "What file should be attached to the mail.\n"
        },
        "bccRecipients": {
          "type": "string",
          "description": "A comma separated list of bcc recipient mail addresses.\n"
        },
        "body": {
          "type": "string",
          "description": "The email body.\n"
        },
        "ccRecipients": {
          "type": "string",
          "description": "A comma separated list of cc recipient mail addresses.\n"
        },
        "recipients": {
          "type": "string",
          "description": "A comma separated list of recipient mail addresses.\n"
        },
        "senderEmail": {
          "type": "string",
          "description": "An email address to send the mail from.\n"
        },
        "subject": {
          "type": "string",
          "description": "The email subject.\n"
        }
      },
      "type": "object",
      "required": [
        "attachment",
        "bccRecipients",
        "body",
        "ccRecipients",
        "recipients",
        "senderEmail",
        "subject"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSmartTaskActionSendMailSmtpServer:getManagementSmartTaskActionSendMailSmtpServer": {
      "properties": {
        "authentication": {
          "type": "boolean",
          "description": "Does the mail server requires authentication.\n"
        },
        "encryption": {
          "type": "string",
          "description": "Encryption type.\n"
        },
        "name": {
          "type": "string",
          "description": "the SMTP server name.\n"
        },
        "port": {
          "type": "number",
          "description": "The SMTP port to use.\n"
        },
        "server": {
          "type": "string",
          "description": "The SMTP server address.\n"
        },
        "username": {
          "type": "string",
          "description": "A username for the SMTP server.\n"
        }
      },
      "type": "object",
      "required": [
        "authentication",
        "encryption",
        "name",
        "port",
        "server",
        "username"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSmartTaskActionSendWebRequest:getManagementSmartTaskActionSendWebRequest": {
      "properties": {
        "fingerprint": {
          "type": "string",
          "description": "The SHA1 fingerprint of the URL's SSL certificate. Used to trust servers with self-signed SSL certificates.\n"
        },
        "overrideProxy": {
          "type": "boolean",
          "description": "Option to send to the web request via a proxy other than the Management's Server proxy (if defined).\n"
        },
        "proxyUrl": {
          "type": "string",
          "description": "URL of the proxy used to send the request.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "Shared secret that can be used by the target server to identify the Management Server.<br>The value will be sent as part of the request in the \"X-chkp-shared-secret\" header.\n"
        },
        "timeOut": {
          "type": "number",
          "description": "Web Request time-out in seconds.\n"
        },
        "url": {
          "type": "string",
          "description": "URL used for the web request.\n"
        }
      },
      "type": "object",
      "required": [
        "fingerprint",
        "overrideProxy",
        "proxyUrl",
        "sharedSecret",
        "timeOut",
        "url"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollment:getManagementSubordinateCaAutomaticEnrollment": {
      "properties": {
        "automaticallyEnrollCertificate": {
          "type": "boolean",
          "description": "Whether to automatically enroll certificate.\n"
        },
        "cmpv1Settings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollmentCmpv1Setting:getManagementSubordinateCaAutomaticEnrollmentCmpv1Setting"
          },
          "description": "Cmpv1 protocol settings. Available only if \"protocol\" is set to \"cmpv1\".cmpv1_settings blocks are documented below.\n"
        },
        "cmpv2Settings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollmentCmpv2Setting:getManagementSubordinateCaAutomaticEnrollmentCmpv2Setting"
          },
          "description": "Cmpv2 protocol settings. Available only if \"protocol\" is set to \"cmpv2\".cmpv2_settings blocks are documented below.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Protocol that communicates with the certificate authority. Available only if \"automatically-enroll-certificate\" parameter is set to true.\n"
        },
        "scepSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollmentScepSetting:getManagementSubordinateCaAutomaticEnrollmentScepSetting"
          },
          "description": "Scep protocol settings. Available only if \"protocol\" is set to \"scep\".scep_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "automaticallyEnrollCertificate",
        "cmpv1Settings",
        "cmpv2Settings",
        "protocol",
        "scepSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollmentCmpv1Setting:getManagementSubordinateCaAutomaticEnrollmentCmpv1Setting": {
      "properties": {
        "directTcpSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting:getManagementSubordinateCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting"
          },
          "description": "Direct tcp transport layer settings.direct_tcp_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "directTcpSettings"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting:getManagementSubordinateCaAutomaticEnrollmentCmpv1SettingDirectTcpSetting": {
      "properties": {
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object",
      "required": [
        "port"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollmentCmpv2Setting:getManagementSubordinateCaAutomaticEnrollmentCmpv2Setting": {
      "properties": {
        "directTcpSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting:getManagementSubordinateCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting"
          },
          "description": "Direct tcp transport layer settings.direct_tcp_settings blocks are documented below.\n"
        },
        "httpSettings": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollmentCmpv2SettingHttpSetting:getManagementSubordinateCaAutomaticEnrollmentCmpv2SettingHttpSetting"
          },
          "description": "Http transport layer settings.http_settings blocks are documented below.\n"
        },
        "transportLayer": {
          "type": "string",
          "description": "Transport layer.\n"
        }
      },
      "type": "object",
      "required": [
        "directTcpSettings",
        "httpSettings",
        "transportLayer"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting:getManagementSubordinateCaAutomaticEnrollmentCmpv2SettingDirectTcpSetting": {
      "properties": {
        "port": {
          "type": "number",
          "description": "Port number.\n"
        }
      },
      "type": "object",
      "required": [
        "port"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollmentCmpv2SettingHttpSetting:getManagementSubordinateCaAutomaticEnrollmentCmpv2SettingHttpSetting": {
      "properties": {
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object",
      "required": [
        "url"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementSubordinateCaAutomaticEnrollmentScepSetting:getManagementSubordinateCaAutomaticEnrollmentScepSetting": {
      "properties": {
        "caIdentifier": {
          "type": "string",
          "description": "Certificate authority identifier.\n"
        },
        "url": {
          "type": "string",
          "description": "Certificate authority URL.\n"
        }
      },
      "type": "object",
      "required": [
        "caIdentifier",
        "url"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementTaskTask:getManagementTaskTask": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "progressPercentage": {
          "type": "number",
          "description": "The progress percentage of the task.\n"
        },
        "status": {
          "type": "string",
          "description": "Task status.\n"
        },
        "suppressed": {
          "type": "boolean",
          "description": "Is the task suppressed.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier. Use show-task command to check the progress of the task.\n"
        },
        "taskName": {
          "type": "string",
          "description": "The task name.\n"
        }
      },
      "type": "object",
      "required": [
        "comments",
        "progressPercentage",
        "status",
        "suppressed",
        "taskId",
        "taskName"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatIocFeedCustomHeader:getManagementThreatIocFeedCustomHeader": {
      "properties": {
        "headerName": {
          "type": "string"
        },
        "headerValue": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "headerName",
        "headerValue"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatProfileActivateProtectionsByExtendedAttribute:getManagementThreatProfileActivateProtectionsByExtendedAttribute": {
      "properties": {
        "category": {
          "type": "string",
          "description": "IPS tag category name.\n"
        },
        "name": {
          "type": "string",
          "description": "IPS tag name.\n"
        },
        "uid": {
          "type": "string",
          "description": "IPS tag unique identifier.\n"
        },
        "values": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementThreatProfileActivateProtectionsByExtendedAttributeValue:getManagementThreatProfileActivateProtectionsByExtendedAttributeValue"
          },
          "description": "Collection of IPS protection extended attribute values (name and uid).\n"
        }
      },
      "type": "object",
      "required": [
        "category",
        "name",
        "uid",
        "values"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatProfileActivateProtectionsByExtendedAttributeValue:getManagementThreatProfileActivateProtectionsByExtendedAttributeValue": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatProfileDeactivateProtectionsByExtendedAttribute:getManagementThreatProfileDeactivateProtectionsByExtendedAttribute": {
      "properties": {
        "category": {
          "type": "string",
          "description": "IPS tag category name.\n"
        },
        "name": {
          "type": "string",
          "description": "IPS tag name.\n"
        },
        "uid": {
          "type": "string",
          "description": "IPS tag unique identifier.\n"
        },
        "values": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue:getManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue"
          },
          "description": "Collection of IPS protection extended attribute values (name and uid).\n"
        }
      },
      "type": "object",
      "required": [
        "category",
        "name",
        "uid",
        "values"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue:getManagementThreatProfileDeactivateProtectionsByExtendedAttributeValue": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "uid": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "name",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatProfileIndicatorOverride:getManagementThreatProfileIndicatorOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "The indicator's action in this profile.\n"
        },
        "indicator": {
          "type": "string",
          "description": "The indicator whose action is to be overriden.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "indicator"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatProfileOverride:getManagementThreatProfileOverride": {
      "properties": {
        "action": {
          "type": "string",
          "description": "Protection action.\n"
        },
        "capturePackets": {
          "type": "boolean",
          "description": "Capture packets.\n"
        },
        "default": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Default settings. default blocks are documented below.\n"
        },
        "final": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Final settings. final blocks are documented below.\n"
        },
        "protection": {
          "type": "string",
          "description": "IPS protection identified by name.\n"
        },
        "protectionExternalInfos": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of industry reference (CVE).\n"
        },
        "protectionUid": {
          "type": "string",
          "description": "IPS protection unique identifier.\n"
        },
        "track": {
          "type": "string",
          "description": "Tracking method for protection.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "capturePackets",
        "default",
        "final",
        "protection",
        "protectionExternalInfos",
        "protectionUid",
        "track"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatRuleExceptionRulebaseObjectsDictionary:getManagementThreatRuleExceptionRulebaseObjectsDictionary": {
      "properties": {
        "name": {
          "type": "string",
          "description": "The name of the Object.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatRuleExceptionRulebaseRulebase:getManagementThreatRuleExceptionRulebaseRulebase": {
      "properties": {
        "from": {
          "type": "number",
          "description": "From which element number the query was done.\n"
        },
        "name": {
          "type": "string",
          "description": "The name of the exception group.\n"
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementThreatRuleExceptionRulebaseRulebaseRulebase:getManagementThreatRuleExceptionRulebaseRulebaseRulebase"
          },
          "description": "Array that contain threat exception for a specific exception group.\n"
        },
        "to": {
          "type": "number",
          "description": "To which element number the query was done.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "from",
        "name",
        "rulebases",
        "to",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatRuleExceptionRulebaseRulebaseRulebase:getManagementThreatRuleExceptionRulebaseRulebaseRulebase": {
      "properties": {
        "action": {
          "type": "string",
          "description": "Action-the enforced profile.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "exceptionNumber": {
          "type": "string"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "name": {
          "type": "string",
          "description": "The name of the exception group.\n"
        },
        "protectedScopeNegate": {
          "type": "boolean",
          "description": "True if negate is set for Protected Scope.\n"
        },
        "protectedScopes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
        },
        "protectionOrSites": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "track": {
          "type": "string",
          "description": "Packet tracking.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "destinationNegate",
        "destinations",
        "exceptionNumber",
        "installOns",
        "name",
        "protectedScopeNegate",
        "protectedScopes",
        "protectionOrSites",
        "serviceNegate",
        "services",
        "sourceNegate",
        "sources",
        "track",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatRulebaseOrder:getManagementThreatRulebaseOrder": {
      "properties": {
        "asc": {
          "type": "string",
          "description": "Sorts results by the given field in ascending order.\n"
        },
        "desc": {
          "type": "string",
          "description": "Sorts results by the given field in descending order.\n"
        }
      },
      "type": "object"
    },
    "checkpoint:index/getManagementThreatRulebaseRulebase:getManagementThreatRulebaseRulebase": {
      "properties": {
        "from": {
          "type": "number"
        },
        "objectsDictionaries": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementThreatRulebaseRulebaseObjectsDictionary:getManagementThreatRulebaseRulebaseObjectsDictionary"
          }
        },
        "rulebases": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementThreatRulebaseRulebaseRulebase:getManagementThreatRulebaseRulebaseRulebase"
          }
        },
        "to": {
          "type": "number"
        },
        "total": {
          "type": "number"
        }
      },
      "type": "object",
      "required": [
        "from",
        "objectsDictionaries",
        "rulebases",
        "to",
        "total"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatRulebaseRulebaseObjectsDictionary:getManagementThreatRulebaseRulebaseObjectsDictionary": {
      "properties": {
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementThreatRulebaseRulebaseRulebase:getManagementThreatRulebaseRulebaseRulebase": {
      "properties": {
        "action": {
          "type": "string"
        },
        "comments": {
          "type": "string"
        },
        "destinationNegate": {
          "type": "boolean"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "enabled": {
          "type": "boolean"
        },
        "exceptions": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "exceptionsLayer": {
          "type": "string"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "protectedScopeNegate": {
          "type": "boolean"
        },
        "protectedScopes": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "ruleNumber": {
          "type": "number"
        },
        "serviceNegate": {
          "type": "boolean"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "sourceNegate": {
          "type": "boolean"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "track": {
          "type": "string"
        },
        "trackSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          }
        },
        "type": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "action",
        "comments",
        "destinationNegate",
        "destinations",
        "enabled",
        "exceptions",
        "exceptionsLayer",
        "installOns",
        "name",
        "protectedScopeNegate",
        "protectedScopes",
        "ruleNumber",
        "serviceNegate",
        "services",
        "sourceNegate",
        "sources",
        "track",
        "trackSettings",
        "type",
        "uid"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementTimeHourRange:getManagementTimeHourRange": {
      "properties": {
        "enabled": {
          "type": "boolean"
        },
        "from": {
          "type": "string"
        },
        "index": {
          "type": "number"
        },
        "to": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "from",
        "index",
        "to"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementTimeRecurrence:getManagementTimeRecurrence": {
      "properties": {
        "days": {
          "type": "array",
          "items": {
            "type": "string"
          }
        },
        "month": {
          "type": "string"
        },
        "pattern": {
          "type": "string"
        },
        "weekdays": {
          "type": "array",
          "items": {
            "type": "string"
          }
        }
      },
      "type": "object",
      "required": [
        "days",
        "month",
        "pattern",
        "weekdays"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementUpdatableObjectUpdatableObjectMetaInfo:getManagementUpdatableObjectUpdatableObjectMetaInfo": {
      "properties": {
        "updatedOnUpdatableObjectsRepositories": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FgetManagementUpdatableObjectUpdatableObjectMetaInfoUpdatedOnUpdatableObjectsRepository:getManagementUpdatableObjectUpdatableObjectMetaInfoUpdatedOnUpdatableObjectsRepository"
          },
          "description": "Last update time from the Updatable Objects Repository.\n"
        }
      },
      "type": "object",
      "required": [
        "updatedOnUpdatableObjectsRepositories"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementUpdatableObjectUpdatableObjectMetaInfoUpdatedOnUpdatableObjectsRepository:getManagementUpdatableObjectUpdatableObjectMetaInfoUpdatedOnUpdatableObjectsRepository": {
      "properties": {
        "iso8601": {
          "type": "string",
          "description": "Last update time in iso format.\n"
        },
        "posix": {
          "type": "number",
          "description": "Last update time in posix format.\n"
        }
      },
      "type": "object",
      "required": [
        "iso8601",
        "posix"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementVoipDomainH323GatekeeperRoutingMode:getManagementVoipDomainH323GatekeeperRoutingMode": {
      "properties": {
        "callSetup": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes call setup (Q.931).\n"
        },
        "callSetupAndCallControl": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes both call setup (Q.931) and call control (H.245).\n"
        },
        "direct": {
          "type": "boolean",
          "description": "Indicates whether the routing mode is direct.\n"
        }
      },
      "type": "object",
      "required": [
        "callSetup",
        "callSetupAndCallControl",
        "direct"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementVoipDomainH323GatewayRoutingMode:getManagementVoipDomainH323GatewayRoutingMode": {
      "properties": {
        "callSetup": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes call setup (Q.931).\n"
        },
        "callSetupAndCallControl": {
          "type": "boolean",
          "description": "Indicates whether the routing mode includes both call setup (Q.931) and call control (H.245).\n"
        }
      },
      "type": "object",
      "required": [
        "callSetup",
        "callSetupAndCallControl"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    },
    "checkpoint:index/getManagementVpnCommunityRemoteAccessOverrideVpnDomain:getManagementVpnCommunityRemoteAccessOverrideVpnDomain": {
      "properties": {
        "gateway": {
          "type": "string",
          "description": "Participant gateway in override VPN domain identified by the name or UID.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "VPN domain network identified by the name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "gateway",
        "vpnDomain"
      ],
      "language": {
        "nodejs": {
          "requiredInputs": []
        }
      }
    }
  },
  "provider": {
    "description": "The provider type for the checkpoint package. By default, resources use package-wide configuration\nsettings, however an explicit `Provider` instance may be created and passed during resource\nconstruction to achieve fine-grained programmatic control over provider settings. See the\n[documentation](https://www.pulumi.com/docs/reference/programming-model/#providers) for more information.\n",
    "properties": {
      "apiKey": {
        "type": "string",
        "description": "Administrator API key"
      },
      "cloudMgmtId": {
        "type": "string",
        "description": "Smart-1 Cloud management UID"
      },
      "context": {
        "type": "string",
        "description": "Check Point access context -<span pulumi-lang-nodejs=\" gaiaApi \" pulumi-lang-dotnet=\" GaiaApi \" pulumi-lang-go=\" gaiaApi \" pulumi-lang-python=\" gaia_api \" pulumi-lang-yaml=\" gaiaApi \" pulumi-lang-java=\" gaiaApi \"> gaia_api </span>or web_api"
      },
      "domain": {
        "type": "string",
        "description": "login to specific domain. Domain can be identified by name or UID"
      },
      "password": {
        "type": "string",
        "description": "Check Point Management admin password"
      },
      "proxyHost": {
        "type": "string",
        "description": "HTTP proxy server address (without \"http://\")"
      },
      "server": {
        "type": "string",
        "description": "Check Point Management server IP"
      },
      "sessionDescription": {
        "type": "string",
        "description": "Session purpose description"
      },
      "sessionFileName": {
        "type": "string",
        "description": "File name used to store the current session id"
      },
      "sessionName": {
        "type": "string",
        "description": "Session unique name"
      },
      "username": {
        "type": "string",
        "description": "Check Point Management admin name"
      }
    },
    "type": "object",
    "inputProperties": {
      "apiKey": {
        "type": "string",
        "description": "Administrator API key"
      },
      "autoPublishBatchSize": {
        "type": "number",
        "description": "Number of batch size to automatically run publish"
      },
      "cloudMgmtId": {
        "type": "string",
        "description": "Smart-1 Cloud management UID"
      },
      "context": {
        "type": "string",
        "description": "Check Point access context -<span pulumi-lang-nodejs=\" gaiaApi \" pulumi-lang-dotnet=\" GaiaApi \" pulumi-lang-go=\" gaiaApi \" pulumi-lang-python=\" gaia_api \" pulumi-lang-yaml=\" gaiaApi \" pulumi-lang-java=\" gaiaApi \"> gaia_api </span>or web_api"
      },
      "domain": {
        "type": "string",
        "description": "login to specific domain. Domain can be identified by name or UID"
      },
      "ignoreServerCertificate": {
        "type": "boolean",
        "description": "Indicates that the client should not check the server's certificate"
      },
      "password": {
        "type": "string",
        "description": "Check Point Management admin password"
      },
      "port": {
        "type": "number",
        "description": "Port used for connection to the API server"
      },
      "proxyHost": {
        "type": "string",
        "description": "HTTP proxy server address (without \"http://\")"
      },
      "proxyPort": {
        "type": "number",
        "description": "HTTP proxy port"
      },
      "server": {
        "type": "string",
        "description": "Check Point Management server IP"
      },
      "sessionDescription": {
        "type": "string",
        "description": "Session purpose description"
      },
      "sessionFileName": {
        "type": "string",
        "description": "File name used to store the current session id"
      },
      "sessionName": {
        "type": "string",
        "description": "Session unique name"
      },
      "sessionTimeout": {
        "type": "number",
        "description": "Timeout for the Check Point session in seconds. Can be 10-3600"
      },
      "timeout": {
        "type": "number",
        "description": "Timeout in seconds for the Go SDK to complete a transaction"
      },
      "username": {
        "type": "string",
        "description": "Check Point Management admin name"
      }
    },
    "methods": {
      "terraformConfig": "pulumi:providers:checkpoint/terraformConfig"
    }
  },
  "resources": {
    "checkpoint:index/genericApi:GenericApi": {
      "description": "This resource allows you to execute Check Point generic Management API or GAIA API.<br>\nSee the [Management API reference](https://sc1.checkpoint.com/documents/latest/APIs/index.html) or [GAIA API reference](https://sc1.checkpoint.com/documents/latest/GaiaAPIs/index.html) for a complete list of APIs you can run on your Check Point server.<br>\n<b>NOTE:</b> When configure provider context to <span pulumi-lang-nodejs=\"`gaiaApi`\" pulumi-lang-dotnet=\"`GaiaApi`\" pulumi-lang-go=\"`gaiaApi`\" pulumi-lang-python=\"`gaia_api`\" pulumi-lang-yaml=\"`gaiaApi`\" pulumi-lang-java=\"`gaiaApi`\">`gaia_api`</span> you can run only GAIA API. Management API will not be supported.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\n// Run generic Management API when provider context is 'web_api'\nconst api1 = new checkpoint.GenericApi(\"api1\", {\n    apiCommand: \"add-host\",\n    payload: `  {\n    \\\\\"name\\\\\": \\\\\"host1\\\\\",\n    \\\\\"ip-address\\\\\": \\\\\"1.2.3.4\\\\\"\n  }\n`,\n});\n// Run generic Management API when provider context is 'web_api'\nconst api2 = new checkpoint.GenericApi(\"api2\", {apiCommand: \"show-hosts\"});\n// Run generic Management API when provider context is 'web_api'\nconst api3 = new checkpoint.GenericApi(\"api3\", {\n    apiCommand: \"gaia-api/show-proxy\",\n    payload: `  {\n    \\\\\"target\\\\\": \\\\\"gateway1\\\\\"\n  }\n`,\n});\n// Run generic GAIA API when provider context is 'gaia_api'\nconst api4 = new checkpoint.GenericApi(\"api4\", {apiCommand: \"show-proxy\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\n# Run generic Management API when provider context is 'web_api'\napi1 = checkpoint.GenericApi(\"api1\",\n    api_command=\"add-host\",\n    payload=\"\"\"  {\n    \\\"name\\\": \\\"host1\\\",\n    \\\"ip-address\\\": \\\"1.2.3.4\\\"\n  }\n\"\"\")\n# Run generic Management API when provider context is 'web_api'\napi2 = checkpoint.GenericApi(\"api2\", api_command=\"show-hosts\")\n# Run generic Management API when provider context is 'web_api'\napi3 = checkpoint.GenericApi(\"api3\",\n    api_command=\"gaia-api/show-proxy\",\n    payload=\"\"\"  {\n    \\\"target\\\": \\\"gateway1\\\"\n  }\n\"\"\")\n# Run generic GAIA API when provider context is 'gaia_api'\napi4 = checkpoint.GenericApi(\"api4\", api_command=\"show-proxy\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    // Run generic Management API when provider context is 'web_api'\n    var api1 = new Checkpoint.GenericApi(\"api1\", new()\n    {\n        ApiCommand = \"add-host\",\n        Payload = @\"  {\n    \\\"\"name\\\"\": \\\"\"host1\\\"\",\n    \\\"\"ip-address\\\"\": \\\"\"1.2.3.4\\\"\"\n  }\n\",\n    });\n\n    // Run generic Management API when provider context is 'web_api'\n    var api2 = new Checkpoint.GenericApi(\"api2\", new()\n    {\n        ApiCommand = \"show-hosts\",\n    });\n\n    // Run generic Management API when provider context is 'web_api'\n    var api3 = new Checkpoint.GenericApi(\"api3\", new()\n    {\n        ApiCommand = \"gaia-api/show-proxy\",\n        Payload = @\"  {\n    \\\"\"target\\\"\": \\\"\"gateway1\\\"\"\n  }\n\",\n    });\n\n    // Run generic GAIA API when provider context is 'gaia_api'\n    var api4 = new Checkpoint.GenericApi(\"api4\", new()\n    {\n        ApiCommand = \"show-proxy\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t// Run generic Management API when provider context is 'web_api'\n\t\t_, err := checkpoint.NewGenericApi(ctx, \"api1\", &checkpoint.GenericApiArgs{\n\t\t\tApiCommand: pulumi.String(\"add-host\"),\n\t\t\tPayload:    pulumi.String(\"  {\\n    \\\\\\\"name\\\\\\\": \\\\\\\"host1\\\\\\\",\\n    \\\\\\\"ip-address\\\\\\\": \\\\\\\"1.2.3.4\\\\\\\"\\n  }\\n\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Run generic Management API when provider context is 'web_api'\n\t\t_, err = checkpoint.NewGenericApi(ctx, \"api2\", &checkpoint.GenericApiArgs{\n\t\t\tApiCommand: pulumi.String(\"show-hosts\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Run generic Management API when provider context is 'web_api'\n\t\t_, err = checkpoint.NewGenericApi(ctx, \"api3\", &checkpoint.GenericApiArgs{\n\t\t\tApiCommand: pulumi.String(\"gaia-api/show-proxy\"),\n\t\t\tPayload:    pulumi.String(\"  {\\n    \\\\\\\"target\\\\\\\": \\\\\\\"gateway1\\\\\\\"\\n  }\\n\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Run generic GAIA API when provider context is 'gaia_api'\n\t\t_, err = checkpoint.NewGenericApi(ctx, \"api4\", &checkpoint.GenericApiArgs{\n\t\t\tApiCommand: pulumi.String(\"show-proxy\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.GenericApi;\nimport com.pulumi.checkpoint.GenericApiArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        // Run generic Management API when provider context is 'web_api'\n        var api1 = new GenericApi(\"api1\", GenericApiArgs.builder()\n            .apiCommand(\"add-host\")\n            .payload(\"\"\"\n  {\n    \\\"name\\\": \\\"host1\\\",\n    \\\"ip-address\\\": \\\"1.2.3.4\\\"\n  }\n            \"\"\")\n            .build());\n\n        // Run generic Management API when provider context is 'web_api'\n        var api2 = new GenericApi(\"api2\", GenericApiArgs.builder()\n            .apiCommand(\"show-hosts\")\n            .build());\n\n        // Run generic Management API when provider context is 'web_api'\n        var api3 = new GenericApi(\"api3\", GenericApiArgs.builder()\n            .apiCommand(\"gaia-api/show-proxy\")\n            .payload(\"\"\"\n  {\n    \\\"target\\\": \\\"gateway1\\\"\n  }\n            \"\"\")\n            .build());\n\n        // Run generic GAIA API when provider context is 'gaia_api'\n        var api4 = new GenericApi(\"api4\", GenericApiArgs.builder()\n            .apiCommand(\"show-proxy\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  # Run generic Management API when provider context is 'web_api'\n  api1:\n    type: checkpoint:GenericApi\n    properties:\n      apiCommand: add-host\n      payload: |2\n          {\n            \\\"name\\\": \\\"host1\\\",\n            \\\"ip-address\\\": \\\"1.2.3.4\\\"\n          }\n  # Run generic Management API when provider context is 'web_api'\n  api2:\n    type: checkpoint:GenericApi\n    properties:\n      apiCommand: show-hosts\n  # Run generic Management API when provider context is 'web_api'\n  api3:\n    type: checkpoint:GenericApi\n    properties:\n      apiCommand: gaia-api/show-proxy\n      payload: |2\n          {\n            \\\"target\\\": \\\"gateway1\\\"\n          }\n  # Run generic GAIA API when provider context is 'gaia_api'\n  api4:\n    type: checkpoint:GenericApi\n    properties:\n      apiCommand: show-proxy\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "apiCommand": {
          "type": "string",
          "description": "API command name or path.\n"
        },
        "genericApiId": {
          "type": "string"
        },
        "method": {
          "type": "string",
          "description": "HTTP request method. Default is `POST`.\n"
        },
        "payload": {
          "type": "string",
          "description": "Request payload in JSON format. You can use heredoc strings to write freestyle JSON.\n"
        },
        "response": {
          "type": "string",
          "description": "Response message in JSON format.\n"
        }
      },
      "type": "object",
      "required": [
        "apiCommand",
        "genericApiId",
        "response"
      ],
      "inputProperties": {
        "apiCommand": {
          "type": "string",
          "description": "API command name or path.\n"
        },
        "genericApiId": {
          "type": "string"
        },
        "method": {
          "type": "string",
          "description": "HTTP request method. Default is `POST`.\n"
        },
        "payload": {
          "type": "string",
          "description": "Request payload in JSON format. You can use heredoc strings to write freestyle JSON.\n"
        }
      },
      "requiredInputs": [
        "apiCommand"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering GenericApi resources.\n",
        "properties": {
          "apiCommand": {
            "type": "string",
            "description": "API command name or path.\n"
          },
          "genericApiId": {
            "type": "string"
          },
          "method": {
            "type": "string",
            "description": "HTTP request method. Default is `POST`.\n"
          },
          "payload": {
            "type": "string",
            "description": "Request payload in JSON format. You can use heredoc strings to write freestyle JSON.\n"
          },
          "response": {
            "type": "string",
            "description": "Response message in JSON format.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/hostname:Hostname": {
      "description": "This resource allows you to set the hostname of a Check Point machine.\n<br>NOTE: This is GAIA API resource and require set provider context to <span pulumi-lang-nodejs=\"`gaiaApi`\" pulumi-lang-dotnet=\"`GaiaApi`\" pulumi-lang-go=\"`gaiaApi`\" pulumi-lang-python=\"`gaia_api`\" pulumi-lang-yaml=\"`gaiaApi`\" pulumi-lang-java=\"`gaiaApi`\">`gaia_api`</span>.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst hostname = new checkpoint.Hostname(\"hostname\", {name: \"terrahost\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhostname = checkpoint.Hostname(\"hostname\", name=\"terrahost\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var hostname = new Checkpoint.Hostname(\"hostname\", new()\n    {\n        Name = \"terrahost\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewHostname(ctx, \"hostname\", &checkpoint.HostnameArgs{\n\t\t\tName: pulumi.String(\"terrahost\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.Hostname;\nimport com.pulumi.checkpoint.HostnameArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var hostname = new Hostname(\"hostname\", HostnameArgs.builder()\n            .name(\"terrahost\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  hostname:\n    type: checkpoint:Hostname\n    properties:\n      name: terrahost\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "hostnameId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "New hostname to change.\n"
        }
      },
      "type": "object",
      "required": [
        "hostnameId",
        "name"
      ],
      "inputProperties": {
        "hostnameId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "New hostname to change.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering Hostname resources.\n",
        "properties": {
          "hostnameId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "New hostname to change.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAccessLayer:ManagementAccessLayer": {
      "description": "This resource allows you to execute Check Point Access Layer.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementAccessLayer(\"example\", {name: \"New Layer 1\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementAccessLayer(\"example\", name=\"New Layer 1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementAccessLayer(\"example\", new()\n    {\n        Name = \"New Layer 1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAccessLayer(ctx, \"example\", &checkpoint.ManagementAccessLayerArgs{\n\t\t\tName: pulumi.String(\"New Layer 1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessLayer;\nimport com.pulumi.checkpoint.ManagementAccessLayerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementAccessLayer(\"example\", ManagementAccessLayerArgs.builder()\n            .name(\"New Layer 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementAccessLayer\n    properties:\n      name: New Layer 1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "addDefaultRule": {
          "type": "boolean",
          "description": "Indicates whether to include a cleanup rule in the new layer.\n"
        },
        "applicationsAndUrlFiltering": {
          "type": "boolean",
          "description": "Whether to enable Applications & URL Filtering blade on the layer.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Whether to enable Content Awareness blade on the layer.\n"
        },
        "detectUsingXForwardFor": {
          "type": "boolean",
          "description": "Whether to use X-Forward-For HTTP header, which is added by the  proxy server to keep track of the original source IP.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Whether to enable Firewall blade on the layer.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "implicitCleanupAction": {
          "type": "string",
          "description": "The default \"catch-all\" action for traffic that does not match any explicit or implied rules in the layer.\n"
        },
        "managementAccessLayerId": {
          "type": "string"
        },
        "mobileAccess": {
          "type": "boolean",
          "description": "Whether to enable Mobile Access blade on the layer.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "shared": {
          "type": "boolean",
          "description": "Whether this layer is shared.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAccessLayerId",
        "name"
      ],
      "inputProperties": {
        "addDefaultRule": {
          "type": "boolean",
          "description": "Indicates whether to include a cleanup rule in the new layer.\n"
        },
        "applicationsAndUrlFiltering": {
          "type": "boolean",
          "description": "Whether to enable Applications & URL Filtering blade on the layer.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Whether to enable Content Awareness blade on the layer.\n"
        },
        "detectUsingXForwardFor": {
          "type": "boolean",
          "description": "Whether to use X-Forward-For HTTP header, which is added by the  proxy server to keep track of the original source IP.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Whether to enable Firewall blade on the layer.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "implicitCleanupAction": {
          "type": "string",
          "description": "The default \"catch-all\" action for traffic that does not match any explicit or implied rules in the layer.\n"
        },
        "managementAccessLayerId": {
          "type": "string"
        },
        "mobileAccess": {
          "type": "boolean",
          "description": "Whether to enable Mobile Access blade on the layer.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "shared": {
          "type": "boolean",
          "description": "Whether this layer is shared.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAccessLayer resources.\n",
        "properties": {
          "addDefaultRule": {
            "type": "boolean",
            "description": "Indicates whether to include a cleanup rule in the new layer.\n"
          },
          "applicationsAndUrlFiltering": {
            "type": "boolean",
            "description": "Whether to enable Applications & URL Filtering blade on the layer.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "contentAwareness": {
            "type": "boolean",
            "description": "Whether to enable Content Awareness blade on the layer.\n"
          },
          "detectUsingXForwardFor": {
            "type": "boolean",
            "description": "Whether to use X-Forward-For HTTP header, which is added by the  proxy server to keep track of the original source IP.\n"
          },
          "firewall": {
            "type": "boolean",
            "description": "Whether to enable Firewall blade on the layer.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "implicitCleanupAction": {
            "type": "string",
            "description": "The default \"catch-all\" action for traffic that does not match any explicit or implied rules in the layer.\n"
          },
          "managementAccessLayerId": {
            "type": "string"
          },
          "mobileAccess": {
            "type": "boolean",
            "description": "Whether to enable Mobile Access blade on the layer.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "shared": {
            "type": "boolean",
            "description": "Whether this layer is shared.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAccessPointName:ManagementAccessPointName": {
      "description": "This resource allows you to execute Check Point Access Point Name.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementAccessPointName(\"example\", {\n    name: \"myaccesspointname\",\n    apn: \"apnname\",\n    enforceEndUserDomain: true,\n    endUserDomain: \"All_Internet\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementAccessPointName(\"example\",\n    name=\"myaccesspointname\",\n    apn=\"apnname\",\n    enforce_end_user_domain=True,\n    end_user_domain=\"All_Internet\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementAccessPointName(\"example\", new()\n    {\n        Name = \"myaccesspointname\",\n        Apn = \"apnname\",\n        EnforceEndUserDomain = true,\n        EndUserDomain = \"All_Internet\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAccessPointName(ctx, \"example\", &checkpoint.ManagementAccessPointNameArgs{\n\t\t\tName:                 pulumi.String(\"myaccesspointname\"),\n\t\t\tApn:                  pulumi.String(\"apnname\"),\n\t\t\tEnforceEndUserDomain: pulumi.Bool(true),\n\t\t\tEndUserDomain:        pulumi.String(\"All_Internet\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessPointName;\nimport com.pulumi.checkpoint.ManagementAccessPointNameArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementAccessPointName(\"example\", ManagementAccessPointNameArgs.builder()\n            .name(\"myaccesspointname\")\n            .apn(\"apnname\")\n            .enforceEndUserDomain(true)\n            .endUserDomain(\"All_Internet\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementAccessPointName\n    properties:\n      name: myaccesspointname\n      apn: apnname\n      enforceEndUserDomain: true\n      endUserDomain: All_Internet\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "apn": {
          "type": "string",
          "description": "APN name.\n"
        },
        "blockTrafficOtherEndUserDomains": {
          "type": "boolean",
          "description": "Block MS to MS traffic between this and other APN end user domains.\n"
        },
        "blockTrafficThisEndUserDomain": {
          "type": "boolean",
          "description": "Block MS to MS traffic within this end user domain.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endUserDomain": {
          "type": "string",
          "description": "End user domain name or UID.\n"
        },
        "enforceEndUserDomain": {
          "type": "boolean",
          "description": "Enable enforce end user domain.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAccessPointNameId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAccessPointNameId",
        "name"
      ],
      "inputProperties": {
        "apn": {
          "type": "string",
          "description": "APN name.\n"
        },
        "blockTrafficOtherEndUserDomains": {
          "type": "boolean",
          "description": "Block MS to MS traffic between this and other APN end user domains.\n"
        },
        "blockTrafficThisEndUserDomain": {
          "type": "boolean",
          "description": "Block MS to MS traffic within this end user domain.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endUserDomain": {
          "type": "string",
          "description": "End user domain name or UID.\n"
        },
        "enforceEndUserDomain": {
          "type": "boolean",
          "description": "Enable enforce end user domain.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAccessPointNameId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAccessPointName resources.\n",
        "properties": {
          "apn": {
            "type": "string",
            "description": "APN name.\n"
          },
          "blockTrafficOtherEndUserDomains": {
            "type": "boolean",
            "description": "Block MS to MS traffic between this and other APN end user domains.\n"
          },
          "blockTrafficThisEndUserDomain": {
            "type": "boolean",
            "description": "Block MS to MS traffic within this end user domain.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "endUserDomain": {
            "type": "string",
            "description": "End user domain name or UID.\n"
          },
          "enforceEndUserDomain": {
            "type": "boolean",
            "description": "Enable enforce end user domain.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAccessPointNameId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAccessRole:ManagementAccessRole": {
      "description": "This resource allows you to execute Check Point Access Role.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementAccessRole(\"example\", {\n    name: \"New Access Role 1\",\n    machines: [{\n        source: \"any\",\n        selections: [\"any\"],\n    }],\n    users: [{\n        source: \"all identified\",\n        selections: [\"all identified\"],\n    }],\n    tags: [\"terraform\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementAccessRole(\"example\",\n    name=\"New Access Role 1\",\n    machines=[{\n        \"source\": \"any\",\n        \"selections\": [\"any\"],\n    }],\n    users=[{\n        \"source\": \"all identified\",\n        \"selections\": [\"all identified\"],\n    }],\n    tags=[\"terraform\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementAccessRole(\"example\", new()\n    {\n        Name = \"New Access Role 1\",\n        Machines = new[]\n        {\n            new Checkpoint.Inputs.ManagementAccessRoleMachineArgs\n            {\n                Source = \"any\",\n                Selections = new[]\n                {\n                    \"any\",\n                },\n            },\n        },\n        Users = new[]\n        {\n            new Checkpoint.Inputs.ManagementAccessRoleUserArgs\n            {\n                Source = \"all identified\",\n                Selections = new[]\n                {\n                    \"all identified\",\n                },\n            },\n        },\n        Tags = new[]\n        {\n            \"terraform\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAccessRole(ctx, \"example\", &checkpoint.ManagementAccessRoleArgs{\n\t\t\tName: pulumi.String(\"New Access Role 1\"),\n\t\t\tMachines: checkpoint.ManagementAccessRoleMachineArray{\n\t\t\t\t&checkpoint.ManagementAccessRoleMachineArgs{\n\t\t\t\t\tSource: pulumi.String(\"any\"),\n\t\t\t\t\tSelections: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"any\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tUsers: checkpoint.ManagementAccessRoleUserArray{\n\t\t\t\t&checkpoint.ManagementAccessRoleUserArgs{\n\t\t\t\t\tSource: pulumi.String(\"all identified\"),\n\t\t\t\t\tSelections: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"all identified\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"terraform\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessRole;\nimport com.pulumi.checkpoint.ManagementAccessRoleArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAccessRoleMachineArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAccessRoleUserArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementAccessRole(\"example\", ManagementAccessRoleArgs.builder()\n            .name(\"New Access Role 1\")\n            .machines(ManagementAccessRoleMachineArgs.builder()\n                .source(\"any\")\n                .selections(\"any\")\n                .build())\n            .users(ManagementAccessRoleUserArgs.builder()\n                .source(\"all identified\")\n                .selections(\"all identified\")\n                .build())\n            .tags(\"terraform\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementAccessRole\n    properties:\n      name: New Access Role 1\n      machines:\n        - source: any\n          selections:\n            - any\n      users:\n        - source: all identified\n          selections:\n            - all identified\n      tags:\n        - terraform\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "machines": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRoleMachine:ManagementAccessRoleMachine"
          },
          "description": "Machines that can access the system.machines blocks are documented below.\n"
        },
        "managementAccessRoleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "networks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID that can access the\nsystem.networks blocks are documented below.\n"
        },
        "remoteAccessClients": {
          "type": "string",
          "description": "Remote access clients identified by name or UID.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "timeouts": {
          "$ref": "#/types/checkpoint:index%2FManagementAccessRoleTimeouts:ManagementAccessRoleTimeouts"
        },
        "users": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRoleUser:ManagementAccessRoleUser"
          },
          "description": "Users that can access the system.users blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAccessRoleId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "machines": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRoleMachine:ManagementAccessRoleMachine"
          },
          "description": "Machines that can access the system.machines blocks are documented below.\n"
        },
        "managementAccessRoleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "networks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID that can access the\nsystem.networks blocks are documented below.\n"
        },
        "remoteAccessClients": {
          "type": "string",
          "description": "Remote access clients identified by name or UID.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "timeouts": {
          "$ref": "#/types/checkpoint:index%2FManagementAccessRoleTimeouts:ManagementAccessRoleTimeouts"
        },
        "users": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRoleUser:ManagementAccessRoleUser"
          },
          "description": "Users that can access the system.users blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAccessRole resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "machines": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementAccessRoleMachine:ManagementAccessRoleMachine"
            },
            "description": "Machines that can access the system.machines blocks are documented below.\n"
          },
          "managementAccessRoleId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "networks": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID that can access the\nsystem.networks blocks are documented below.\n"
          },
          "remoteAccessClients": {
            "type": "string",
            "description": "Remote access clients identified by name or UID.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "timeouts": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRoleTimeouts:ManagementAccessRoleTimeouts"
          },
          "users": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementAccessRoleUser:ManagementAccessRoleUser"
            },
            "description": "Users that can access the system.users blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAccessRule:ManagementAccessRule": {
      "description": "This resource allows you to add/update/delete Check Point Access Rule.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst rule1 = new checkpoint.ManagementAccessRule(\"rule1\", {\n    name: \"Rule 1\",\n    layer: \"Network\",\n    position: {\n        top: \"top\",\n    },\n    sources: [\"Any\"],\n    destinations: [\"Any\"],\n    services: [\"Any\"],\n    contents: [\"Any\"],\n    times: [\"Any\"],\n    installOns: [\"Policy Targets\"],\n    track: {\n        type: \"Log\",\n        accounting: \"false\",\n        alert: \"none\",\n        enable_firewall_session: \"false\",\n        per_connection: \"true\",\n        per_session: \"false\",\n    },\n    actionSettings: {},\n    customFields: {},\n    vpn: \"Any\",\n});\nconst rule2 = new checkpoint.ManagementAccessRule(\"rule2\", {\n    name: \"Rule 2\",\n    layer: \"Network\",\n    position: {\n        below: rule1.name,\n    },\n    enabled: true,\n    sources: [\n        \"DMZNet\",\n        \"DMZZone\",\n        \"WirelessZone\",\n    ],\n    destinations: [\n        \"InternalNet\",\n        \"CPDShield\",\n    ],\n    destinationNegate: true,\n    services: [\"Any\"],\n    contents: [\"Any\"],\n    times: [\"Any\"],\n    installOns: [\"Policy Targets\"],\n    track: {\n        type: \"Log\",\n        accounting: \"false\",\n        alert: \"none\",\n        enable_firewall_session: \"false\",\n        per_connection: \"true\",\n        per_session: \"false\",\n    },\n    actionSettings: {},\n    customFields: {},\n    vpn: \"All_GwToGw\",\n});\nconst rule3 = new checkpoint.ManagementAccessRule(\"rule3\", {\n    name: \"Rule 3\",\n    layer: \"Network\",\n    position: {\n        below: rule2.name,\n    },\n    action: \"Accept\",\n    actionSettings: {\n        enable_identity_captive_portal: \"true\",\n    },\n    sources: [\"DMZNet\"],\n    enabled: true,\n    destinations: [\"InternalNet\"],\n    destinationNegate: true,\n    services: [\"EDGE\"],\n    contents: [\"Any\"],\n    times: [\"Weekend\"],\n    installOns: [\"Policy Targets\"],\n    track: {\n        type: \"Log\",\n        accounting: \"false\",\n        alert: \"none\",\n        enable_firewall_session: \"false\",\n        per_connection: \"true\",\n        per_session: \"false\",\n    },\n    customFields: {},\n    vpnCommunities: [\n        \"StarCommunity\",\n        \"MeshedCommunity\",\n    ],\n});\nconst rule4 = new checkpoint.ManagementAccessRule(\"rule4\", {\n    name: \"Rule 4\",\n    layer: \"Network\",\n    position: {\n        below: rule3.name,\n    },\n    enabled: false,\n    sources: [\"Any\"],\n    destinations: [\"Any\"],\n    services: [\"Any\"],\n    contents: [\"Any\"],\n    times: [\"Any\"],\n    installOns: [\"Policy Targets\"],\n    track: {\n        type: \"Log\",\n        accounting: \"false\",\n        alert: \"none\",\n        enable_firewall_session: \"false\",\n        per_connection: \"true\",\n        per_session: \"false\",\n    },\n    actionSettings: {},\n    customFields: {},\n    vpnDirectionals: [{\n        from: \"StarVpn\",\n        to: \"MeshedCommunity\",\n    }],\n});\nconst rule5 = new checkpoint.ManagementAccessRule(\"rule5\", {\n    name: \"Rule 5\",\n    layer: \"Network\",\n    position: {\n        below: rule4.name,\n    },\n    action: \"Accept\",\n    actionSettings: {\n        enable_identity_captive_portal: \"false\",\n    },\n    sources: [\"Any\"],\n    destinations: [\"Any\"],\n    services: [\"Any\"],\n    contents: [\"Any\"],\n    times: [\"Any\"],\n    installOns: [\"Policy Targets\"],\n    track: {\n        type: \"Log\",\n        accounting: \"false\",\n        alert: \"none\",\n        enable_firewall_session: \"false\",\n        per_connection: \"true\",\n        per_session: \"false\",\n    },\n    customFields: {},\n    vpn: \"Any\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nrule1 = checkpoint.ManagementAccessRule(\"rule1\",\n    name=\"Rule 1\",\n    layer=\"Network\",\n    position={\n        \"top\": \"top\",\n    },\n    sources=[\"Any\"],\n    destinations=[\"Any\"],\n    services=[\"Any\"],\n    contents=[\"Any\"],\n    times=[\"Any\"],\n    install_ons=[\"Policy Targets\"],\n    track={\n        \"type\": \"Log\",\n        \"accounting\": \"false\",\n        \"alert\": \"none\",\n        \"enable_firewall_session\": \"false\",\n        \"per_connection\": \"true\",\n        \"per_session\": \"false\",\n    },\n    action_settings={},\n    custom_fields={},\n    vpn=\"Any\")\nrule2 = checkpoint.ManagementAccessRule(\"rule2\",\n    name=\"Rule 2\",\n    layer=\"Network\",\n    position={\n        \"below\": rule1.name,\n    },\n    enabled=True,\n    sources=[\n        \"DMZNet\",\n        \"DMZZone\",\n        \"WirelessZone\",\n    ],\n    destinations=[\n        \"InternalNet\",\n        \"CPDShield\",\n    ],\n    destination_negate=True,\n    services=[\"Any\"],\n    contents=[\"Any\"],\n    times=[\"Any\"],\n    install_ons=[\"Policy Targets\"],\n    track={\n        \"type\": \"Log\",\n        \"accounting\": \"false\",\n        \"alert\": \"none\",\n        \"enable_firewall_session\": \"false\",\n        \"per_connection\": \"true\",\n        \"per_session\": \"false\",\n    },\n    action_settings={},\n    custom_fields={},\n    vpn=\"All_GwToGw\")\nrule3 = checkpoint.ManagementAccessRule(\"rule3\",\n    name=\"Rule 3\",\n    layer=\"Network\",\n    position={\n        \"below\": rule2.name,\n    },\n    action=\"Accept\",\n    action_settings={\n        \"enable_identity_captive_portal\": \"true\",\n    },\n    sources=[\"DMZNet\"],\n    enabled=True,\n    destinations=[\"InternalNet\"],\n    destination_negate=True,\n    services=[\"EDGE\"],\n    contents=[\"Any\"],\n    times=[\"Weekend\"],\n    install_ons=[\"Policy Targets\"],\n    track={\n        \"type\": \"Log\",\n        \"accounting\": \"false\",\n        \"alert\": \"none\",\n        \"enable_firewall_session\": \"false\",\n        \"per_connection\": \"true\",\n        \"per_session\": \"false\",\n    },\n    custom_fields={},\n    vpn_communities=[\n        \"StarCommunity\",\n        \"MeshedCommunity\",\n    ])\nrule4 = checkpoint.ManagementAccessRule(\"rule4\",\n    name=\"Rule 4\",\n    layer=\"Network\",\n    position={\n        \"below\": rule3.name,\n    },\n    enabled=False,\n    sources=[\"Any\"],\n    destinations=[\"Any\"],\n    services=[\"Any\"],\n    contents=[\"Any\"],\n    times=[\"Any\"],\n    install_ons=[\"Policy Targets\"],\n    track={\n        \"type\": \"Log\",\n        \"accounting\": \"false\",\n        \"alert\": \"none\",\n        \"enable_firewall_session\": \"false\",\n        \"per_connection\": \"true\",\n        \"per_session\": \"false\",\n    },\n    action_settings={},\n    custom_fields={},\n    vpn_directionals=[{\n        \"from_\": \"StarVpn\",\n        \"to\": \"MeshedCommunity\",\n    }])\nrule5 = checkpoint.ManagementAccessRule(\"rule5\",\n    name=\"Rule 5\",\n    layer=\"Network\",\n    position={\n        \"below\": rule4.name,\n    },\n    action=\"Accept\",\n    action_settings={\n        \"enable_identity_captive_portal\": \"false\",\n    },\n    sources=[\"Any\"],\n    destinations=[\"Any\"],\n    services=[\"Any\"],\n    contents=[\"Any\"],\n    times=[\"Any\"],\n    install_ons=[\"Policy Targets\"],\n    track={\n        \"type\": \"Log\",\n        \"accounting\": \"false\",\n        \"alert\": \"none\",\n        \"enable_firewall_session\": \"false\",\n        \"per_connection\": \"true\",\n        \"per_session\": \"false\",\n    },\n    custom_fields={},\n    vpn=\"Any\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var rule1 = new Checkpoint.ManagementAccessRule(\"rule1\", new()\n    {\n        Name = \"Rule 1\",\n        Layer = \"Network\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Sources = new[]\n        {\n            \"Any\",\n        },\n        Destinations = new[]\n        {\n            \"Any\",\n        },\n        Services = new[]\n        {\n            \"Any\",\n        },\n        Contents = new[]\n        {\n            \"Any\",\n        },\n        Times = new[]\n        {\n            \"Any\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy Targets\",\n        },\n        Track = \n        {\n            { \"type\", \"Log\" },\n            { \"accounting\", \"false\" },\n            { \"alert\", \"none\" },\n            { \"enable_firewall_session\", \"false\" },\n            { \"per_connection\", \"true\" },\n            { \"per_session\", \"false\" },\n        },\n        ActionSettings = null,\n        CustomFields = null,\n        Vpn = \"Any\",\n    });\n\n    var rule2 = new Checkpoint.ManagementAccessRule(\"rule2\", new()\n    {\n        Name = \"Rule 2\",\n        Layer = \"Network\",\n        Position = \n        {\n            { \"below\", rule1.Name },\n        },\n        Enabled = true,\n        Sources = new[]\n        {\n            \"DMZNet\",\n            \"DMZZone\",\n            \"WirelessZone\",\n        },\n        Destinations = new[]\n        {\n            \"InternalNet\",\n            \"CPDShield\",\n        },\n        DestinationNegate = true,\n        Services = new[]\n        {\n            \"Any\",\n        },\n        Contents = new[]\n        {\n            \"Any\",\n        },\n        Times = new[]\n        {\n            \"Any\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy Targets\",\n        },\n        Track = \n        {\n            { \"type\", \"Log\" },\n            { \"accounting\", \"false\" },\n            { \"alert\", \"none\" },\n            { \"enable_firewall_session\", \"false\" },\n            { \"per_connection\", \"true\" },\n            { \"per_session\", \"false\" },\n        },\n        ActionSettings = null,\n        CustomFields = null,\n        Vpn = \"All_GwToGw\",\n    });\n\n    var rule3 = new Checkpoint.ManagementAccessRule(\"rule3\", new()\n    {\n        Name = \"Rule 3\",\n        Layer = \"Network\",\n        Position = \n        {\n            { \"below\", rule2.Name },\n        },\n        Action = \"Accept\",\n        ActionSettings = \n        {\n            { \"enable_identity_captive_portal\", \"true\" },\n        },\n        Sources = new[]\n        {\n            \"DMZNet\",\n        },\n        Enabled = true,\n        Destinations = new[]\n        {\n            \"InternalNet\",\n        },\n        DestinationNegate = true,\n        Services = new[]\n        {\n            \"EDGE\",\n        },\n        Contents = new[]\n        {\n            \"Any\",\n        },\n        Times = new[]\n        {\n            \"Weekend\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy Targets\",\n        },\n        Track = \n        {\n            { \"type\", \"Log\" },\n            { \"accounting\", \"false\" },\n            { \"alert\", \"none\" },\n            { \"enable_firewall_session\", \"false\" },\n            { \"per_connection\", \"true\" },\n            { \"per_session\", \"false\" },\n        },\n        CustomFields = null,\n        VpnCommunities = new[]\n        {\n            \"StarCommunity\",\n            \"MeshedCommunity\",\n        },\n    });\n\n    var rule4 = new Checkpoint.ManagementAccessRule(\"rule4\", new()\n    {\n        Name = \"Rule 4\",\n        Layer = \"Network\",\n        Position = \n        {\n            { \"below\", rule3.Name },\n        },\n        Enabled = false,\n        Sources = new[]\n        {\n            \"Any\",\n        },\n        Destinations = new[]\n        {\n            \"Any\",\n        },\n        Services = new[]\n        {\n            \"Any\",\n        },\n        Contents = new[]\n        {\n            \"Any\",\n        },\n        Times = new[]\n        {\n            \"Any\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy Targets\",\n        },\n        Track = \n        {\n            { \"type\", \"Log\" },\n            { \"accounting\", \"false\" },\n            { \"alert\", \"none\" },\n            { \"enable_firewall_session\", \"false\" },\n            { \"per_connection\", \"true\" },\n            { \"per_session\", \"false\" },\n        },\n        ActionSettings = null,\n        CustomFields = null,\n        VpnDirectionals = new[]\n        {\n            new Checkpoint.Inputs.ManagementAccessRuleVpnDirectionalArgs\n            {\n                From = \"StarVpn\",\n                To = \"MeshedCommunity\",\n            },\n        },\n    });\n\n    var rule5 = new Checkpoint.ManagementAccessRule(\"rule5\", new()\n    {\n        Name = \"Rule 5\",\n        Layer = \"Network\",\n        Position = \n        {\n            { \"below\", rule4.Name },\n        },\n        Action = \"Accept\",\n        ActionSettings = \n        {\n            { \"enable_identity_captive_portal\", \"false\" },\n        },\n        Sources = new[]\n        {\n            \"Any\",\n        },\n        Destinations = new[]\n        {\n            \"Any\",\n        },\n        Services = new[]\n        {\n            \"Any\",\n        },\n        Contents = new[]\n        {\n            \"Any\",\n        },\n        Times = new[]\n        {\n            \"Any\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy Targets\",\n        },\n        Track = \n        {\n            { \"type\", \"Log\" },\n            { \"accounting\", \"false\" },\n            { \"alert\", \"none\" },\n            { \"enable_firewall_session\", \"false\" },\n            { \"per_connection\", \"true\" },\n            { \"per_session\", \"false\" },\n        },\n        CustomFields = null,\n        Vpn = \"Any\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\trule1, err := checkpoint.NewManagementAccessRule(ctx, \"rule1\", &checkpoint.ManagementAccessRuleArgs{\n\t\t\tName:  pulumi.String(\"Rule 1\"),\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tTimes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy Targets\"),\n\t\t\t},\n\t\t\tTrack: pulumi.StringMap{\n\t\t\t\t\"type\":                    pulumi.String(\"Log\"),\n\t\t\t\t\"accounting\":              pulumi.String(\"false\"),\n\t\t\t\t\"alert\":                   pulumi.String(\"none\"),\n\t\t\t\t\"enable_firewall_session\": pulumi.String(\"false\"),\n\t\t\t\t\"per_connection\":          pulumi.String(\"true\"),\n\t\t\t\t\"per_session\":             pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tActionSettings: pulumi.StringMap{},\n\t\t\tCustomFields:   pulumi.StringMap{},\n\t\t\tVpn:            pulumi.String(\"Any\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trule2, err := checkpoint.NewManagementAccessRule(ctx, \"rule2\", &checkpoint.ManagementAccessRuleArgs{\n\t\t\tName:  pulumi.String(\"Rule 2\"),\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"below\": rule1.Name,\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"DMZNet\"),\n\t\t\t\tpulumi.String(\"DMZZone\"),\n\t\t\t\tpulumi.String(\"WirelessZone\"),\n\t\t\t},\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"InternalNet\"),\n\t\t\t\tpulumi.String(\"CPDShield\"),\n\t\t\t},\n\t\t\tDestinationNegate: pulumi.Bool(true),\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tTimes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy Targets\"),\n\t\t\t},\n\t\t\tTrack: pulumi.StringMap{\n\t\t\t\t\"type\":                    pulumi.String(\"Log\"),\n\t\t\t\t\"accounting\":              pulumi.String(\"false\"),\n\t\t\t\t\"alert\":                   pulumi.String(\"none\"),\n\t\t\t\t\"enable_firewall_session\": pulumi.String(\"false\"),\n\t\t\t\t\"per_connection\":          pulumi.String(\"true\"),\n\t\t\t\t\"per_session\":             pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tActionSettings: pulumi.StringMap{},\n\t\t\tCustomFields:   pulumi.StringMap{},\n\t\t\tVpn:            pulumi.String(\"All_GwToGw\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trule3, err := checkpoint.NewManagementAccessRule(ctx, \"rule3\", &checkpoint.ManagementAccessRuleArgs{\n\t\t\tName:  pulumi.String(\"Rule 3\"),\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"below\": rule2.Name,\n\t\t\t},\n\t\t\tAction: pulumi.String(\"Accept\"),\n\t\t\tActionSettings: pulumi.StringMap{\n\t\t\t\t\"enable_identity_captive_portal\": pulumi.String(\"true\"),\n\t\t\t},\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"DMZNet\"),\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"InternalNet\"),\n\t\t\t},\n\t\t\tDestinationNegate: pulumi.Bool(true),\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"EDGE\"),\n\t\t\t},\n\t\t\tContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tTimes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Weekend\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy Targets\"),\n\t\t\t},\n\t\t\tTrack: pulumi.StringMap{\n\t\t\t\t\"type\":                    pulumi.String(\"Log\"),\n\t\t\t\t\"accounting\":              pulumi.String(\"false\"),\n\t\t\t\t\"alert\":                   pulumi.String(\"none\"),\n\t\t\t\t\"enable_firewall_session\": pulumi.String(\"false\"),\n\t\t\t\t\"per_connection\":          pulumi.String(\"true\"),\n\t\t\t\t\"per_session\":             pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tCustomFields: pulumi.StringMap{},\n\t\t\tVpnCommunities: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"StarCommunity\"),\n\t\t\t\tpulumi.String(\"MeshedCommunity\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\trule4, err := checkpoint.NewManagementAccessRule(ctx, \"rule4\", &checkpoint.ManagementAccessRuleArgs{\n\t\t\tName:  pulumi.String(\"Rule 4\"),\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"below\": rule3.Name,\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(false),\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tTimes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy Targets\"),\n\t\t\t},\n\t\t\tTrack: pulumi.StringMap{\n\t\t\t\t\"type\":                    pulumi.String(\"Log\"),\n\t\t\t\t\"accounting\":              pulumi.String(\"false\"),\n\t\t\t\t\"alert\":                   pulumi.String(\"none\"),\n\t\t\t\t\"enable_firewall_session\": pulumi.String(\"false\"),\n\t\t\t\t\"per_connection\":          pulumi.String(\"true\"),\n\t\t\t\t\"per_session\":             pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tActionSettings: pulumi.StringMap{},\n\t\t\tCustomFields:   pulumi.StringMap{},\n\t\t\tVpnDirectionals: checkpoint.ManagementAccessRuleVpnDirectionalArray{\n\t\t\t\t&checkpoint.ManagementAccessRuleVpnDirectionalArgs{\n\t\t\t\t\tFrom: pulumi.String(\"StarVpn\"),\n\t\t\t\t\tTo:   pulumi.String(\"MeshedCommunity\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementAccessRule(ctx, \"rule5\", &checkpoint.ManagementAccessRuleArgs{\n\t\t\tName:  pulumi.String(\"Rule 5\"),\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"below\": rule4.Name,\n\t\t\t},\n\t\t\tAction: pulumi.String(\"Accept\"),\n\t\t\tActionSettings: pulumi.StringMap{\n\t\t\t\t\"enable_identity_captive_portal\": pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tTimes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy Targets\"),\n\t\t\t},\n\t\t\tTrack: pulumi.StringMap{\n\t\t\t\t\"type\":                    pulumi.String(\"Log\"),\n\t\t\t\t\"accounting\":              pulumi.String(\"false\"),\n\t\t\t\t\"alert\":                   pulumi.String(\"none\"),\n\t\t\t\t\"enable_firewall_session\": pulumi.String(\"false\"),\n\t\t\t\t\"per_connection\":          pulumi.String(\"true\"),\n\t\t\t\t\"per_session\":             pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tCustomFields: pulumi.StringMap{},\n\t\t\tVpn:          pulumi.String(\"Any\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessRule;\nimport com.pulumi.checkpoint.ManagementAccessRuleArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAccessRuleVpnDirectionalArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var rule1 = new ManagementAccessRule(\"rule1\", ManagementAccessRuleArgs.builder()\n            .name(\"Rule 1\")\n            .layer(\"Network\")\n            .position(Map.of(\"top\", \"top\"))\n            .sources(\"Any\")\n            .destinations(\"Any\")\n            .services(\"Any\")\n            .contents(\"Any\")\n            .times(\"Any\")\n            .installOns(\"Policy Targets\")\n            .track(Map.ofEntries(\n                Map.entry(\"type\", \"Log\"),\n                Map.entry(\"accounting\", \"false\"),\n                Map.entry(\"alert\", \"none\"),\n                Map.entry(\"enable_firewall_session\", \"false\"),\n                Map.entry(\"per_connection\", \"true\"),\n                Map.entry(\"per_session\", \"false\")\n            ))\n            .actionSettings(Map.ofEntries(\n            ))\n            .customFields(Map.ofEntries(\n            ))\n            .vpn(\"Any\")\n            .build());\n\n        var rule2 = new ManagementAccessRule(\"rule2\", ManagementAccessRuleArgs.builder()\n            .name(\"Rule 2\")\n            .layer(\"Network\")\n            .position(Map.of(\"below\", rule1.name()))\n            .enabled(true)\n            .sources(            \n                \"DMZNet\",\n                \"DMZZone\",\n                \"WirelessZone\")\n            .destinations(            \n                \"InternalNet\",\n                \"CPDShield\")\n            .destinationNegate(true)\n            .services(\"Any\")\n            .contents(\"Any\")\n            .times(\"Any\")\n            .installOns(\"Policy Targets\")\n            .track(Map.ofEntries(\n                Map.entry(\"type\", \"Log\"),\n                Map.entry(\"accounting\", \"false\"),\n                Map.entry(\"alert\", \"none\"),\n                Map.entry(\"enable_firewall_session\", \"false\"),\n                Map.entry(\"per_connection\", \"true\"),\n                Map.entry(\"per_session\", \"false\")\n            ))\n            .actionSettings(Map.ofEntries(\n            ))\n            .customFields(Map.ofEntries(\n            ))\n            .vpn(\"All_GwToGw\")\n            .build());\n\n        var rule3 = new ManagementAccessRule(\"rule3\", ManagementAccessRuleArgs.builder()\n            .name(\"Rule 3\")\n            .layer(\"Network\")\n            .position(Map.of(\"below\", rule2.name()))\n            .action(\"Accept\")\n            .actionSettings(Map.of(\"enable_identity_captive_portal\", \"true\"))\n            .sources(\"DMZNet\")\n            .enabled(true)\n            .destinations(\"InternalNet\")\n            .destinationNegate(true)\n            .services(\"EDGE\")\n            .contents(\"Any\")\n            .times(\"Weekend\")\n            .installOns(\"Policy Targets\")\n            .track(Map.ofEntries(\n                Map.entry(\"type\", \"Log\"),\n                Map.entry(\"accounting\", \"false\"),\n                Map.entry(\"alert\", \"none\"),\n                Map.entry(\"enable_firewall_session\", \"false\"),\n                Map.entry(\"per_connection\", \"true\"),\n                Map.entry(\"per_session\", \"false\")\n            ))\n            .customFields(Map.ofEntries(\n            ))\n            .vpnCommunities(            \n                \"StarCommunity\",\n                \"MeshedCommunity\")\n            .build());\n\n        var rule4 = new ManagementAccessRule(\"rule4\", ManagementAccessRuleArgs.builder()\n            .name(\"Rule 4\")\n            .layer(\"Network\")\n            .position(Map.of(\"below\", rule3.name()))\n            .enabled(false)\n            .sources(\"Any\")\n            .destinations(\"Any\")\n            .services(\"Any\")\n            .contents(\"Any\")\n            .times(\"Any\")\n            .installOns(\"Policy Targets\")\n            .track(Map.ofEntries(\n                Map.entry(\"type\", \"Log\"),\n                Map.entry(\"accounting\", \"false\"),\n                Map.entry(\"alert\", \"none\"),\n                Map.entry(\"enable_firewall_session\", \"false\"),\n                Map.entry(\"per_connection\", \"true\"),\n                Map.entry(\"per_session\", \"false\")\n            ))\n            .actionSettings(Map.ofEntries(\n            ))\n            .customFields(Map.ofEntries(\n            ))\n            .vpnDirectionals(ManagementAccessRuleVpnDirectionalArgs.builder()\n                .from(\"StarVpn\")\n                .to(\"MeshedCommunity\")\n                .build())\n            .build());\n\n        var rule5 = new ManagementAccessRule(\"rule5\", ManagementAccessRuleArgs.builder()\n            .name(\"Rule 5\")\n            .layer(\"Network\")\n            .position(Map.of(\"below\", rule4.name()))\n            .action(\"Accept\")\n            .actionSettings(Map.of(\"enable_identity_captive_portal\", \"false\"))\n            .sources(\"Any\")\n            .destinations(\"Any\")\n            .services(\"Any\")\n            .contents(\"Any\")\n            .times(\"Any\")\n            .installOns(\"Policy Targets\")\n            .track(Map.ofEntries(\n                Map.entry(\"type\", \"Log\"),\n                Map.entry(\"accounting\", \"false\"),\n                Map.entry(\"alert\", \"none\"),\n                Map.entry(\"enable_firewall_session\", \"false\"),\n                Map.entry(\"per_connection\", \"true\"),\n                Map.entry(\"per_session\", \"false\")\n            ))\n            .customFields(Map.ofEntries(\n            ))\n            .vpn(\"Any\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  rule1:\n    type: checkpoint:ManagementAccessRule\n    properties:\n      name: Rule 1\n      layer: Network\n      position:\n        top: top\n      sources:\n        - Any\n      destinations:\n        - Any\n      services:\n        - Any\n      contents:\n        - Any\n      times:\n        - Any\n      installOns:\n        - Policy Targets\n      track:\n        type: Log\n        accounting: false\n        alert: none\n        enable_firewall_session: false\n        per_connection: true\n        per_session: false\n      actionSettings: {}\n      customFields: {}\n      vpn: Any\n  rule2:\n    type: checkpoint:ManagementAccessRule\n    properties:\n      name: Rule 2\n      layer: Network\n      position:\n        below: ${rule1.name}\n      enabled: true\n      sources:\n        - DMZNet\n        - DMZZone\n        - WirelessZone\n      destinations:\n        - InternalNet\n        - CPDShield\n      destinationNegate: true\n      services:\n        - Any\n      contents:\n        - Any\n      times:\n        - Any\n      installOns:\n        - Policy Targets\n      track:\n        type: Log\n        accounting: false\n        alert: none\n        enable_firewall_session: false\n        per_connection: true\n        per_session: false\n      actionSettings: {}\n      customFields: {}\n      vpn: All_GwToGw\n  rule3:\n    type: checkpoint:ManagementAccessRule\n    properties:\n      name: Rule 3\n      layer: Network\n      position:\n        below: ${rule2.name}\n      action: Accept\n      actionSettings:\n        enable_identity_captive_portal: true\n      sources:\n        - DMZNet\n      enabled: true\n      destinations:\n        - InternalNet\n      destinationNegate: true\n      services:\n        - EDGE\n      contents:\n        - Any\n      times:\n        - Weekend\n      installOns:\n        - Policy Targets\n      track:\n        type: Log\n        accounting: false\n        alert: none\n        enable_firewall_session: false\n        per_connection: true\n        per_session: false\n      customFields: {}\n      vpnCommunities:\n        - StarCommunity\n        - MeshedCommunity\n  rule4:\n    type: checkpoint:ManagementAccessRule\n    properties:\n      name: Rule 4\n      layer: Network\n      position:\n        below: ${rule3.name}\n      enabled: false\n      sources:\n        - Any\n      destinations:\n        - Any\n      services:\n        - Any\n      contents:\n        - Any\n      times:\n        - Any\n      installOns:\n        - Policy Targets\n      track:\n        type: Log\n        accounting: false\n        alert: none\n        enable_firewall_session: false\n        per_connection: true\n        per_session: false\n      actionSettings: {}\n      customFields: {}\n      vpnDirectionals:\n        - from: StarVpn\n          to: MeshedCommunity\n  rule5:\n    type: checkpoint:ManagementAccessRule\n    properties:\n      name: Rule 5\n      layer: Network\n      position:\n        below: ${rule4.name}\n      action: Accept\n      actionSettings:\n        enable_identity_captive_portal: false\n      sources:\n        - Any\n      destinations:\n        - Any\n      services:\n        - Any\n      contents:\n        - Any\n      times:\n        - Any\n      installOns:\n        - Policy Targets\n      track:\n        type: Log\n        accounting: false\n        alert: none\n        enable_firewall_session: false\n        per_connection: true\n        per_session: false\n      customFields: {}\n      vpn: Any\n```\n<!--End PulumiCodeChooser -->\n\n## Import\n\n`checkpoint_management_access_rule` can be imported by using the following format: LAYER_NAME;RULE_UID\n\n```sh\n$ pulumi import checkpoint:index/managementAccessRule:ManagementAccessRule example \"Network;9423d36f-2d66-4754-b9e2-e9f4493751d3\"\n```\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "Valid values: \"Accept\", \"Drop\", \"Ask\", \"Inform\", \"Reject\", \"User Auth\", \"Client Auth\", \"Apply Layer\".\n"
        },
        "actionSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Action settings. Action settings blocks are documented below.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentDirection": {
          "type": "string",
          "description": "On which direction the file types processing is applied.\n"
        },
        "contentNegate": {
          "type": "boolean",
          "description": "True if negate is set for data.\n"
        },
        "contents": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of processed file types that this rule applies on.\n"
        },
        "customFields": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Custom fields. Custom fields blocks are documented below.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "fieldsWithUidIdentifiers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of resource fields that will use object UIDs as object identifiers. Default is object name.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "inlineLayer": {
          "type": "string",
          "description": "Inline Layer identified by the name or UID. Relevant only if \"Action\" was set to \"Apply Layer\".\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementAccessRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Rule name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "times": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of time objects. For example: \"Weekend\", \"Off-Work\", \"Every-Day\".\n"
        },
        "track": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Track Settings. Track Settings blocks are documented below.\n"
        },
        "userCheck": {
          "$ref": "#/types/checkpoint:index%2FManagementAccessRuleUserCheck:ManagementAccessRuleUserCheck",
          "description": "User check settings. User check settings blocks are documented below.\n"
        },
        "vpn": {
          "type": "string",
          "description": "VPN community identified by name or \"Any\" or \"All_GwToGw\".\n"
        },
        "vpnCommunities": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of VPN communities identified by name.\n"
        },
        "vpnDirectionals": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRuleVpnDirectional:ManagementAccessRuleVpnDirectional"
          },
          "description": "Collection of VPN directional. VPN directional block documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "layer",
        "managementAccessRuleId",
        "name",
        "position"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "Valid values: \"Accept\", \"Drop\", \"Ask\", \"Inform\", \"Reject\", \"User Auth\", \"Client Auth\", \"Apply Layer\".\n"
        },
        "actionSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Action settings. Action settings blocks are documented below.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentDirection": {
          "type": "string",
          "description": "On which direction the file types processing is applied.\n"
        },
        "contentNegate": {
          "type": "boolean",
          "description": "True if negate is set for data.\n"
        },
        "contents": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of processed file types that this rule applies on.\n"
        },
        "customFields": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Custom fields. Custom fields blocks are documented below.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "fieldsWithUidIdentifiers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of resource fields that will use object UIDs as object identifiers. Default is object name.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "inlineLayer": {
          "type": "string",
          "description": "Inline Layer identified by the name or UID. Relevant only if \"Action\" was set to \"Apply Layer\".\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementAccessRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Rule name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "times": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of time objects. For example: \"Weekend\", \"Off-Work\", \"Every-Day\".\n"
        },
        "track": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Track Settings. Track Settings blocks are documented below.\n"
        },
        "userCheck": {
          "$ref": "#/types/checkpoint:index%2FManagementAccessRuleUserCheck:ManagementAccessRuleUserCheck",
          "description": "User check settings. User check settings blocks are documented below.\n"
        },
        "vpn": {
          "type": "string",
          "description": "VPN community identified by name or \"Any\" or \"All_GwToGw\".\n"
        },
        "vpnCommunities": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of VPN communities identified by name.\n"
        },
        "vpnDirectionals": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRuleVpnDirectional:ManagementAccessRuleVpnDirectional"
          },
          "description": "Collection of VPN directional. VPN directional block documented below.\n"
        }
      },
      "requiredInputs": [
        "layer",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAccessRule resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "Valid values: \"Accept\", \"Drop\", \"Ask\", \"Inform\", \"Reject\", \"User Auth\", \"Client Auth\", \"Apply Layer\".\n"
          },
          "actionSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Action settings. Action settings blocks are documented below.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "contentDirection": {
            "type": "string",
            "description": "On which direction the file types processing is applied.\n"
          },
          "contentNegate": {
            "type": "boolean",
            "description": "True if negate is set for data.\n"
          },
          "contents": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of processed file types that this rule applies on.\n"
          },
          "customFields": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Custom fields. Custom fields blocks are documented below.\n"
          },
          "destinationNegate": {
            "type": "boolean",
            "description": "True if negate is set for destination.\n"
          },
          "destinations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "fieldsWithUidIdentifiers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of resource fields that will use object UIDs as object identifiers. Default is object name.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "inlineLayer": {
            "type": "string",
            "description": "Inline Layer identified by the name or UID. Relevant only if \"Action\" was set to \"Apply Layer\".\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on.\n"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "managementAccessRuleId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Rule name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "serviceNegate": {
            "type": "boolean",
            "description": "True if negate is set for service.\n"
          },
          "services": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "sourceNegate": {
            "type": "boolean",
            "description": "True if negate is set for source.\n"
          },
          "sources": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "times": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of time objects. For example: \"Weekend\", \"Off-Work\", \"Every-Day\".\n"
          },
          "track": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Track Settings. Track Settings blocks are documented below.\n"
          },
          "userCheck": {
            "$ref": "#/types/checkpoint:index%2FManagementAccessRuleUserCheck:ManagementAccessRuleUserCheck",
            "description": "User check settings. User check settings blocks are documented below.\n"
          },
          "vpn": {
            "type": "string",
            "description": "VPN community identified by name or \"Any\" or \"All_GwToGw\".\n"
          },
          "vpnCommunities": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of VPN communities identified by name.\n"
          },
          "vpnDirectionals": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementAccessRuleVpnDirectional:ManagementAccessRuleVpnDirectional"
            },
            "description": "Collection of VPN directional. VPN directional block documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAccessSection:ManagementAccessSection": {
      "description": "This resource allows you to execute Check Point Access Section.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementAccessSection(\"example\", {\n    name: \"New Section 1\",\n    position: {\n        top: \"top\",\n    },\n    layer: \"Network\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementAccessSection(\"example\",\n    name=\"New Section 1\",\n    position={\n        \"top\": \"top\",\n    },\n    layer=\"Network\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementAccessSection(\"example\", new()\n    {\n        Name = \"New Section 1\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Layer = \"Network\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAccessSection(ctx, \"example\", &checkpoint.ManagementAccessSectionArgs{\n\t\t\tName: pulumi.String(\"New Section 1\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessSection;\nimport com.pulumi.checkpoint.ManagementAccessSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementAccessSection(\"example\", ManagementAccessSectionArgs.builder()\n            .name(\"New Section 1\")\n            .position(Map.of(\"top\", \"top\"))\n            .layer(\"Network\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementAccessSection\n    properties:\n      name: New Section 1\n      position:\n        top: top\n      layer: Network\n```\n<!--End PulumiCodeChooser -->\n\n## Import\n\n`checkpoint_management_access_section` can be imported by using the following format: LAYER_NAME;SECTION_UID\n\n```sh\n$ pulumi import checkpoint:index/managementAccessSection:ManagementAccessSection example \"Network;354e184c-2f42-485c-b62d-ff9b3d29ee3e\"\n```\n",
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementAccessSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        }
      },
      "type": "object",
      "required": [
        "layer",
        "managementAccessSectionId",
        "name",
        "position"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementAccessSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        }
      },
      "requiredInputs": [
        "layer",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAccessSection resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "managementAccessSectionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAciDataCenterServer:ManagementAciDataCenterServer": {
      "description": "This resource allows you to execute Check Point Cisco APIC Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testAci = new checkpoint.ManagementAciDataCenterServer(\"testAci\", {\n    name: \"MyAci\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    urls: [\n        \"url1\",\n        \"url2\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_aci = checkpoint.ManagementAciDataCenterServer(\"testAci\",\n    name=\"MyAci\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    urls=[\n        \"url1\",\n        \"url2\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testAci = new Checkpoint.ManagementAciDataCenterServer(\"testAci\", new()\n    {\n        Name = \"MyAci\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Urls = new[]\n        {\n            \"url1\",\n            \"url2\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAciDataCenterServer(ctx, \"testAci\", &checkpoint.ManagementAciDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyAci\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tUrls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"url1\"),\n\t\t\t\tpulumi.String(\"url2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAciDataCenterServer;\nimport com.pulumi.checkpoint.ManagementAciDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testAci = new ManagementAciDataCenterServer(\"testAci\", ManagementAciDataCenterServerArgs.builder()\n            .name(\"MyAci\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .urls(            \n                \"url1\",\n                \"url2\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testAci:\n    type: checkpoint:ManagementAciDataCenterServer\n    properties:\n      name: MyAci\n      username: USERNAME\n      password: PASSWORD\n      urls:\n        - url1\n        - url2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAciDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Cisco APIC server.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the Cisco APIC server encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "urls": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Address of APIC cluster members. <br>Example: http(s)://<host1 ip/url>.\n"
        },
        "username": {
          "type": "string",
          "description": "User ID of the Cisco APIC server. When using Login Domains use the following syntax:<br>apic:\\<domain\\>\\\\\\<username\\>\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "managementAciDataCenterServerId",
        "name",
        "urls",
        "username"
      ],
      "inputProperties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAciDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Cisco APIC server.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the Cisco APIC server encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "urls": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Address of APIC cluster members. <br>Example: http(s)://<host1 ip/url>.\n"
        },
        "username": {
          "type": "string",
          "description": "User ID of the Cisco APIC server. When using Login Domains use the following syntax:<br>apic:\\<domain\\>\\\\\\<username\\>\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "urls",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAciDataCenterServer resources.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string",
            "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAciDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the Cisco APIC server.\n",
            "secret": true
          },
          "passwordBase64": {
            "type": "string",
            "description": "Password of the Cisco APIC server encoded in Base64.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          },
          "urls": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Address of APIC cluster members. <br>Example: http(s)://<host1 ip/url>.\n"
          },
          "username": {
            "type": "string",
            "description": "User ID of the Cisco APIC server. When using Login Domains use the following syntax:<br>apic:\\<domain\\>\\\\\\<username\\>\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddApiKey:ManagementAddApiKey": {
      "properties": {
        "adminName": {
          "type": "string",
          "description": "Administrator name to generate API key for.\n"
        },
        "adminUid": {
          "type": "string",
          "description": "Administrator uid to generate API key for.\n"
        },
        "apiKey": {
          "type": "string",
          "description": "Represents the API Key to be used for Login.\n",
          "secret": true
        },
        "managementAddApiKeyId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "apiKey",
        "managementAddApiKeyId"
      ],
      "inputProperties": {
        "adminName": {
          "type": "string",
          "description": "Administrator name to generate API key for.\n"
        },
        "adminUid": {
          "type": "string",
          "description": "Administrator uid to generate API key for.\n"
        },
        "managementAddApiKeyId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddApiKey resources.\n",
        "properties": {
          "adminName": {
            "type": "string",
            "description": "Administrator name to generate API key for.\n"
          },
          "adminUid": {
            "type": "string",
            "description": "Administrator uid to generate API key for.\n"
          },
          "apiKey": {
            "type": "string",
            "description": "Represents the API Key to be used for Login.\n",
            "secret": true
          },
          "managementAddApiKeyId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddCustomTrustedCaCertificate:ManagementAddCustomTrustedCaCertificate": {
      "properties": {
        "addedBy": {
          "type": "string",
          "description": "By whom the certificate was added.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.<br/>Valid file formats: x509.\n"
        },
        "issuedBy": {
          "type": "string",
          "description": "Trusted CA certificate issued by.\n"
        },
        "issuedTo": {
          "type": "string",
          "description": "Trusted CA certificate issued to.\n"
        },
        "managementAddCustomTrustedCaCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        },
        "validFroms": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAddCustomTrustedCaCertificateValidFrom:ManagementAddCustomTrustedCaCertificateValidFrom"
          },
          "description": "Trusted CA certificate valid from date.\n"
        },
        "validTos": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAddCustomTrustedCaCertificateValidTo:ManagementAddCustomTrustedCaCertificateValidTo"
          },
          "description": "Trusted CA certificate valid to date.\n"
        }
      },
      "type": "object",
      "required": [
        "addedBy",
        "base64Certificate",
        "issuedBy",
        "issuedTo",
        "managementAddCustomTrustedCaCertificateId",
        "name",
        "tags",
        "uid",
        "validFroms",
        "validTos"
      ],
      "inputProperties": {
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.<br/>Valid file formats: x509.\n"
        },
        "managementAddCustomTrustedCaCertificateId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "base64Certificate"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddCustomTrustedCaCertificate resources.\n",
        "properties": {
          "addedBy": {
            "type": "string",
            "description": "By whom the certificate was added.\n"
          },
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64.<br/>Valid file formats: x509.\n"
          },
          "issuedBy": {
            "type": "string",
            "description": "Trusted CA certificate issued by.\n"
          },
          "issuedTo": {
            "type": "string",
            "description": "Trusted CA certificate issued to.\n"
          },
          "managementAddCustomTrustedCaCertificateId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          },
          "validFroms": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementAddCustomTrustedCaCertificateValidFrom:ManagementAddCustomTrustedCaCertificateValidFrom"
            },
            "description": "Trusted CA certificate valid from date.\n"
          },
          "validTos": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementAddCustomTrustedCaCertificateValidTo:ManagementAddCustomTrustedCaCertificateValidTo"
            },
            "description": "Trusted CA certificate valid to date.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddDataCenterObject:ManagementAddDataCenterObject": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenterName": {
          "type": "string",
          "description": "Name of the Data Center Server the object is in.\n"
        },
        "dataCenterUid": {
          "type": "string",
          "description": "Unique identifier of the Data Center Server the object is in.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAddDataCenterObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Override default name on data-center.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uidInDataCenter": {
          "type": "string",
          "description": "Unique identifier of the object in the Data Center Server.\n"
        },
        "uri": {
          "type": "string",
          "description": "URI of the object in the Data Center Server.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAddDataCenterObjectId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenterName": {
          "type": "string",
          "description": "Name of the Data Center Server the object is in.\n"
        },
        "dataCenterUid": {
          "type": "string",
          "description": "Unique identifier of the Data Center Server the object is in.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAddDataCenterObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Override default name on data-center.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uidInDataCenter": {
          "type": "string",
          "description": "Unique identifier of the object in the Data Center Server.\n"
        },
        "uri": {
          "type": "string",
          "description": "URI of the object in the Data Center Server.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddDataCenterObject resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataCenterName": {
            "type": "string",
            "description": "Name of the Data Center Server the object is in.\n"
          },
          "dataCenterUid": {
            "type": "string",
            "description": "Unique identifier of the Data Center Server the object is in.\n"
          },
          "groups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of group identifiers.groups blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAddDataCenterObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Override default name on data-center.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "uidInDataCenter": {
            "type": "string",
            "description": "Unique identifier of the object in the Data Center Server.\n"
          },
          "uri": {
            "type": "string",
            "description": "URI of the object in the Data Center Server.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddRepositoryPackage:ManagementAddRepositoryPackage": {
      "properties": {
        "managementAddRepositoryPackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the repository package.\n"
        },
        "path": {
          "type": "string",
          "description": "The path of the repository package.<br><font color=\"red\">Required only for</font> adding package from local.\n"
        },
        "source": {
          "type": "string",
          "description": "The source of the repository package.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementAddRepositoryPackageId",
        "name",
        "source",
        "taskId"
      ],
      "inputProperties": {
        "managementAddRepositoryPackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the repository package.\n"
        },
        "path": {
          "type": "string",
          "description": "The path of the repository package.<br><font color=\"red\">Required only for</font> adding package from local.\n"
        },
        "source": {
          "type": "string",
          "description": "The source of the repository package.\n"
        }
      },
      "requiredInputs": [
        "source"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddRepositoryPackage resources.\n",
        "properties": {
          "managementAddRepositoryPackageId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the repository package.\n"
          },
          "path": {
            "type": "string",
            "description": "The path of the repository package.<br><font color=\"red\">Required only for</font> adding package from local.\n"
          },
          "source": {
            "type": "string",
            "description": "The source of the repository package.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddThreatProtections:ManagementAddThreatProtections": {
      "properties": {
        "managementAddThreatProtectionsId": {
          "type": "string"
        },
        "packageFormat": {
          "type": "string",
          "description": "Protections package format.\n"
        },
        "packagePath": {
          "type": "string",
          "description": "Protections package path.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAddThreatProtectionsId",
        "taskId"
      ],
      "inputProperties": {
        "managementAddThreatProtectionsId": {
          "type": "string"
        },
        "packageFormat": {
          "type": "string",
          "description": "Protections package format.\n"
        },
        "packagePath": {
          "type": "string",
          "description": "Protections package path.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddThreatProtections resources.\n",
        "properties": {
          "managementAddThreatProtectionsId": {
            "type": "string"
          },
          "packageFormat": {
            "type": "string",
            "description": "Protections package format.\n"
          },
          "packagePath": {
            "type": "string",
            "description": "Protections package path.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddUpdatableObject:ManagementAddUpdatableObject": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAddUpdatableObjectId": {
          "type": "string"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uidInUpdatableObjectsRepository": {
          "type": "string",
          "description": "Unique identifier of the updatable object in the Updatable Objects Repository.\n"
        },
        "uri": {
          "type": "string",
          "description": "URI of the updatable object in the Updatable Objects Repository.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAddUpdatableObjectId"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAddUpdatableObjectId": {
          "type": "string"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uidInUpdatableObjectsRepository": {
          "type": "string",
          "description": "Unique identifier of the updatable object in the Updatable Objects Repository.\n"
        },
        "uri": {
          "type": "string",
          "description": "URI of the updatable object in the Updatable Objects Repository.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddUpdatableObject resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAddUpdatableObjectId": {
            "type": "string"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "uidInUpdatableObjectsRepository": {
            "type": "string",
            "description": "Unique identifier of the updatable object in the Updatable Objects Repository.\n"
          },
          "uri": {
            "type": "string",
            "description": "URI of the updatable object in the Updatable Objects Repository.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAddressRange:ManagementAddressRange": {
      "description": "This resource allows you to add/update/delete Check Point Address Range.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementAddressRange(\"example\", {\n    name: \"New Address Range 1\",\n    ipv4AddressFirst: \"192.0.2.1\",\n    ipv4AddressLast: \"192.0.2.10\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementAddressRange(\"example\",\n    name=\"New Address Range 1\",\n    ipv4_address_first=\"192.0.2.1\",\n    ipv4_address_last=\"192.0.2.10\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementAddressRange(\"example\", new()\n    {\n        Name = \"New Address Range 1\",\n        Ipv4AddressFirst = \"192.0.2.1\",\n        Ipv4AddressLast = \"192.0.2.10\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAddressRange(ctx, \"example\", &checkpoint.ManagementAddressRangeArgs{\n\t\t\tName:             pulumi.String(\"New Address Range 1\"),\n\t\t\tIpv4AddressFirst: pulumi.String(\"192.0.2.1\"),\n\t\t\tIpv4AddressLast:  pulumi.String(\"192.0.2.10\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAddressRange;\nimport com.pulumi.checkpoint.ManagementAddressRangeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementAddressRange(\"example\", ManagementAddressRangeArgs.builder()\n            .name(\"New Address Range 1\")\n            .ipv4AddressFirst(\"192.0.2.1\")\n            .ipv4AddressLast(\"192.0.2.10\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementAddressRange\n    properties:\n      name: New Address Range 1\n      ipv4AddressFirst: 192.0.2.1\n      ipv4AddressLast: 192.0.2.10\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4AddressFirst": {
          "type": "string",
          "description": "First IPv4 address in the range.\n"
        },
        "ipv4AddressLast": {
          "type": "string",
          "description": "Last IPv4 address in the range.\n"
        },
        "ipv6AddressFirst": {
          "type": "string",
          "description": "First IPv6 address in the range.\n"
        },
        "ipv6AddressLast": {
          "type": "string",
          "description": "Last IPv6 address in the range.\n"
        },
        "managementAddressRangeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAddressRangeId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4AddressFirst": {
          "type": "string",
          "description": "First IPv4 address in the range.\n"
        },
        "ipv4AddressLast": {
          "type": "string",
          "description": "Last IPv4 address in the range.\n"
        },
        "ipv6AddressFirst": {
          "type": "string",
          "description": "First IPv6 address in the range.\n"
        },
        "ipv6AddressLast": {
          "type": "string",
          "description": "Last IPv6 address in the range.\n"
        },
        "managementAddressRangeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAddressRange resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipv4AddressFirst": {
            "type": "string",
            "description": "First IPv4 address in the range.\n"
          },
          "ipv4AddressLast": {
            "type": "string",
            "description": "Last IPv4 address in the range.\n"
          },
          "ipv6AddressFirst": {
            "type": "string",
            "description": "First IPv6 address in the range.\n"
          },
          "ipv6AddressLast": {
            "type": "string",
            "description": "Last IPv6 address in the range.\n"
          },
          "managementAddressRangeId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "natSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "NAT settings. NAT settings blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAdministrator:ManagementAdministrator": {
      "description": "This resource allows you to add/update/delete Check Point Administrator.\n\n## Example Usage\n\n### MDS\n\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst admin = new checkpoint.ManagementAdministrator(\"admin\", {\n    name: \"example\",\n    permissionsProfiles: [{\n        domain: \"domain1\",\n        profile: \"Read Only All\",\n    }],\n    multiDomainProfile: \"domain level only\",\n    password: \"1233\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nadmin = checkpoint.ManagementAdministrator(\"admin\",\n    name=\"example\",\n    permissions_profiles=[{\n        \"domain\": \"domain1\",\n        \"profile\": \"Read Only All\",\n    }],\n    multi_domain_profile=\"domain level only\",\n    password=\"1233\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var admin = new Checkpoint.ManagementAdministrator(\"admin\", new()\n    {\n        Name = \"example\",\n        PermissionsProfiles = new[]\n        {\n            new Checkpoint.Inputs.ManagementAdministratorPermissionsProfileArgs\n            {\n                Domain = \"domain1\",\n                Profile = \"Read Only All\",\n            },\n        },\n        MultiDomainProfile = \"domain level only\",\n        Password = \"1233\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAdministrator(ctx, \"admin\", &checkpoint.ManagementAdministratorArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tPermissionsProfiles: checkpoint.ManagementAdministratorPermissionsProfileArray{\n\t\t\t\t&checkpoint.ManagementAdministratorPermissionsProfileArgs{\n\t\t\t\t\tDomain:  pulumi.String(\"domain1\"),\n\t\t\t\t\tProfile: pulumi.String(\"Read Only All\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tMultiDomainProfile: pulumi.String(\"domain level only\"),\n\t\t\tPassword:           pulumi.String(\"1233\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAdministrator;\nimport com.pulumi.checkpoint.ManagementAdministratorArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAdministratorPermissionsProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var admin = new ManagementAdministrator(\"admin\", ManagementAdministratorArgs.builder()\n            .name(\"example\")\n            .permissionsProfiles(ManagementAdministratorPermissionsProfileArgs.builder()\n                .domain(\"domain1\")\n                .profile(\"Read Only All\")\n                .build())\n            .multiDomainProfile(\"domain level only\")\n            .password(\"1233\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  admin:\n    type: checkpoint:ManagementAdministrator\n    properties:\n      name: example\n      permissionsProfiles:\n        - domain: domain1\n          profile: Read Only All\n      multiDomainProfile: domain level only\n      password: '1233'\n```\n<!--End PulumiCodeChooser -->\n\n\n### SMC\n\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst admin = new checkpoint.ManagementAdministrator(\"admin\", {\n    name: \"example\",\n    permissionsProfiles: [{\n        domain: \"SMC User\",\n        profile: \"Read Only All\",\n    }],\n    password: \"1233\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nadmin = checkpoint.ManagementAdministrator(\"admin\",\n    name=\"example\",\n    permissions_profiles=[{\n        \"domain\": \"SMC User\",\n        \"profile\": \"Read Only All\",\n    }],\n    password=\"1233\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var admin = new Checkpoint.ManagementAdministrator(\"admin\", new()\n    {\n        Name = \"example\",\n        PermissionsProfiles = new[]\n        {\n            new Checkpoint.Inputs.ManagementAdministratorPermissionsProfileArgs\n            {\n                Domain = \"SMC User\",\n                Profile = \"Read Only All\",\n            },\n        },\n        Password = \"1233\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAdministrator(ctx, \"admin\", &checkpoint.ManagementAdministratorArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tPermissionsProfiles: checkpoint.ManagementAdministratorPermissionsProfileArray{\n\t\t\t\t&checkpoint.ManagementAdministratorPermissionsProfileArgs{\n\t\t\t\t\tDomain:  pulumi.String(\"SMC User\"),\n\t\t\t\t\tProfile: pulumi.String(\"Read Only All\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tPassword: pulumi.String(\"1233\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAdministrator;\nimport com.pulumi.checkpoint.ManagementAdministratorArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAdministratorPermissionsProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var admin = new ManagementAdministrator(\"admin\", ManagementAdministratorArgs.builder()\n            .name(\"example\")\n            .permissionsProfiles(ManagementAdministratorPermissionsProfileArgs.builder()\n                .domain(\"SMC User\")\n                .profile(\"Read Only All\")\n                .build())\n            .password(\"1233\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  admin:\n    type: checkpoint:ManagementAdministrator\n    properties:\n      name: example\n      permissionsProfiles:\n        - domain: SMC User\n          profile: Read Only All\n      password: '1233'\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "email": {
          "type": "string",
          "description": "Administrator email.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Format: YYYY-MM-DD, YYYY-mm-ddThh:mm:ss.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAdministratorId": {
          "type": "string"
        },
        "multiDomainProfile": {
          "type": "string",
          "description": "Administrator multi-domain profile. Only in MDS.\n"
        },
        "mustChangePassword": {
          "type": "boolean",
          "description": "True if administrator must change password on the next login.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "password": {
          "type": "string",
          "description": "Administrator password.\n",
          "secret": true
        },
        "passwordHash": {
          "type": "string",
          "description": "Administrator password hash.\n",
          "secret": true
        },
        "permissionsProfiles": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAdministratorPermissionsProfile:ManagementAdministratorPermissionsProfile"
          },
          "description": "Administrator permissions profile. Permissions profile should not be provided when multi-domain-profile is set to \"Multi-Domain Super User\" or \"Domain Super User\"."
        },
        "phoneNumber": {
          "type": "string",
          "description": "Administrator phone number.\n"
        },
        "radiusServer": {
          "type": "string",
          "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
        },
        "sicName": {
          "type": "string",
          "description": "Name of the Secure Internal Connection Trust.\n"
        },
        "tacacsServer": {
          "type": "string",
          "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementAdministratorId",
        "name",
        "sicName"
      ],
      "inputProperties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "email": {
          "type": "string",
          "description": "Administrator email.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Format: YYYY-MM-DD, YYYY-mm-ddThh:mm:ss.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAdministratorId": {
          "type": "string"
        },
        "multiDomainProfile": {
          "type": "string",
          "description": "Administrator multi-domain profile. Only in MDS.\n"
        },
        "mustChangePassword": {
          "type": "boolean",
          "description": "True if administrator must change password on the next login.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "password": {
          "type": "string",
          "description": "Administrator password.\n",
          "secret": true
        },
        "passwordHash": {
          "type": "string",
          "description": "Administrator password hash.\n",
          "secret": true
        },
        "permissionsProfiles": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementAdministratorPermissionsProfile:ManagementAdministratorPermissionsProfile"
          },
          "description": "Administrator permissions profile. Permissions profile should not be provided when multi-domain-profile is set to \"Multi-Domain Super User\" or \"Domain Super User\"."
        },
        "phoneNumber": {
          "type": "string",
          "description": "Administrator phone number.\n"
        },
        "radiusServer": {
          "type": "string",
          "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
        },
        "tacacsServer": {
          "type": "string",
          "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAdministrator resources.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string",
            "description": "Authentication method.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "email": {
            "type": "string",
            "description": "Administrator email.\n"
          },
          "expirationDate": {
            "type": "string",
            "description": "Format: YYYY-MM-DD, YYYY-mm-ddThh:mm:ss.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAdministratorId": {
            "type": "string"
          },
          "multiDomainProfile": {
            "type": "string",
            "description": "Administrator multi-domain profile. Only in MDS.\n"
          },
          "mustChangePassword": {
            "type": "boolean",
            "description": "True if administrator must change password on the next login.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "password": {
            "type": "string",
            "description": "Administrator password.\n",
            "secret": true
          },
          "passwordHash": {
            "type": "string",
            "description": "Administrator password hash.\n",
            "secret": true
          },
          "permissionsProfiles": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementAdministratorPermissionsProfile:ManagementAdministratorPermissionsProfile"
            },
            "description": "Administrator permissions profile. Permissions profile should not be provided when multi-domain-profile is set to \"Multi-Domain Super User\" or \"Domain Super User\"."
          },
          "phoneNumber": {
            "type": "string",
            "description": "Administrator phone number.\n"
          },
          "radiusServer": {
            "type": "string",
            "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
          },
          "sicName": {
            "type": "string",
            "description": "Name of the Secure Internal Connection Trust.\n"
          },
          "tacacsServer": {
            "type": "string",
            "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAppControlAdvancedSettings:ManagementAppControlAdvancedSettings": {
      "properties": {
        "blockRequestWhenWebServiceIsUnavailable": {
          "type": "boolean",
          "description": "Block requests when the web service is unavailable. <br>When selected, requests are blocked when there is no connectivity to the Check Point Online Web Service.<br>When cleared, requests are allowed when there is no connectivity.<br>This property is not available in the Global domain of an MDS machine."
        },
        "categorizeSocialNetworkWidgets": {
          "type": "boolean",
          "description": "When selected, the Security Gateway connects to the Check Point Online Web Service to identify social networking widgets that it does not recognize.<br>When cleared or there is no connectivity between the Security Gateway and the Check Point Online Web, the unknown widget is treated as Web Browsing traffic.<br>This property is not available in the Global domain of an MDS machine."
        },
        "customCategorizationSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Website categorization mode - select the mode that is used for website categorization.<br>This property is not available in the Global domain of an MDS machine."
        },
        "domainLevelPermission": {
          "type": "boolean",
          "description": "Allows the editing of applications, categories, and services. This property is used only in the Global Domain of an MDS machine."
        },
        "enableWebBrowsing": {
          "type": "boolean",
          "description": "If you do not enable URL Filtering on the Security Gateway, you can use a generic Web browser application called Web Browsing in the rule.<br>This application includes all HTTP traffic that is not a defined application Application and URL Filtering assigns Web Browsing as the default application for all HTTP traffic that does not match an application in the Application and URL Filtering Database.<br>This property is not available in the Global domain of an MDS machine."
        },
        "httpiNonStandardPorts": {
          "type": "boolean",
          "description": "Enable HTTP inspection on non standard ports for application and URL filtering.<br>This property is not available in the Global domain of an MDS machine."
        },
        "internalErrorFailMode": {
          "type": "string",
          "description": "In case of internal system error, allow or block all connections.<br>This property is not available in the Global domain of an MDS machine."
        },
        "managementAppControlAdvancedSettingsId": {
          "type": "string"
        },
        "matchApplicationOnAnyPort": {
          "type": "boolean",
          "description": "Match Web application on 'Any' port when used in Block rule - By default this is set to true. and so applications are matched on all services when used in a Block rule."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        },
        "urlFilteringSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "In this section user can enable  URL Filtering features.<br>This property is not available in the Global domain of an MDS machine."
        },
        "webBrowsingServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Web browsing services are the services that match a Web-based custom Application/Site."
        },
        "websiteCategorizationMode": {
          "type": "string",
          "description": "Hold - Requests are blocked until categorization is complete.<br>Background - Requests are allowed until categorization is complete.<br>Custom - configure different settings depending on the service -Lets you set different modes for URL Filtering and Social Networking Widgets.<br>This property is not available in the Global domain of an MDS machine."
        }
      },
      "type": "object",
      "required": [
        "managementAppControlAdvancedSettingsId",
        "uid"
      ],
      "inputProperties": {
        "blockRequestWhenWebServiceIsUnavailable": {
          "type": "boolean",
          "description": "Block requests when the web service is unavailable. <br>When selected, requests are blocked when there is no connectivity to the Check Point Online Web Service.<br>When cleared, requests are allowed when there is no connectivity.<br>This property is not available in the Global domain of an MDS machine."
        },
        "categorizeSocialNetworkWidgets": {
          "type": "boolean",
          "description": "When selected, the Security Gateway connects to the Check Point Online Web Service to identify social networking widgets that it does not recognize.<br>When cleared or there is no connectivity between the Security Gateway and the Check Point Online Web, the unknown widget is treated as Web Browsing traffic.<br>This property is not available in the Global domain of an MDS machine."
        },
        "customCategorizationSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Website categorization mode - select the mode that is used for website categorization.<br>This property is not available in the Global domain of an MDS machine."
        },
        "domainLevelPermission": {
          "type": "boolean",
          "description": "Allows the editing of applications, categories, and services. This property is used only in the Global Domain of an MDS machine."
        },
        "enableWebBrowsing": {
          "type": "boolean",
          "description": "If you do not enable URL Filtering on the Security Gateway, you can use a generic Web browser application called Web Browsing in the rule.<br>This application includes all HTTP traffic that is not a defined application Application and URL Filtering assigns Web Browsing as the default application for all HTTP traffic that does not match an application in the Application and URL Filtering Database.<br>This property is not available in the Global domain of an MDS machine."
        },
        "httpiNonStandardPorts": {
          "type": "boolean",
          "description": "Enable HTTP inspection on non standard ports for application and URL filtering.<br>This property is not available in the Global domain of an MDS machine."
        },
        "internalErrorFailMode": {
          "type": "string",
          "description": "In case of internal system error, allow or block all connections.<br>This property is not available in the Global domain of an MDS machine."
        },
        "managementAppControlAdvancedSettingsId": {
          "type": "string"
        },
        "matchApplicationOnAnyPort": {
          "type": "boolean",
          "description": "Match Web application on 'Any' port when used in Block rule - By default this is set to true. and so applications are matched on all services when used in a Block rule."
        },
        "urlFilteringSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "In this section user can enable  URL Filtering features.<br>This property is not available in the Global domain of an MDS machine."
        },
        "webBrowsingServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Web browsing services are the services that match a Web-based custom Application/Site."
        },
        "websiteCategorizationMode": {
          "type": "string",
          "description": "Hold - Requests are blocked until categorization is complete.<br>Background - Requests are allowed until categorization is complete.<br>Custom - configure different settings depending on the service -Lets you set different modes for URL Filtering and Social Networking Widgets.<br>This property is not available in the Global domain of an MDS machine."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAppControlAdvancedSettings resources.\n",
        "properties": {
          "blockRequestWhenWebServiceIsUnavailable": {
            "type": "boolean",
            "description": "Block requests when the web service is unavailable. <br>When selected, requests are blocked when there is no connectivity to the Check Point Online Web Service.<br>When cleared, requests are allowed when there is no connectivity.<br>This property is not available in the Global domain of an MDS machine."
          },
          "categorizeSocialNetworkWidgets": {
            "type": "boolean",
            "description": "When selected, the Security Gateway connects to the Check Point Online Web Service to identify social networking widgets that it does not recognize.<br>When cleared or there is no connectivity between the Security Gateway and the Check Point Online Web, the unknown widget is treated as Web Browsing traffic.<br>This property is not available in the Global domain of an MDS machine."
          },
          "customCategorizationSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Website categorization mode - select the mode that is used for website categorization.<br>This property is not available in the Global domain of an MDS machine."
          },
          "domainLevelPermission": {
            "type": "boolean",
            "description": "Allows the editing of applications, categories, and services. This property is used only in the Global Domain of an MDS machine."
          },
          "enableWebBrowsing": {
            "type": "boolean",
            "description": "If you do not enable URL Filtering on the Security Gateway, you can use a generic Web browser application called Web Browsing in the rule.<br>This application includes all HTTP traffic that is not a defined application Application and URL Filtering assigns Web Browsing as the default application for all HTTP traffic that does not match an application in the Application and URL Filtering Database.<br>This property is not available in the Global domain of an MDS machine."
          },
          "httpiNonStandardPorts": {
            "type": "boolean",
            "description": "Enable HTTP inspection on non standard ports for application and URL filtering.<br>This property is not available in the Global domain of an MDS machine."
          },
          "internalErrorFailMode": {
            "type": "string",
            "description": "In case of internal system error, allow or block all connections.<br>This property is not available in the Global domain of an MDS machine."
          },
          "managementAppControlAdvancedSettingsId": {
            "type": "string"
          },
          "matchApplicationOnAnyPort": {
            "type": "boolean",
            "description": "Match Web application on 'Any' port when used in Block rule - By default this is set to true. and so applications are matched on all services when used in a Block rule."
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier."
          },
          "urlFilteringSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "In this section user can enable  URL Filtering features.<br>This property is not available in the Global domain of an MDS machine."
          },
          "webBrowsingServices": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Web browsing services are the services that match a Web-based custom Application/Site."
          },
          "websiteCategorizationMode": {
            "type": "string",
            "description": "Hold - Requests are blocked until categorization is complete.<br>Background - Requests are allowed until categorization is complete.<br>Custom - configure different settings depending on the service -Lets you set different modes for URL Filtering and Social Networking Widgets.<br>This property is not available in the Global domain of an MDS machine."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementApplicationSite:ManagementApplicationSite": {
      "description": "This resource allows you to execute Check Point Application Site.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementApplicationSite(\"example\", {\n    name: \"New Application Site 1\",\n    primaryCategory: \"Social Networking\",\n    description: \"My Application Site\",\n    additionalCategories: [\n        \"Instant Chat\",\n        \"Supports Streaming\",\n        \"New Application Site Category 1\",\n    ],\n    urlLists: [\n        \"www.cnet.com\",\n        \"www.stackoverflow.com\",\n    ],\n    urlsDefinedAsRegularExpression: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementApplicationSite(\"example\",\n    name=\"New Application Site 1\",\n    primary_category=\"Social Networking\",\n    description=\"My Application Site\",\n    additional_categories=[\n        \"Instant Chat\",\n        \"Supports Streaming\",\n        \"New Application Site Category 1\",\n    ],\n    url_lists=[\n        \"www.cnet.com\",\n        \"www.stackoverflow.com\",\n    ],\n    urls_defined_as_regular_expression=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementApplicationSite(\"example\", new()\n    {\n        Name = \"New Application Site 1\",\n        PrimaryCategory = \"Social Networking\",\n        Description = \"My Application Site\",\n        AdditionalCategories = new[]\n        {\n            \"Instant Chat\",\n            \"Supports Streaming\",\n            \"New Application Site Category 1\",\n        },\n        UrlLists = new[]\n        {\n            \"www.cnet.com\",\n            \"www.stackoverflow.com\",\n        },\n        UrlsDefinedAsRegularExpression = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementApplicationSite(ctx, \"example\", &checkpoint.ManagementApplicationSiteArgs{\n\t\t\tName:            pulumi.String(\"New Application Site 1\"),\n\t\t\tPrimaryCategory: pulumi.String(\"Social Networking\"),\n\t\t\tDescription:     pulumi.String(\"My Application Site\"),\n\t\t\tAdditionalCategories: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Instant Chat\"),\n\t\t\t\tpulumi.String(\"Supports Streaming\"),\n\t\t\t\tpulumi.String(\"New Application Site Category 1\"),\n\t\t\t},\n\t\t\tUrlLists: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"www.cnet.com\"),\n\t\t\t\tpulumi.String(\"www.stackoverflow.com\"),\n\t\t\t},\n\t\t\tUrlsDefinedAsRegularExpression: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSite;\nimport com.pulumi.checkpoint.ManagementApplicationSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementApplicationSite(\"example\", ManagementApplicationSiteArgs.builder()\n            .name(\"New Application Site 1\")\n            .primaryCategory(\"Social Networking\")\n            .description(\"My Application Site\")\n            .additionalCategories(            \n                \"Instant Chat\",\n                \"Supports Streaming\",\n                \"New Application Site Category 1\")\n            .urlLists(            \n                \"www.cnet.com\",\n                \"www.stackoverflow.com\")\n            .urlsDefinedAsRegularExpression(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementApplicationSite\n    properties:\n      name: New Application Site 1\n      primaryCategory: Social Networking\n      description: My Application Site\n      additionalCategories:\n        - Instant Chat\n        - Supports Streaming\n        - New Application Site Category 1\n      urlLists:\n        - www.cnet.com\n        - www.stackoverflow.com\n      urlsDefinedAsRegularExpression: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "additionalCategories": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Used to configure or edit the additional categories of a custom application / site used in the Application and URL Filtering or Threat Prevention.additional_categories blocks are documented below.\n"
        },
        "applicationSignature": {
          "type": "string",
          "description": "Application signature generated by <a href=\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk103051\">Signature Tool</a>.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "A description for the application.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementApplicationSiteId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "primaryCategory": {
          "type": "string",
          "description": "Each application is assigned to one primary category based on its most defining aspect.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "urlLists": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "URLs that determine this particular application.url_list blocks are documented below.\n"
        },
        "urlsDefinedAsRegularExpression": {
          "type": "boolean",
          "description": "States whether the URL is defined as a Regular Expression or not.\n"
        }
      },
      "type": "object",
      "required": [
        "managementApplicationSiteId",
        "name"
      ],
      "inputProperties": {
        "additionalCategories": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Used to configure or edit the additional categories of a custom application / site used in the Application and URL Filtering or Threat Prevention.additional_categories blocks are documented below.\n"
        },
        "applicationSignature": {
          "type": "string",
          "description": "Application signature generated by <a href=\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk103051\">Signature Tool</a>.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "A description for the application.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementApplicationSiteId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "primaryCategory": {
          "type": "string",
          "description": "Each application is assigned to one primary category based on its most defining aspect.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "urlLists": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "URLs that determine this particular application.url_list blocks are documented below.\n"
        },
        "urlsDefinedAsRegularExpression": {
          "type": "boolean",
          "description": "States whether the URL is defined as a Regular Expression or not.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementApplicationSite resources.\n",
        "properties": {
          "additionalCategories": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Used to configure or edit the additional categories of a custom application / site used in the Application and URL Filtering or Threat Prevention.additional_categories blocks are documented below.\n"
          },
          "applicationSignature": {
            "type": "string",
            "description": "Application signature generated by <a href=\"https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk103051\">Signature Tool</a>.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "A description for the application.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementApplicationSiteId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "primaryCategory": {
            "type": "string",
            "description": "Each application is assigned to one primary category based on its most defining aspect.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "urlLists": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "URLs that determine this particular application.url_list blocks are documented below.\n"
          },
          "urlsDefinedAsRegularExpression": {
            "type": "boolean",
            "description": "States whether the URL is defined as a Regular Expression or not.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementApplicationSiteCategory:ManagementApplicationSiteCategory": {
      "description": "This resource allows you to execute Check Point Application Site Category.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementApplicationSiteCategory(\"example\", {\n    name: \"New Application Site Category 1\",\n    description: \"My Application Site category\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementApplicationSiteCategory(\"example\",\n    name=\"New Application Site Category 1\",\n    description=\"My Application Site category\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementApplicationSiteCategory(\"example\", new()\n    {\n        Name = \"New Application Site Category 1\",\n        Description = \"My Application Site category\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementApplicationSiteCategory(ctx, \"example\", &checkpoint.ManagementApplicationSiteCategoryArgs{\n\t\t\tName:        pulumi.String(\"New Application Site Category 1\"),\n\t\t\tDescription: pulumi.String(\"My Application Site category\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSiteCategory;\nimport com.pulumi.checkpoint.ManagementApplicationSiteCategoryArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementApplicationSiteCategory(\"example\", ManagementApplicationSiteCategoryArgs.builder()\n            .name(\"New Application Site Category 1\")\n            .description(\"My Application Site category\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementApplicationSiteCategory\n    properties:\n      name: New Application Site Category 1\n      description: My Application Site category\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "N/A\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementApplicationSiteCategoryId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementApplicationSiteCategoryId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "N/A\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementApplicationSiteCategoryId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementApplicationSiteCategory resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "N/A\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementApplicationSiteCategoryId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementApplicationSiteGroup:ManagementApplicationSiteGroup": {
      "description": "This resource allows you to execute Check Point Application Site Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementApplicationSiteGroup(\"example\", {\n    name: \"New Application Site Group 1\",\n    members: [\n        \"facebook\",\n        \"Social Networking\",\n        \"New Application Site 1\",\n        \"New Application Site Category 1\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementApplicationSiteGroup(\"example\",\n    name=\"New Application Site Group 1\",\n    members=[\n        \"facebook\",\n        \"Social Networking\",\n        \"New Application Site 1\",\n        \"New Application Site Category 1\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementApplicationSiteGroup(\"example\", new()\n    {\n        Name = \"New Application Site Group 1\",\n        Members = new[]\n        {\n            \"facebook\",\n            \"Social Networking\",\n            \"New Application Site 1\",\n            \"New Application Site Category 1\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementApplicationSiteGroup(ctx, \"example\", &checkpoint.ManagementApplicationSiteGroupArgs{\n\t\t\tName: pulumi.String(\"New Application Site Group 1\"),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"facebook\"),\n\t\t\t\tpulumi.String(\"Social Networking\"),\n\t\t\t\tpulumi.String(\"New Application Site 1\"),\n\t\t\t\tpulumi.String(\"New Application Site Category 1\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSiteGroup;\nimport com.pulumi.checkpoint.ManagementApplicationSiteGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementApplicationSiteGroup(\"example\", ManagementApplicationSiteGroupArgs.builder()\n            .name(\"New Application Site Group 1\")\n            .members(            \n                \"facebook\",\n                \"Social Networking\",\n                \"New Application Site 1\",\n                \"New Application Site Category 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementApplicationSiteGroup\n    properties:\n      name: New Application Site Group 1\n      members:\n        - facebook\n        - Social Networking\n        - New Application Site 1\n        - New Application Site Category 1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementApplicationSiteGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of application and URL filtering objects identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementApplicationSiteGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementApplicationSiteGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of application and URL filtering objects identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementApplicationSiteGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementApplicationSiteGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of application and URL filtering objects identified by the name or UID.members blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAssignGlobalAssignment:ManagementAssignGlobalAssignment": {
      "properties": {
        "dependentDomains": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Adependent_domains blocks are documented below.\n"
        },
        "globalDomains": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Aglobal_domains blocks are documented below.\n"
        },
        "managementAssignGlobalAssignmentId": {
          "type": "string"
        },
        "tasks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Command asynchronous task unique identifiers"
        }
      },
      "type": "object",
      "required": [
        "managementAssignGlobalAssignmentId",
        "tasks"
      ],
      "inputProperties": {
        "dependentDomains": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Adependent_domains blocks are documented below.\n"
        },
        "globalDomains": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Aglobal_domains blocks are documented below.\n"
        },
        "managementAssignGlobalAssignmentId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAssignGlobalAssignment resources.\n",
        "properties": {
          "dependentDomains": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "N/Adependent_domains blocks are documented below.\n"
          },
          "globalDomains": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "N/Aglobal_domains blocks are documented below.\n"
          },
          "managementAssignGlobalAssignmentId": {
            "type": "string"
          },
          "tasks": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Command asynchronous task unique identifiers"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAwsDataCenterServer:ManagementAwsDataCenterServer": {
      "description": "This resource allows you to execute Check Point AWS Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testAws = new checkpoint.ManagementAwsDataCenterServer(\"testAws\", {\n    name: \"MY-AWS\",\n    authenticationMethod: \"user-authentication\",\n    accessKeyId: \"MY-KEY-ID\",\n    secretAccessKey: \"MY-SECRET-KEY\",\n    region: \"us-east-1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_aws = checkpoint.ManagementAwsDataCenterServer(\"testAws\",\n    name=\"MY-AWS\",\n    authentication_method=\"user-authentication\",\n    access_key_id=\"MY-KEY-ID\",\n    secret_access_key=\"MY-SECRET-KEY\",\n    region=\"us-east-1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testAws = new Checkpoint.ManagementAwsDataCenterServer(\"testAws\", new()\n    {\n        Name = \"MY-AWS\",\n        AuthenticationMethod = \"user-authentication\",\n        AccessKeyId = \"MY-KEY-ID\",\n        SecretAccessKey = \"MY-SECRET-KEY\",\n        Region = \"us-east-1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAwsDataCenterServer(ctx, \"testAws\", &checkpoint.ManagementAwsDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"MY-AWS\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"user-authentication\"),\n\t\t\tAccessKeyId:          pulumi.String(\"MY-KEY-ID\"),\n\t\t\tSecretAccessKey:      pulumi.String(\"MY-SECRET-KEY\"),\n\t\t\tRegion:               pulumi.String(\"us-east-1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAwsDataCenterServer;\nimport com.pulumi.checkpoint.ManagementAwsDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testAws = new ManagementAwsDataCenterServer(\"testAws\", ManagementAwsDataCenterServerArgs.builder()\n            .name(\"MY-AWS\")\n            .authenticationMethod(\"user-authentication\")\n            .accessKeyId(\"MY-KEY-ID\")\n            .secretAccessKey(\"MY-SECRET-KEY\")\n            .region(\"us-east-1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testAws:\n    type: checkpoint:ManagementAwsDataCenterServer\n    properties:\n      name: MY-AWS\n      authenticationMethod: user-authentication\n      accessKeyId: MY-KEY-ID\n      secretAccessKey: MY-SECRET-KEY\n      region: us-east-1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "accessKeyId": {
          "type": "string",
          "description": "Access key ID for the AWS account. Required for authentication-method:user-authentication.\n",
          "secret": true
        },
        "authenticationMethod": {
          "type": "string",
          "description": "user-authentication Uses the Access keys to authenticate. role-authentication Uses the AWS IAM role to authenticate. This option requires the Security Management Server be deployed in AWS and has an IAM Role.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enableStsAssumeRole": {
          "type": "boolean",
          "description": "Enables the STS Assume Role option. After it is enabled, the sts-role field is mandatory, whereas the sts-external-id is optional.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAwsDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "region": {
          "type": "string",
          "description": "Select the AWS region.\n"
        },
        "secretAccessKey": {
          "type": "string",
          "description": "Secret access key for the AWS account. Required for authentication-method:user-authentication.\n",
          "secret": true
        },
        "stsExternalId": {
          "type": "string",
          "description": "An optional STS External-Id to use when assuming the role.\n"
        },
        "stsRole": {
          "type": "string",
          "description": "Enables the STS Assume Role option. After it is enabled, the sts-role field is mandatory, whereas the sts-external-id is optional.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "managementAwsDataCenterServerId",
        "name",
        "region"
      ],
      "inputProperties": {
        "accessKeyId": {
          "type": "string",
          "description": "Access key ID for the AWS account. Required for authentication-method:user-authentication.\n",
          "secret": true
        },
        "authenticationMethod": {
          "type": "string",
          "description": "user-authentication Uses the Access keys to authenticate. role-authentication Uses the AWS IAM role to authenticate. This option requires the Security Management Server be deployed in AWS and has an IAM Role.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enableStsAssumeRole": {
          "type": "boolean",
          "description": "Enables the STS Assume Role option. After it is enabled, the sts-role field is mandatory, whereas the sts-external-id is optional.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAwsDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "region": {
          "type": "string",
          "description": "Select the AWS region.\n"
        },
        "secretAccessKey": {
          "type": "string",
          "description": "Secret access key for the AWS account. Required for authentication-method:user-authentication.\n",
          "secret": true
        },
        "stsExternalId": {
          "type": "string",
          "description": "An optional STS External-Id to use when assuming the role.\n"
        },
        "stsRole": {
          "type": "string",
          "description": "Enables the STS Assume Role option. After it is enabled, the sts-role field is mandatory, whereas the sts-external-id is optional.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "authenticationMethod",
        "region"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAwsDataCenterServer resources.\n",
        "properties": {
          "accessKeyId": {
            "type": "string",
            "description": "Access key ID for the AWS account. Required for authentication-method:user-authentication.\n",
            "secret": true
          },
          "authenticationMethod": {
            "type": "string",
            "description": "user-authentication Uses the Access keys to authenticate. role-authentication Uses the AWS IAM role to authenticate. This option requires the Security Management Server be deployed in AWS and has an IAM Role.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "enableStsAssumeRole": {
            "type": "boolean",
            "description": "Enables the STS Assume Role option. After it is enabled, the sts-role field is mandatory, whereas the sts-external-id is optional.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAwsDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "region": {
            "type": "string",
            "description": "Select the AWS region.\n"
          },
          "secretAccessKey": {
            "type": "string",
            "description": "Secret access key for the AWS account. Required for authentication-method:user-authentication.\n",
            "secret": true
          },
          "stsExternalId": {
            "type": "string",
            "description": "An optional STS External-Id to use when assuming the role.\n"
          },
          "stsRole": {
            "type": "string",
            "description": "Enables the STS Assume Role option. After it is enabled, the sts-role field is mandatory, whereas the sts-external-id is optional.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAzureAd:ManagementAzureAd": {
      "description": "This resource allows you to execute Check Point Azure Ad.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementAzureAd\n    properties:\n      name: example\n      password: '123'\n      userAuthentication: user-authentication\n      username: example\n      applicationId: a8662b33-306f-42ba-9ffb-a0ac27c8903f\n      applicationKey: EjdJ2JcNGpw3[GV8:PMN_s2KH]JhtlpO\n      directoryId: 19c063a8-3bee-4ea5-b984-e344asds37f7\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "applicationId": {
          "type": "string",
          "description": "The Application ID of the Service Principal, in UUID format.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
        },
        "applicationKey": {
          "type": "string",
          "description": "The key created for the Service Principal.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "<b>user-authentication</b><br>Uses the Azure AD User to authenticate.<br><b>service-principal-authentication</b><br>Uses the Service Principal to authenticate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "directoryId": {
          "type": "string",
          "description": "The Directory ID of the Azure AD, in UUID format.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAzureAdId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Azure account.<br><p><font color=\"red\">Required for authentication-method:</font></p>user-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Azure AD Operation task-id, use show-task command to check the progress of the task."
        },
        "username": {
          "type": "string",
          "description": "An Azure Active Directory user Format<br>&lt;username&gt;@&lt;domain&gt;.<br><p><font color=\"red\">Required for authentication-method:</font></p>user-authentication.\n"
        }
      },
      "type": "object",
      "required": [
        "applicationId",
        "applicationKey",
        "authenticationMethod",
        "directoryId",
        "managementAzureAdId",
        "name",
        "password",
        "taskId",
        "username"
      ],
      "inputProperties": {
        "applicationId": {
          "type": "string",
          "description": "The Application ID of the Service Principal, in UUID format.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
        },
        "applicationKey": {
          "type": "string",
          "description": "The key created for the Service Principal.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "<b>user-authentication</b><br>Uses the Azure AD User to authenticate.<br><b>service-principal-authentication</b><br>Uses the Service Principal to authenticate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "directoryId": {
          "type": "string",
          "description": "The Directory ID of the Azure AD, in UUID format.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAzureAdId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Azure account.<br><p><font color=\"red\">Required for authentication-method:</font></p>user-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "username": {
          "type": "string",
          "description": "An Azure Active Directory user Format<br>&lt;username&gt;@&lt;domain&gt;.<br><p><font color=\"red\">Required for authentication-method:</font></p>user-authentication.\n"
        }
      },
      "requiredInputs": [
        "applicationId",
        "applicationKey",
        "authenticationMethod",
        "directoryId",
        "password",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAzureAd resources.\n",
        "properties": {
          "applicationId": {
            "type": "string",
            "description": "The Application ID of the Service Principal, in UUID format.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
          },
          "applicationKey": {
            "type": "string",
            "description": "The key created for the Service Principal.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
          },
          "authenticationMethod": {
            "type": "string",
            "description": "<b>user-authentication</b><br>Uses the Azure AD User to authenticate.<br><b>service-principal-authentication</b><br>Uses the Service Principal to authenticate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "directoryId": {
            "type": "string",
            "description": "The Directory ID of the Azure AD, in UUID format.<br><p><font color=\"red\">Required for authentication-method:</font></p>service-principal-authentication.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAzureAdId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the Azure account.<br><p><font color=\"red\">Required for authentication-method:</font></p>user-authentication.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Azure AD Operation task-id, use show-task command to check the progress of the task."
          },
          "username": {
            "type": "string",
            "description": "An Azure Active Directory user Format<br>&lt;username&gt;@&lt;domain&gt;.<br><p><font color=\"red\">Required for authentication-method:</font></p>user-authentication.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementAzureDataCenterServer:ManagementAzureDataCenterServer": {
      "description": "This resource allows you to execute Check Point Azure Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testAzure = new checkpoint.ManagementAzureDataCenterServer(\"testAzure\", {\n    name: \"myAzure\",\n    authenticationMethod: \"user-authentication\",\n    username: \"MY-KEY-ID\",\n    password: \"MY-SECRET-KEY\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_azure = checkpoint.ManagementAzureDataCenterServer(\"testAzure\",\n    name=\"myAzure\",\n    authentication_method=\"user-authentication\",\n    username=\"MY-KEY-ID\",\n    password=\"MY-SECRET-KEY\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testAzure = new Checkpoint.ManagementAzureDataCenterServer(\"testAzure\", new()\n    {\n        Name = \"myAzure\",\n        AuthenticationMethod = \"user-authentication\",\n        Username = \"MY-KEY-ID\",\n        Password = \"MY-SECRET-KEY\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementAzureDataCenterServer(ctx, \"testAzure\", &checkpoint.ManagementAzureDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"myAzure\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"user-authentication\"),\n\t\t\tUsername:             pulumi.String(\"MY-KEY-ID\"),\n\t\t\tPassword:             pulumi.String(\"MY-SECRET-KEY\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAzureDataCenterServer;\nimport com.pulumi.checkpoint.ManagementAzureDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testAzure = new ManagementAzureDataCenterServer(\"testAzure\", ManagementAzureDataCenterServerArgs.builder()\n            .name(\"myAzure\")\n            .authenticationMethod(\"user-authentication\")\n            .username(\"MY-KEY-ID\")\n            .password(\"MY-SECRET-KEY\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testAzure:\n    type: checkpoint:ManagementAzureDataCenterServer\n    properties:\n      name: myAzure\n      authenticationMethod: user-authentication\n      username: MY-KEY-ID\n      password: MY-SECRET-KEY\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "applicationId": {
          "type": "string",
          "description": "The Application ID of the Service Principal, in UUID format. Required for authentication-method: service-principal-authentication.\n"
        },
        "applicationKey": {
          "type": "string",
          "description": "The key created for the Service Principal. Required for authentication-method: service-principal-authentication.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "user-authentication Uses the Azure AD User to authenticate. service-principal-authentication Uses the Service Principal to authenticate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "directoryId": {
          "type": "string",
          "description": "The Directory ID of the Azure AD, in UUID format. Required for authentication-method: service-principal-authentication.\n"
        },
        "environment": {
          "type": "string",
          "description": "Select the Azure Cloud Environment.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAzureDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Azure account. Required for authentication-method: user-authentication.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the Azure account encoded in Base64. Required for authentication-method: user-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "username": {
          "type": "string",
          "description": "An Azure Active Directory user Format <username>@<domain>. Required for authentication-method: user-authentication.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "managementAzureDataCenterServerId",
        "name"
      ],
      "inputProperties": {
        "applicationId": {
          "type": "string",
          "description": "The Application ID of the Service Principal, in UUID format. Required for authentication-method: service-principal-authentication.\n"
        },
        "applicationKey": {
          "type": "string",
          "description": "The key created for the Service Principal. Required for authentication-method: service-principal-authentication.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "user-authentication Uses the Azure AD User to authenticate. service-principal-authentication Uses the Service Principal to authenticate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "directoryId": {
          "type": "string",
          "description": "The Directory ID of the Azure AD, in UUID format. Required for authentication-method: service-principal-authentication.\n"
        },
        "environment": {
          "type": "string",
          "description": "Select the Azure Cloud Environment.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementAzureDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Azure account. Required for authentication-method: user-authentication.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the Azure account encoded in Base64. Required for authentication-method: user-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "username": {
          "type": "string",
          "description": "An Azure Active Directory user Format <username>@<domain>. Required for authentication-method: user-authentication.\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "authenticationMethod"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementAzureDataCenterServer resources.\n",
        "properties": {
          "applicationId": {
            "type": "string",
            "description": "The Application ID of the Service Principal, in UUID format. Required for authentication-method: service-principal-authentication.\n"
          },
          "applicationKey": {
            "type": "string",
            "description": "The key created for the Service Principal. Required for authentication-method: service-principal-authentication.\n"
          },
          "authenticationMethod": {
            "type": "string",
            "description": "user-authentication Uses the Azure AD User to authenticate. service-principal-authentication Uses the Service Principal to authenticate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "directoryId": {
            "type": "string",
            "description": "The Directory ID of the Azure AD, in UUID format. Required for authentication-method: service-principal-authentication.\n"
          },
          "environment": {
            "type": "string",
            "description": "Select the Azure Cloud Environment.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementAzureDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the Azure account. Required for authentication-method: user-authentication.\n",
            "secret": true
          },
          "passwordBase64": {
            "type": "string",
            "description": "Password of the Azure account encoded in Base64. Required for authentication-method: user-authentication.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "username": {
            "type": "string",
            "description": "An Azure Active Directory user Format <username>@<domain>. Required for authentication-method: user-authentication.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementBackupDomain:ManagementBackupDomain": {
      "properties": {
        "domain": {
          "type": "string",
          "description": "Domain can be identified by name or UID.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path in which the backup domain data will be saved. <br>Should be the directory path or the full file path with \".tgz\" <br>If no path was inserted the default will be: \"/var/log/&lt;domain name&gt;_&lt;date&gt;.tgz\".\n"
        },
        "managementBackupDomainId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "domain",
        "managementBackupDomainId",
        "taskId"
      ],
      "inputProperties": {
        "domain": {
          "type": "string",
          "description": "Domain can be identified by name or UID.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path in which the backup domain data will be saved. <br>Should be the directory path or the full file path with \".tgz\" <br>If no path was inserted the default will be: \"/var/log/&lt;domain name&gt;_&lt;date&gt;.tgz\".\n"
        },
        "managementBackupDomainId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "domain"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementBackupDomain resources.\n",
        "properties": {
          "domain": {
            "type": "string",
            "description": "Domain can be identified by name or UID.\n"
          },
          "filePath": {
            "type": "string",
            "description": "Path in which the backup domain data will be saved. <br>Should be the directory path or the full file path with \".tgz\" <br>If no path was inserted the default will be: \"/var/log/&lt;domain name&gt;_&lt;date&gt;.tgz\".\n"
          },
          "managementBackupDomainId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementChangePasswordOnNextLogin:ManagementChangePasswordOnNextLogin": {
      "properties": {
        "managementChangePasswordOnNextLoginId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Operation status.\n"
        }
      },
      "type": "object",
      "required": [
        "managementChangePasswordOnNextLoginId",
        "message"
      ],
      "inputProperties": {
        "managementChangePasswordOnNextLoginId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementChangePasswordOnNextLogin resources.\n",
        "properties": {
          "managementChangePasswordOnNextLoginId": {
            "type": "string"
          },
          "message": {
            "type": "string",
            "description": "Operation status.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCheckNetworkFeed:ManagementCheckNetworkFeed": {
      "properties": {
        "managementCheckNetworkFeedId": {
          "type": "string"
        },
        "networkFeed": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "network feed parameters.network_feed blocks are documented below.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object\nunique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementCheckNetworkFeedId",
        "networkFeed",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "managementCheckNetworkFeedId": {
          "type": "string"
        },
        "networkFeed": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "network feed parameters.network_feed blocks are documented below.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object\nunique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "networkFeed",
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCheckNetworkFeed resources.\n",
        "properties": {
          "managementCheckNetworkFeedId": {
            "type": "string"
          },
          "networkFeed": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "network feed parameters.network_feed blocks are documented below.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object\nunique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCheckThreatIocFeed:ManagementCheckThreatIocFeed": {
      "properties": {
        "iocFeed": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "threat ioc feed parameters.ioc_feed blocks are documented below.\n"
        },
        "managementCheckThreatIocFeedId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "iocFeed",
        "managementCheckThreatIocFeedId",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "iocFeed": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "threat ioc feed parameters.ioc_feed blocks are documented below.\n"
        },
        "managementCheckThreatIocFeedId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "iocFeed",
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCheckThreatIocFeed resources.\n",
        "properties": {
          "iocFeed": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "threat ioc feed parameters.ioc_feed blocks are documented below.\n"
          },
          "managementCheckThreatIocFeedId": {
            "type": "string"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCheckpointHost:ManagementCheckpointHost": {
      "description": "This resource allows you to execute Check Point Checkpoint Host.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementCheckpointHost(\"example\", {\n    name: \"checkpoint host\",\n    ipv4Address: \"5.5.5.5\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementCheckpointHost(\"example\",\n    name=\"checkpoint host\",\n    ipv4_address=\"5.5.5.5\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementCheckpointHost(\"example\", new()\n    {\n        Name = \"checkpoint host\",\n        Ipv4Address = \"5.5.5.5\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCheckpointHost(ctx, \"example\", &checkpoint.ManagementCheckpointHostArgs{\n\t\t\tName:        pulumi.String(\"checkpoint host\"),\n\t\t\tIpv4Address: pulumi.String(\"5.5.5.5\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCheckpointHost;\nimport com.pulumi.checkpoint.ManagementCheckpointHostArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementCheckpointHost(\"example\", ManagementCheckpointHostArgs.builder()\n            .name(\"checkpoint host\")\n            .ipv4Address(\"5.5.5.5\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementCheckpointHost\n    properties:\n      name: checkpoint host\n      ipv4Address: 5.5.5.5\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hardware": {
          "type": "string",
          "description": "Hardware name.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCheckpointHostInterface:ManagementCheckpointHostInterface"
          },
          "description": "Checkpoint host interfaces. interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "logsSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Logs settings.<span pulumi-lang-nodejs=\" logsSettings \" pulumi-lang-dotnet=\" LogsSettings \" pulumi-lang-go=\" logsSettings \" pulumi-lang-python=\" logs_settings \" pulumi-lang-yaml=\" logsSettings \" pulumi-lang-java=\" logsSettings \"> logs_settings </span>blocks are documented below.\n"
        },
        "managementBlades": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Management blades.<span pulumi-lang-nodejs=\" managementBlades \" pulumi-lang-dotnet=\" ManagementBlades \" pulumi-lang-go=\" managementBlades \" pulumi-lang-python=\" management_blades \" pulumi-lang-yaml=\" managementBlades \" pulumi-lang-java=\" managementBlades \"> management_blades </span>blocks are documented below.\n"
        },
        "managementCheckpointHostId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.<span pulumi-lang-nodejs=\" natSettings \" pulumi-lang-dotnet=\" NatSettings \" pulumi-lang-go=\" natSettings \" pulumi-lang-python=\" nat_settings \" pulumi-lang-yaml=\" natSettings \" pulumi-lang-java=\" natSettings \"> nat_settings </span>blocks are documented below.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "Secure internal connection one time password.\n",
          "secret": true
        },
        "os": {
          "type": "string",
          "description": "Operating system name.\n"
        },
        "saveLogsLocally": {
          "type": "boolean",
          "description": "Enable save logs locally.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Server(s) to send alerts to identified by the name or UID.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Backup server(s) to send logs to identified by the name or UID.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Server(s) to send logs to identified by the name or UID.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Name of the Secure Internal Connection Trust.\n"
        },
        "sicState": {
          "type": "string",
          "description": "State the Secure Internal Connection Trust.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "version": {
          "type": "string",
          "description": "Checkpoint host platform version.\n"
        }
      },
      "type": "object",
      "required": [
        "managementCheckpointHostId",
        "name",
        "sicName",
        "sicState"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hardware": {
          "type": "string",
          "description": "Hardware name.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCheckpointHostInterface:ManagementCheckpointHostInterface"
          },
          "description": "Checkpoint host interfaces. interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "logsSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Logs settings.<span pulumi-lang-nodejs=\" logsSettings \" pulumi-lang-dotnet=\" LogsSettings \" pulumi-lang-go=\" logsSettings \" pulumi-lang-python=\" logs_settings \" pulumi-lang-yaml=\" logsSettings \" pulumi-lang-java=\" logsSettings \"> logs_settings </span>blocks are documented below.\n"
        },
        "managementBlades": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Management blades.<span pulumi-lang-nodejs=\" managementBlades \" pulumi-lang-dotnet=\" ManagementBlades \" pulumi-lang-go=\" managementBlades \" pulumi-lang-python=\" management_blades \" pulumi-lang-yaml=\" managementBlades \" pulumi-lang-java=\" managementBlades \"> management_blades </span>blocks are documented below.\n"
        },
        "managementCheckpointHostId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.<span pulumi-lang-nodejs=\" natSettings \" pulumi-lang-dotnet=\" NatSettings \" pulumi-lang-go=\" natSettings \" pulumi-lang-python=\" nat_settings \" pulumi-lang-yaml=\" natSettings \" pulumi-lang-java=\" natSettings \"> nat_settings </span>blocks are documented below.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "Secure internal connection one time password.\n",
          "secret": true
        },
        "os": {
          "type": "string",
          "description": "Operating system name.\n"
        },
        "saveLogsLocally": {
          "type": "boolean",
          "description": "Enable save logs locally.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Server(s) to send alerts to identified by the name or UID.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Backup server(s) to send logs to identified by the name or UID.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Server(s) to send logs to identified by the name or UID.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "version": {
          "type": "string",
          "description": "Checkpoint host platform version.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCheckpointHost resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hardware": {
            "type": "string",
            "description": "Hardware name.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementCheckpointHostInterface:ManagementCheckpointHostInterface"
            },
            "description": "Checkpoint host interfaces. interfaces blocks are documented below.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "logsSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Logs settings.<span pulumi-lang-nodejs=\" logsSettings \" pulumi-lang-dotnet=\" LogsSettings \" pulumi-lang-go=\" logsSettings \" pulumi-lang-python=\" logs_settings \" pulumi-lang-yaml=\" logsSettings \" pulumi-lang-java=\" logsSettings \"> logs_settings </span>blocks are documented below.\n"
          },
          "managementBlades": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Management blades.<span pulumi-lang-nodejs=\" managementBlades \" pulumi-lang-dotnet=\" ManagementBlades \" pulumi-lang-go=\" managementBlades \" pulumi-lang-python=\" management_blades \" pulumi-lang-yaml=\" managementBlades \" pulumi-lang-java=\" managementBlades \"> management_blades </span>blocks are documented below.\n"
          },
          "managementCheckpointHostId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "natSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "NAT settings.<span pulumi-lang-nodejs=\" natSettings \" pulumi-lang-dotnet=\" NatSettings \" pulumi-lang-go=\" natSettings \" pulumi-lang-python=\" nat_settings \" pulumi-lang-yaml=\" natSettings \" pulumi-lang-java=\" natSettings \"> nat_settings </span>blocks are documented below.\n"
          },
          "oneTimePassword": {
            "type": "string",
            "description": "Secure internal connection one time password.\n",
            "secret": true
          },
          "os": {
            "type": "string",
            "description": "Operating system name.\n"
          },
          "saveLogsLocally": {
            "type": "boolean",
            "description": "Enable save logs locally.\n"
          },
          "sendAlertsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Server(s) to send alerts to identified by the name or UID.\n"
          },
          "sendLogsToBackupServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Backup server(s) to send logs to identified by the name or UID.\n"
          },
          "sendLogsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Server(s) to send logs to identified by the name or UID.\n"
          },
          "sicName": {
            "type": "string",
            "description": "Name of the Secure Internal Connection Trust.\n"
          },
          "sicState": {
            "type": "string",
            "description": "State the Secure Internal Connection Trust.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "version": {
            "type": "string",
            "description": "Checkpoint host platform version.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeAccountsAws:ManagementCmeAccountsAws": {
      "properties": {
        "accessKey": {
          "type": "string",
          "description": "AWS access key.\n"
        },
        "communities": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of communities that are allowed for VPN connections for AWS Transit\nGateways that are discovered by this account.\n"
        },
        "credentialsFile": {
          "type": "string",
          "description": "One of the these options:\n1. The name of a text file containing AWS credentials that is located in $FWDIR/conf/ directory for a Management\nServer or\n$MDSDIR/conf/ directory for a Multi-Domain Management Server.\n2. “IAM” to use an IAM role profile\n"
        },
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "gwConfigurations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "A list of GW configurations attached to the account"
        },
        "managementCmeAccountsAwsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification without spaces.\n"
        },
        "platform": {
          "type": "string",
          "description": "The platform of the account."
        },
        "regions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of AWS regions in which the Gateways are being deployed.\n"
        },
        "scanGateways": {
          "type": "boolean",
          "description": "Set true in order to scan gateways with AWS Transit Gateway.\n"
        },
        "scanLoadBalancers": {
          "type": "boolean",
          "description": "Set true in order to scan load balancers access and NAT rules with AWS Transit\nGateway.\n"
        },
        "scanSubnets": {
          "type": "boolean",
          "description": "Set true in order to scan subnets with AWS Gateway Load Balancer.\n"
        },
        "scanSubnets6": {
          "type": "boolean",
          "description": "Set true in order to scan IPv6 subnets with AWS GWLB.\n"
        },
        "scanVpn": {
          "type": "boolean",
          "description": "Set true in order to scan VPN with AWS Transit Gateway.\n"
        },
        "secretKey": {
          "type": "string",
          "description": "AWS secret key.\n",
          "secret": true
        },
        "stsExternalId": {
          "type": "string",
          "description": "AWS STS external id. Must exist with STS role.\n"
        },
        "stsRole": {
          "type": "string",
          "description": "AWS STS role.\n"
        },
        "subAccounts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeAccountsAwsSubAccount:ManagementCmeAccountsAwsSubAccount"
          },
          "description": "AWS sub-accounts. Supports these parameters:\n"
        }
      },
      "type": "object",
      "required": [
        "gwConfigurations",
        "managementCmeAccountsAwsId",
        "name",
        "platform",
        "regions"
      ],
      "inputProperties": {
        "accessKey": {
          "type": "string",
          "description": "AWS access key.\n"
        },
        "communities": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of communities that are allowed for VPN connections for AWS Transit\nGateways that are discovered by this account.\n"
        },
        "credentialsFile": {
          "type": "string",
          "description": "One of the these options:\n1. The name of a text file containing AWS credentials that is located in $FWDIR/conf/ directory for a Management\nServer or\n$MDSDIR/conf/ directory for a Multi-Domain Management Server.\n2. “IAM” to use an IAM role profile\n"
        },
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "managementCmeAccountsAwsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification without spaces.\n"
        },
        "regions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of AWS regions in which the Gateways are being deployed.\n"
        },
        "scanGateways": {
          "type": "boolean",
          "description": "Set true in order to scan gateways with AWS Transit Gateway.\n"
        },
        "scanLoadBalancers": {
          "type": "boolean",
          "description": "Set true in order to scan load balancers access and NAT rules with AWS Transit\nGateway.\n"
        },
        "scanSubnets": {
          "type": "boolean",
          "description": "Set true in order to scan subnets with AWS Gateway Load Balancer.\n"
        },
        "scanSubnets6": {
          "type": "boolean",
          "description": "Set true in order to scan IPv6 subnets with AWS GWLB.\n"
        },
        "scanVpn": {
          "type": "boolean",
          "description": "Set true in order to scan VPN with AWS Transit Gateway.\n"
        },
        "secretKey": {
          "type": "string",
          "description": "AWS secret key.\n",
          "secret": true
        },
        "stsExternalId": {
          "type": "string",
          "description": "AWS STS external id. Must exist with STS role.\n"
        },
        "stsRole": {
          "type": "string",
          "description": "AWS STS role.\n"
        },
        "subAccounts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeAccountsAwsSubAccount:ManagementCmeAccountsAwsSubAccount"
          },
          "description": "AWS sub-accounts. Supports these parameters:\n"
        }
      },
      "requiredInputs": [
        "regions"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeAccountsAws resources.\n",
        "properties": {
          "accessKey": {
            "type": "string",
            "description": "AWS access key.\n"
          },
          "communities": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of communities that are allowed for VPN connections for AWS Transit\nGateways that are discovered by this account.\n"
          },
          "credentialsFile": {
            "type": "string",
            "description": "One of the these options:\n1. The name of a text file containing AWS credentials that is located in $FWDIR/conf/ directory for a Management\nServer or\n$MDSDIR/conf/ directory for a Multi-Domain Management Server.\n2. “IAM” to use an IAM role profile\n"
          },
          "deletionTolerance": {
            "type": "number",
            "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
          },
          "domain": {
            "type": "string",
            "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
          },
          "gwConfigurations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "A list of GW configurations attached to the account"
          },
          "managementCmeAccountsAwsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Unique account name for identification without spaces.\n"
          },
          "platform": {
            "type": "string",
            "description": "The platform of the account."
          },
          "regions": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of AWS regions in which the Gateways are being deployed.\n"
          },
          "scanGateways": {
            "type": "boolean",
            "description": "Set true in order to scan gateways with AWS Transit Gateway.\n"
          },
          "scanLoadBalancers": {
            "type": "boolean",
            "description": "Set true in order to scan load balancers access and NAT rules with AWS Transit\nGateway.\n"
          },
          "scanSubnets": {
            "type": "boolean",
            "description": "Set true in order to scan subnets with AWS Gateway Load Balancer.\n"
          },
          "scanSubnets6": {
            "type": "boolean",
            "description": "Set true in order to scan IPv6 subnets with AWS GWLB.\n"
          },
          "scanVpn": {
            "type": "boolean",
            "description": "Set true in order to scan VPN with AWS Transit Gateway.\n"
          },
          "secretKey": {
            "type": "string",
            "description": "AWS secret key.\n",
            "secret": true
          },
          "stsExternalId": {
            "type": "string",
            "description": "AWS STS external id. Must exist with STS role.\n"
          },
          "stsRole": {
            "type": "string",
            "description": "AWS STS role.\n"
          },
          "subAccounts": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementCmeAccountsAwsSubAccount:ManagementCmeAccountsAwsSubAccount"
            },
            "description": "AWS sub-accounts. Supports these parameters:\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeAccountsAzure:ManagementCmeAccountsAzure": {
      "properties": {
        "applicationId": {
          "type": "string",
          "description": "The application ID with which the service principal is associated.\n"
        },
        "clientSecret": {
          "type": "string",
          "description": "The service principal's client secret.\n",
          "secret": true
        },
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
        },
        "directoryId": {
          "type": "string",
          "description": "Azure Active Directory tenant ID.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "environment": {
          "type": "string",
          "description": "The Azure environmnet.\n"
        },
        "gwConfigurations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "A list of GW configurations attached to the account"
        },
        "managementCmeAccountsAzureId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification without spaces.\n"
        },
        "platform": {
          "type": "string",
          "description": "The platform of the account."
        },
        "subscription": {
          "type": "string",
          "description": "Azure subscription ID.\n"
        }
      },
      "type": "object",
      "required": [
        "applicationId",
        "clientSecret",
        "directoryId",
        "gwConfigurations",
        "managementCmeAccountsAzureId",
        "name",
        "platform",
        "subscription"
      ],
      "inputProperties": {
        "applicationId": {
          "type": "string",
          "description": "The application ID with which the service principal is associated.\n"
        },
        "clientSecret": {
          "type": "string",
          "description": "The service principal's client secret.\n",
          "secret": true
        },
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
        },
        "directoryId": {
          "type": "string",
          "description": "Azure Active Directory tenant ID.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "environment": {
          "type": "string",
          "description": "The Azure environmnet.\n"
        },
        "managementCmeAccountsAzureId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification without spaces.\n"
        },
        "subscription": {
          "type": "string",
          "description": "Azure subscription ID.\n"
        }
      },
      "requiredInputs": [
        "applicationId",
        "clientSecret",
        "directoryId",
        "subscription"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeAccountsAzure resources.\n",
        "properties": {
          "applicationId": {
            "type": "string",
            "description": "The application ID with which the service principal is associated.\n"
          },
          "clientSecret": {
            "type": "string",
            "description": "The service principal's client secret.\n",
            "secret": true
          },
          "deletionTolerance": {
            "type": "number",
            "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
          },
          "directoryId": {
            "type": "string",
            "description": "Azure Active Directory tenant ID.\n"
          },
          "domain": {
            "type": "string",
            "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
          },
          "environment": {
            "type": "string",
            "description": "The Azure environmnet.\n"
          },
          "gwConfigurations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "A list of GW configurations attached to the account"
          },
          "managementCmeAccountsAzureId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Unique account name for identification without spaces.\n"
          },
          "platform": {
            "type": "string",
            "description": "The platform of the account."
          },
          "subscription": {
            "type": "string",
            "description": "Azure subscription ID.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeAccountsGcp:ManagementCmeAccountsGcp": {
      "description": "## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gcpAccount = new checkpoint.ManagementCmeAccountsGcp(\"gcp_account\", {\n    name: \"gcpAccount\",\n    projectId: \"my-project-1\",\n    credentialsFile: \"cred_file.json\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngcp_account = checkpoint.ManagementCmeAccountsGcp(\"gcp_account\",\n    name=\"gcpAccount\",\n    project_id=\"my-project-1\",\n    credentials_file=\"cred_file.json\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var gcpAccount = new Checkpoint.ManagementCmeAccountsGcp(\"gcp_account\", new()\n    {\n        Name = \"gcpAccount\",\n        ProjectId = \"my-project-1\",\n        CredentialsFile = \"cred_file.json\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCmeAccountsGcp(ctx, \"gcp_account\", &checkpoint.ManagementCmeAccountsGcpArgs{\n\t\t\tName:            pulumi.String(\"gcpAccount\"),\n\t\t\tProjectId:       pulumi.String(\"my-project-1\"),\n\t\t\tCredentialsFile: pulumi.String(\"cred_file.json\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCmeAccountsGcp;\nimport com.pulumi.checkpoint.ManagementCmeAccountsGcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var gcpAccount = new ManagementCmeAccountsGcp(\"gcpAccount\", ManagementCmeAccountsGcpArgs.builder()\n            .name(\"gcpAccount\")\n            .projectId(\"my-project-1\")\n            .credentialsFile(\"cred_file.json\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  gcpAccount:\n    type: checkpoint:ManagementCmeAccountsGcp\n    name: gcp_account\n    properties:\n      name: gcpAccount\n      projectId: my-project-1\n      credentialsFile: cred_file.json\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "credentialsData": {
          "type": "string",
          "description": "Base64 encoded string that represents the content of the credentials file.\n"
        },
        "credentialsFile": {
          "type": "string",
          "description": "The name of a text file containing GCP credentials located in $FWDIR/conf directory\nfor a Management Server or $MDSDIR/conf directory for a Multi-Domain Security Management Server.\n"
        },
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "gwConfigurations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "A list of GW configurations attached to the account"
        },
        "managementCmeAccountsGcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification without spaces.\n"
        },
        "platform": {
          "type": "string",
          "description": "The platform of the account."
        },
        "projectId": {
          "type": "string",
          "description": "GCP project id.\n"
        }
      },
      "type": "object",
      "required": [
        "gwConfigurations",
        "managementCmeAccountsGcpId",
        "name",
        "platform",
        "projectId"
      ],
      "inputProperties": {
        "credentialsData": {
          "type": "string",
          "description": "Base64 encoded string that represents the content of the credentials file.\n"
        },
        "credentialsFile": {
          "type": "string",
          "description": "The name of a text file containing GCP credentials located in $FWDIR/conf directory\nfor a Management Server or $MDSDIR/conf directory for a Multi-Domain Security Management Server.\n"
        },
        "deletionTolerance": {
          "type": "number",
          "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
        },
        "domain": {
          "type": "string",
          "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "managementCmeAccountsGcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Unique account name for identification without spaces.\n"
        },
        "projectId": {
          "type": "string",
          "description": "GCP project id.\n"
        }
      },
      "requiredInputs": [
        "projectId"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeAccountsGcp resources.\n",
        "properties": {
          "credentialsData": {
            "type": "string",
            "description": "Base64 encoded string that represents the content of the credentials file.\n"
          },
          "credentialsFile": {
            "type": "string",
            "description": "The name of a text file containing GCP credentials located in $FWDIR/conf directory\nfor a Management Server or $MDSDIR/conf directory for a Multi-Domain Security Management Server.\n"
          },
          "deletionTolerance": {
            "type": "number",
            "description": "The number of CME cycles to wait when the cloud provider does not return a Gateway\nuntil its deletion.\n"
          },
          "domain": {
            "type": "string",
            "description": "The account's domain name in Multi-Domain Security Management Server environment.\n"
          },
          "gwConfigurations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "A list of GW configurations attached to the account"
          },
          "managementCmeAccountsGcpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Unique account name for identification without spaces.\n"
          },
          "platform": {
            "type": "string",
            "description": "The platform of the account."
          },
          "projectId": {
            "type": "string",
            "description": "GCP project id.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeDelayCycle:ManagementCmeDelayCycle": {
      "description": "## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst delayCycle = new checkpoint.ManagementCmeDelayCycle(\"delay_cycle\", {delayCycle: 30});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndelay_cycle = checkpoint.ManagementCmeDelayCycle(\"delay_cycle\", delay_cycle=30)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var delayCycle = new Checkpoint.ManagementCmeDelayCycle(\"delay_cycle\", new()\n    {\n        DelayCycle = 30,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCmeDelayCycle(ctx, \"delay_cycle\", &checkpoint.ManagementCmeDelayCycleArgs{\n\t\t\tDelayCycle: pulumi.Float64(30),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCmeDelayCycle;\nimport com.pulumi.checkpoint.ManagementCmeDelayCycleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var delayCycle = new ManagementCmeDelayCycle(\"delayCycle\", ManagementCmeDelayCycleArgs.builder()\n            .delayCycle(30.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  delayCycle:\n    type: checkpoint:ManagementCmeDelayCycle\n    name: delay_cycle\n    properties:\n      delayCycle: 30\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "delayCycle": {
          "type": "number",
          "description": "Time to wait in seconds after each poll cycle.\n"
        },
        "managementCmeDelayCycleId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "delayCycle",
        "managementCmeDelayCycleId"
      ],
      "inputProperties": {
        "delayCycle": {
          "type": "number",
          "description": "Time to wait in seconds after each poll cycle.\n"
        },
        "managementCmeDelayCycleId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "delayCycle"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeDelayCycle resources.\n",
        "properties": {
          "delayCycle": {
            "type": "number",
            "description": "Time to wait in seconds after each poll cycle.\n"
          },
          "managementCmeDelayCycleId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeGwConfigurationsAws:ManagementCmeGwConfigurationsAws": {
      "description": "## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigAws = new checkpoint.ManagementCmeGwConfigurationsAws(\"gw_config_aws\", {\n    name: \"awsGWConfigurations\",\n    relatedAccount: \"awsAccount\",\n    version: \"R81\",\n    base64SicKey: \"MTIzNDU2Nzg=\",\n    policy: \"Standard\",\n    tgwSpokeRoutes: [\n        \"192.168.100.0/24\",\n        \"192.168.200.0/24\",\n    ],\n    tgwStaticRoutes: [\n        \"10.0.0.0/16\",\n        \"10.100.0.0/16\",\n    ],\n    sendLogsToServers: [\"PLS_A\"],\n    sendLogsToBackupServers: [\"BLS_B\"],\n    sendAlertsToServers: [\"ALS_C\"],\n    sectionName: \"my_section\",\n    xForwardedFor: true,\n    color: \"blue\",\n    communicationWithServersBehindNat: \"translated-ip-only\",\n    repositoryGatewayScripts: [{\n        name: \"myScript\",\n        parameters: \"ls -l\",\n    }],\n    blades: {\n        ips: true,\n        antiBot: false,\n        antiVirus: false,\n        httpsInspection: false,\n        applicationControl: false,\n        autonomousThreatPrevention: false,\n        contentAwareness: false,\n        identityAwareness: true,\n        ipsecVpn: false,\n        threatEmulation: false,\n        urlFiltering: false,\n        vpn: false,\n    },\n    identityAwarenessSettings: {\n        enableCloudguardController: false,\n        receiveIdentitiesFroms: [\n            \"PDP1\",\n            \"PDP2\",\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_config_aws = checkpoint.ManagementCmeGwConfigurationsAws(\"gw_config_aws\",\n    name=\"awsGWConfigurations\",\n    related_account=\"awsAccount\",\n    version=\"R81\",\n    base64_sic_key=\"MTIzNDU2Nzg=\",\n    policy=\"Standard\",\n    tgw_spoke_routes=[\n        \"192.168.100.0/24\",\n        \"192.168.200.0/24\",\n    ],\n    tgw_static_routes=[\n        \"10.0.0.0/16\",\n        \"10.100.0.0/16\",\n    ],\n    send_logs_to_servers=[\"PLS_A\"],\n    send_logs_to_backup_servers=[\"BLS_B\"],\n    send_alerts_to_servers=[\"ALS_C\"],\n    section_name=\"my_section\",\n    x_forwarded_for=True,\n    color=\"blue\",\n    communication_with_servers_behind_nat=\"translated-ip-only\",\n    repository_gateway_scripts=[{\n        \"name\": \"myScript\",\n        \"parameters\": \"ls -l\",\n    }],\n    blades={\n        \"ips\": True,\n        \"anti_bot\": False,\n        \"anti_virus\": False,\n        \"https_inspection\": False,\n        \"application_control\": False,\n        \"autonomous_threat_prevention\": False,\n        \"content_awareness\": False,\n        \"identity_awareness\": True,\n        \"ipsec_vpn\": False,\n        \"threat_emulation\": False,\n        \"url_filtering\": False,\n        \"vpn\": False,\n    },\n    identity_awareness_settings={\n        \"enable_cloudguard_controller\": False,\n        \"receive_identities_froms\": [\n            \"PDP1\",\n            \"PDP2\",\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var gwConfigAws = new Checkpoint.ManagementCmeGwConfigurationsAws(\"gw_config_aws\", new()\n    {\n        Name = \"awsGWConfigurations\",\n        RelatedAccount = \"awsAccount\",\n        Version = \"R81\",\n        Base64SicKey = \"MTIzNDU2Nzg=\",\n        Policy = \"Standard\",\n        TgwSpokeRoutes = new[]\n        {\n            \"192.168.100.0/24\",\n            \"192.168.200.0/24\",\n        },\n        TgwStaticRoutes = new[]\n        {\n            \"10.0.0.0/16\",\n            \"10.100.0.0/16\",\n        },\n        SendLogsToServers = new[]\n        {\n            \"PLS_A\",\n        },\n        SendLogsToBackupServers = new[]\n        {\n            \"BLS_B\",\n        },\n        SendAlertsToServers = new[]\n        {\n            \"ALS_C\",\n        },\n        SectionName = \"my_section\",\n        XForwardedFor = true,\n        Color = \"blue\",\n        CommunicationWithServersBehindNat = \"translated-ip-only\",\n        RepositoryGatewayScripts = new[]\n        {\n            new Checkpoint.Inputs.ManagementCmeGwConfigurationsAwsRepositoryGatewayScriptArgs\n            {\n                Name = \"myScript\",\n                Parameters = \"ls -l\",\n            },\n        },\n        Blades = new Checkpoint.Inputs.ManagementCmeGwConfigurationsAwsBladesArgs\n        {\n            Ips = true,\n            AntiBot = false,\n            AntiVirus = false,\n            HttpsInspection = false,\n            ApplicationControl = false,\n            AutonomousThreatPrevention = false,\n            ContentAwareness = false,\n            IdentityAwareness = true,\n            IpsecVpn = false,\n            ThreatEmulation = false,\n            UrlFiltering = false,\n            Vpn = false,\n        },\n        IdentityAwarenessSettings = new Checkpoint.Inputs.ManagementCmeGwConfigurationsAwsIdentityAwarenessSettingsArgs\n        {\n            EnableCloudguardController = false,\n            ReceiveIdentitiesFroms = new[]\n            {\n                \"PDP1\",\n                \"PDP2\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCmeGwConfigurationsAws(ctx, \"gw_config_aws\", &checkpoint.ManagementCmeGwConfigurationsAwsArgs{\n\t\t\tName:           pulumi.String(\"awsGWConfigurations\"),\n\t\t\tRelatedAccount: pulumi.String(\"awsAccount\"),\n\t\t\tVersion:        pulumi.String(\"R81\"),\n\t\t\tBase64SicKey:   pulumi.String(\"MTIzNDU2Nzg=\"),\n\t\t\tPolicy:         pulumi.String(\"Standard\"),\n\t\t\tTgwSpokeRoutes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"192.168.100.0/24\"),\n\t\t\t\tpulumi.String(\"192.168.200.0/24\"),\n\t\t\t},\n\t\t\tTgwStaticRoutes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"10.0.0.0/16\"),\n\t\t\t\tpulumi.String(\"10.100.0.0/16\"),\n\t\t\t},\n\t\t\tSendLogsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"PLS_A\"),\n\t\t\t},\n\t\t\tSendLogsToBackupServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"BLS_B\"),\n\t\t\t},\n\t\t\tSendAlertsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ALS_C\"),\n\t\t\t},\n\t\t\tSectionName:                       pulumi.String(\"my_section\"),\n\t\t\tXForwardedFor:                     pulumi.Bool(true),\n\t\t\tColor:                             pulumi.String(\"blue\"),\n\t\t\tCommunicationWithServersBehindNat: pulumi.String(\"translated-ip-only\"),\n\t\t\tRepositoryGatewayScripts: checkpoint.ManagementCmeGwConfigurationsAwsRepositoryGatewayScriptArray{\n\t\t\t\t&checkpoint.ManagementCmeGwConfigurationsAwsRepositoryGatewayScriptArgs{\n\t\t\t\t\tName:       pulumi.String(\"myScript\"),\n\t\t\t\t\tParameters: pulumi.String(\"ls -l\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tBlades: &checkpoint.ManagementCmeGwConfigurationsAwsBladesArgs{\n\t\t\t\tIps:                        pulumi.Bool(true),\n\t\t\t\tAntiBot:                    pulumi.Bool(false),\n\t\t\t\tAntiVirus:                  pulumi.Bool(false),\n\t\t\t\tHttpsInspection:            pulumi.Bool(false),\n\t\t\t\tApplicationControl:         pulumi.Bool(false),\n\t\t\t\tAutonomousThreatPrevention: pulumi.Bool(false),\n\t\t\t\tContentAwareness:           pulumi.Bool(false),\n\t\t\t\tIdentityAwareness:          pulumi.Bool(true),\n\t\t\t\tIpsecVpn:                   pulumi.Bool(false),\n\t\t\t\tThreatEmulation:            pulumi.Bool(false),\n\t\t\t\tUrlFiltering:               pulumi.Bool(false),\n\t\t\t\tVpn:                        pulumi.Bool(false),\n\t\t\t},\n\t\t\tIdentityAwarenessSettings: &checkpoint.ManagementCmeGwConfigurationsAwsIdentityAwarenessSettingsArgs{\n\t\t\t\tEnableCloudguardController: pulumi.Bool(false),\n\t\t\t\tReceiveIdentitiesFroms: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"PDP1\"),\n\t\t\t\t\tpulumi.String(\"PDP2\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCmeGwConfigurationsAws;\nimport com.pulumi.checkpoint.ManagementCmeGwConfigurationsAwsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsAwsRepositoryGatewayScriptArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsAwsBladesArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsAwsIdentityAwarenessSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var gwConfigAws = new ManagementCmeGwConfigurationsAws(\"gwConfigAws\", ManagementCmeGwConfigurationsAwsArgs.builder()\n            .name(\"awsGWConfigurations\")\n            .relatedAccount(\"awsAccount\")\n            .version(\"R81\")\n            .base64SicKey(\"MTIzNDU2Nzg=\")\n            .policy(\"Standard\")\n            .tgwSpokeRoutes(            \n                \"192.168.100.0/24\",\n                \"192.168.200.0/24\")\n            .tgwStaticRoutes(            \n                \"10.0.0.0/16\",\n                \"10.100.0.0/16\")\n            .sendLogsToServers(\"PLS_A\")\n            .sendLogsToBackupServers(\"BLS_B\")\n            .sendAlertsToServers(\"ALS_C\")\n            .sectionName(\"my_section\")\n            .xForwardedFor(true)\n            .color(\"blue\")\n            .communicationWithServersBehindNat(\"translated-ip-only\")\n            .repositoryGatewayScripts(ManagementCmeGwConfigurationsAwsRepositoryGatewayScriptArgs.builder()\n                .name(\"myScript\")\n                .parameters(\"ls -l\")\n                .build())\n            .blades(ManagementCmeGwConfigurationsAwsBladesArgs.builder()\n                .ips(true)\n                .antiBot(false)\n                .antiVirus(false)\n                .httpsInspection(false)\n                .applicationControl(false)\n                .autonomousThreatPrevention(false)\n                .contentAwareness(false)\n                .identityAwareness(true)\n                .ipsecVpn(false)\n                .threatEmulation(false)\n                .urlFiltering(false)\n                .vpn(false)\n                .build())\n            .identityAwarenessSettings(ManagementCmeGwConfigurationsAwsIdentityAwarenessSettingsArgs.builder()\n                .enableCloudguardController(false)\n                .receiveIdentitiesFroms(                \n                    \"PDP1\",\n                    \"PDP2\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  gwConfigAws:\n    type: checkpoint:ManagementCmeGwConfigurationsAws\n    name: gw_config_aws\n    properties:\n      name: awsGWConfigurations\n      relatedAccount: awsAccount\n      version: R81\n      base64SicKey: MTIzNDU2Nzg=\n      policy: Standard\n      tgwSpokeRoutes:\n        - 192.168.100.0/24\n        - 192.168.200.0/24\n      tgwStaticRoutes:\n        - 10.0.0.0/16\n        - 10.100.0.0/16\n      sendLogsToServers:\n        - PLS_A\n      sendLogsToBackupServers:\n        - BLS_B\n      sendAlertsToServers:\n        - ALS_C\n      sectionName: my_section\n      xForwardedFor: true\n      color: blue\n      communicationWithServersBehindNat: translated-ip-only\n      repositoryGatewayScripts:\n        - name: myScript\n          parameters: ls -l\n      blades:\n        ips: true\n        antiBot: false\n        antiVirus: false\n        httpsInspection: false\n        applicationControl: false\n        autonomousThreatPrevention: false\n        contentAwareness: false\n        identityAwareness: true\n        ipsecVpn: false\n        threatEmulation: false\n        urlFiltering: false\n        vpn: false\n      identityAwarenessSettings:\n        enableCloudguardController: false\n        receiveIdentitiesFroms:\n          - PDP1\n          - PDP2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64SicKey": {
          "type": "string",
          "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
        },
        "blades": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsBlades:ManagementCmeGwConfigurationsAwsBlades",
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "deploymentType": {
          "type": "string",
          "description": "The deployment type of the CloudGuard Security Gateways.\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsIdentityAwarenessSettings:ManagementCmeGwConfigurationsAwsIdentityAwarenessSettings",
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "managementCmeGwConfigurationsAwsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name without spaces.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The CME account name to associate with the Gateway Configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsRepositoryGatewayScript:ManagementCmeGwConfigurationsAwsRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
        },
        "tgwSpokeRoutes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma separated list of spoke CIDRs; each spoke CIDR that is learned from the Transit\nGateway over BGP is re-advertised by the Gateways of the Transit Gateway auto-scaling group to the AWS Transit\nGateway.\n"
        },
        "tgwStaticRoutes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of CIDRs; for each CIDR a static route is created on each\nGateway of the Transit Gateway auto-scaling group.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "vpnCommunity": {
          "type": "string",
          "description": "A star community to place the VPN Gateway as center.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "The group object to set as the VPN domain for the VPN Gateway.\nAn empty string automatically sets an empty group as the encryption domain. Must be an empty string for 'TGW'\ndeployment type.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "type": "object",
      "required": [
        "base64SicKey",
        "blades",
        "managementCmeGwConfigurationsAwsId",
        "name",
        "policy",
        "relatedAccount",
        "version"
      ],
      "inputProperties": {
        "base64SicKey": {
          "type": "string",
          "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
        },
        "blades": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsBlades:ManagementCmeGwConfigurationsAwsBlades",
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "deploymentType": {
          "type": "string",
          "description": "The deployment type of the CloudGuard Security Gateways.\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsIdentityAwarenessSettings:ManagementCmeGwConfigurationsAwsIdentityAwarenessSettings",
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "managementCmeGwConfigurationsAwsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name without spaces.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The CME account name to associate with the Gateway Configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsRepositoryGatewayScript:ManagementCmeGwConfigurationsAwsRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
        },
        "tgwSpokeRoutes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma separated list of spoke CIDRs; each spoke CIDR that is learned from the Transit\nGateway over BGP is re-advertised by the Gateways of the Transit Gateway auto-scaling group to the AWS Transit\nGateway.\n"
        },
        "tgwStaticRoutes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of CIDRs; for each CIDR a static route is created on each\nGateway of the Transit Gateway auto-scaling group.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "vpnCommunity": {
          "type": "string",
          "description": "A star community to place the VPN Gateway as center.\n"
        },
        "vpnDomain": {
          "type": "string",
          "description": "The group object to set as the VPN domain for the VPN Gateway.\nAn empty string automatically sets an empty group as the encryption domain. Must be an empty string for 'TGW'\ndeployment type.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "requiredInputs": [
        "base64SicKey",
        "blades",
        "policy",
        "relatedAccount",
        "version"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeGwConfigurationsAws resources.\n",
        "properties": {
          "base64SicKey": {
            "type": "string",
            "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
          },
          "blades": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsBlades:ManagementCmeGwConfigurationsAwsBlades",
            "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the gateways objects in SmartConsole.\n"
          },
          "communicationWithServersBehindNat": {
            "type": "string",
            "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
          },
          "deploymentType": {
            "type": "string",
            "description": "The deployment type of the CloudGuard Security Gateways.\n"
          },
          "identityAwarenessSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsIdentityAwarenessSettings:ManagementCmeGwConfigurationsAwsIdentityAwarenessSettings",
            "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
          },
          "managementCmeGwConfigurationsAwsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The Gateway configuration name without spaces.\n"
          },
          "policy": {
            "type": "string",
            "description": "The policy name to install on the Gateway.\n"
          },
          "relatedAccount": {
            "type": "string",
            "description": "The CME account name to associate with the Gateway Configuration.\n"
          },
          "repositoryGatewayScripts": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAwsRepositoryGatewayScript:ManagementCmeGwConfigurationsAwsRepositoryGatewayScript"
            },
            "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
          },
          "sectionName": {
            "type": "string",
            "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
          },
          "sendAlertsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
          },
          "sendLogsToBackupServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
          },
          "sendLogsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
          },
          "tgwSpokeRoutes": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma separated list of spoke CIDRs; each spoke CIDR that is learned from the Transit\nGateway over BGP is re-advertised by the Gateways of the Transit Gateway auto-scaling group to the AWS Transit\nGateway.\n"
          },
          "tgwStaticRoutes": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of CIDRs; for each CIDR a static route is created on each\nGateway of the Transit Gateway auto-scaling group.\n"
          },
          "version": {
            "type": "string",
            "description": "The Gateway version.\n"
          },
          "vpnCommunity": {
            "type": "string",
            "description": "A star community to place the VPN Gateway as center.\n"
          },
          "vpnDomain": {
            "type": "string",
            "description": "The group object to set as the VPN domain for the VPN Gateway.\nAn empty string automatically sets an empty group as the encryption domain. Must be an empty string for 'TGW'\ndeployment type.\n"
          },
          "xForwardedFor": {
            "type": "boolean",
            "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeGwConfigurationsAzure:ManagementCmeGwConfigurationsAzure": {
      "description": "## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigAzure = new checkpoint.ManagementCmeGwConfigurationsAzure(\"gw_config_azure\", {\n    name: \"azureGWConfigurations\",\n    relatedAccount: \"azureAccount\",\n    version: \"R81\",\n    base64SicKey: \"MTIzNDU2Nzg=\",\n    policy: \"Standard\",\n    sendLogsToServers: [\"PLS_A\"],\n    sendLogsToBackupServers: [\"BLS_B\"],\n    sendAlertsToServers: [\"ALS_C\"],\n    sectionName: \"my_section\",\n    xForwardedFor: true,\n    color: \"blue\",\n    ipv6: true,\n    communicationWithServersBehindNat: \"translated-ip-only\",\n    repositoryGatewayScripts: [{\n        name: \"myScript\",\n        parameters: \"ls -l\",\n    }],\n    blades: {\n        ips: true,\n        antiBot: true,\n        antiVirus: true,\n        httpsInspection: false,\n        applicationControl: false,\n        autonomousThreatPrevention: false,\n        contentAwareness: false,\n        identityAwareness: true,\n        ipsecVpn: false,\n        threatEmulation: false,\n        urlFiltering: false,\n        vpn: false,\n    },\n    identityAwarenessSettings: {\n        enableCloudguardController: false,\n        receiveIdentitiesFroms: [\n            \"PDP1\",\n            \"PDP2\",\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_config_azure = checkpoint.ManagementCmeGwConfigurationsAzure(\"gw_config_azure\",\n    name=\"azureGWConfigurations\",\n    related_account=\"azureAccount\",\n    version=\"R81\",\n    base64_sic_key=\"MTIzNDU2Nzg=\",\n    policy=\"Standard\",\n    send_logs_to_servers=[\"PLS_A\"],\n    send_logs_to_backup_servers=[\"BLS_B\"],\n    send_alerts_to_servers=[\"ALS_C\"],\n    section_name=\"my_section\",\n    x_forwarded_for=True,\n    color=\"blue\",\n    ipv6=True,\n    communication_with_servers_behind_nat=\"translated-ip-only\",\n    repository_gateway_scripts=[{\n        \"name\": \"myScript\",\n        \"parameters\": \"ls -l\",\n    }],\n    blades={\n        \"ips\": True,\n        \"anti_bot\": True,\n        \"anti_virus\": True,\n        \"https_inspection\": False,\n        \"application_control\": False,\n        \"autonomous_threat_prevention\": False,\n        \"content_awareness\": False,\n        \"identity_awareness\": True,\n        \"ipsec_vpn\": False,\n        \"threat_emulation\": False,\n        \"url_filtering\": False,\n        \"vpn\": False,\n    },\n    identity_awareness_settings={\n        \"enable_cloudguard_controller\": False,\n        \"receive_identities_froms\": [\n            \"PDP1\",\n            \"PDP2\",\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var gwConfigAzure = new Checkpoint.ManagementCmeGwConfigurationsAzure(\"gw_config_azure\", new()\n    {\n        Name = \"azureGWConfigurations\",\n        RelatedAccount = \"azureAccount\",\n        Version = \"R81\",\n        Base64SicKey = \"MTIzNDU2Nzg=\",\n        Policy = \"Standard\",\n        SendLogsToServers = new[]\n        {\n            \"PLS_A\",\n        },\n        SendLogsToBackupServers = new[]\n        {\n            \"BLS_B\",\n        },\n        SendAlertsToServers = new[]\n        {\n            \"ALS_C\",\n        },\n        SectionName = \"my_section\",\n        XForwardedFor = true,\n        Color = \"blue\",\n        Ipv6 = true,\n        CommunicationWithServersBehindNat = \"translated-ip-only\",\n        RepositoryGatewayScripts = new[]\n        {\n            new Checkpoint.Inputs.ManagementCmeGwConfigurationsAzureRepositoryGatewayScriptArgs\n            {\n                Name = \"myScript\",\n                Parameters = \"ls -l\",\n            },\n        },\n        Blades = new Checkpoint.Inputs.ManagementCmeGwConfigurationsAzureBladesArgs\n        {\n            Ips = true,\n            AntiBot = true,\n            AntiVirus = true,\n            HttpsInspection = false,\n            ApplicationControl = false,\n            AutonomousThreatPrevention = false,\n            ContentAwareness = false,\n            IdentityAwareness = true,\n            IpsecVpn = false,\n            ThreatEmulation = false,\n            UrlFiltering = false,\n            Vpn = false,\n        },\n        IdentityAwarenessSettings = new Checkpoint.Inputs.ManagementCmeGwConfigurationsAzureIdentityAwarenessSettingsArgs\n        {\n            EnableCloudguardController = false,\n            ReceiveIdentitiesFroms = new[]\n            {\n                \"PDP1\",\n                \"PDP2\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCmeGwConfigurationsAzure(ctx, \"gw_config_azure\", &checkpoint.ManagementCmeGwConfigurationsAzureArgs{\n\t\t\tName:           pulumi.String(\"azureGWConfigurations\"),\n\t\t\tRelatedAccount: pulumi.String(\"azureAccount\"),\n\t\t\tVersion:        pulumi.String(\"R81\"),\n\t\t\tBase64SicKey:   pulumi.String(\"MTIzNDU2Nzg=\"),\n\t\t\tPolicy:         pulumi.String(\"Standard\"),\n\t\t\tSendLogsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"PLS_A\"),\n\t\t\t},\n\t\t\tSendLogsToBackupServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"BLS_B\"),\n\t\t\t},\n\t\t\tSendAlertsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ALS_C\"),\n\t\t\t},\n\t\t\tSectionName:                       pulumi.String(\"my_section\"),\n\t\t\tXForwardedFor:                     pulumi.Bool(true),\n\t\t\tColor:                             pulumi.String(\"blue\"),\n\t\t\tIpv6:                              pulumi.Bool(true),\n\t\t\tCommunicationWithServersBehindNat: pulumi.String(\"translated-ip-only\"),\n\t\t\tRepositoryGatewayScripts: checkpoint.ManagementCmeGwConfigurationsAzureRepositoryGatewayScriptArray{\n\t\t\t\t&checkpoint.ManagementCmeGwConfigurationsAzureRepositoryGatewayScriptArgs{\n\t\t\t\t\tName:       pulumi.String(\"myScript\"),\n\t\t\t\t\tParameters: pulumi.String(\"ls -l\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tBlades: &checkpoint.ManagementCmeGwConfigurationsAzureBladesArgs{\n\t\t\t\tIps:                        pulumi.Bool(true),\n\t\t\t\tAntiBot:                    pulumi.Bool(true),\n\t\t\t\tAntiVirus:                  pulumi.Bool(true),\n\t\t\t\tHttpsInspection:            pulumi.Bool(false),\n\t\t\t\tApplicationControl:         pulumi.Bool(false),\n\t\t\t\tAutonomousThreatPrevention: pulumi.Bool(false),\n\t\t\t\tContentAwareness:           pulumi.Bool(false),\n\t\t\t\tIdentityAwareness:          pulumi.Bool(true),\n\t\t\t\tIpsecVpn:                   pulumi.Bool(false),\n\t\t\t\tThreatEmulation:            pulumi.Bool(false),\n\t\t\t\tUrlFiltering:               pulumi.Bool(false),\n\t\t\t\tVpn:                        pulumi.Bool(false),\n\t\t\t},\n\t\t\tIdentityAwarenessSettings: &checkpoint.ManagementCmeGwConfigurationsAzureIdentityAwarenessSettingsArgs{\n\t\t\t\tEnableCloudguardController: pulumi.Bool(false),\n\t\t\t\tReceiveIdentitiesFroms: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"PDP1\"),\n\t\t\t\t\tpulumi.String(\"PDP2\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCmeGwConfigurationsAzure;\nimport com.pulumi.checkpoint.ManagementCmeGwConfigurationsAzureArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsAzureRepositoryGatewayScriptArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsAzureBladesArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsAzureIdentityAwarenessSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var gwConfigAzure = new ManagementCmeGwConfigurationsAzure(\"gwConfigAzure\", ManagementCmeGwConfigurationsAzureArgs.builder()\n            .name(\"azureGWConfigurations\")\n            .relatedAccount(\"azureAccount\")\n            .version(\"R81\")\n            .base64SicKey(\"MTIzNDU2Nzg=\")\n            .policy(\"Standard\")\n            .sendLogsToServers(\"PLS_A\")\n            .sendLogsToBackupServers(\"BLS_B\")\n            .sendAlertsToServers(\"ALS_C\")\n            .sectionName(\"my_section\")\n            .xForwardedFor(true)\n            .color(\"blue\")\n            .ipv6(true)\n            .communicationWithServersBehindNat(\"translated-ip-only\")\n            .repositoryGatewayScripts(ManagementCmeGwConfigurationsAzureRepositoryGatewayScriptArgs.builder()\n                .name(\"myScript\")\n                .parameters(\"ls -l\")\n                .build())\n            .blades(ManagementCmeGwConfigurationsAzureBladesArgs.builder()\n                .ips(true)\n                .antiBot(true)\n                .antiVirus(true)\n                .httpsInspection(false)\n                .applicationControl(false)\n                .autonomousThreatPrevention(false)\n                .contentAwareness(false)\n                .identityAwareness(true)\n                .ipsecVpn(false)\n                .threatEmulation(false)\n                .urlFiltering(false)\n                .vpn(false)\n                .build())\n            .identityAwarenessSettings(ManagementCmeGwConfigurationsAzureIdentityAwarenessSettingsArgs.builder()\n                .enableCloudguardController(false)\n                .receiveIdentitiesFroms(                \n                    \"PDP1\",\n                    \"PDP2\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  gwConfigAzure:\n    type: checkpoint:ManagementCmeGwConfigurationsAzure\n    name: gw_config_azure\n    properties:\n      name: azureGWConfigurations\n      relatedAccount: azureAccount\n      version: R81\n      base64SicKey: MTIzNDU2Nzg=\n      policy: Standard\n      sendLogsToServers:\n        - PLS_A\n      sendLogsToBackupServers:\n        - BLS_B\n      sendAlertsToServers:\n        - ALS_C\n      sectionName: my_section\n      xForwardedFor: true\n      color: blue\n      ipv6: true\n      communicationWithServersBehindNat: translated-ip-only\n      repositoryGatewayScripts:\n        - name: myScript\n          parameters: ls -l\n      blades:\n        ips: true\n        antiBot: true\n        antiVirus: true\n        httpsInspection: false\n        applicationControl: false\n        autonomousThreatPrevention: false\n        contentAwareness: false\n        identityAwareness: true\n        ipsecVpn: false\n        threatEmulation: false\n        urlFiltering: false\n        vpn: false\n      identityAwarenessSettings:\n        enableCloudguardController: false\n        receiveIdentitiesFroms:\n          - PDP1\n          - PDP2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64SicKey": {
          "type": "string",
          "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
        },
        "blades": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureBlades:ManagementCmeGwConfigurationsAzureBlades",
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureIdentityAwarenessSettings:ManagementCmeGwConfigurationsAzureIdentityAwarenessSettings",
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "ipv6": {
          "type": "boolean",
          "description": "Enable IPv6 for Azure VMSS.\n"
        },
        "managementCmeGwConfigurationsAzureId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name without spaces.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The CME account name to associate with the Gateway Configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureRepositoryGatewayScript:ManagementCmeGwConfigurationsAzureRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "type": "object",
      "required": [
        "base64SicKey",
        "blades",
        "managementCmeGwConfigurationsAzureId",
        "name",
        "policy",
        "relatedAccount",
        "version"
      ],
      "inputProperties": {
        "base64SicKey": {
          "type": "string",
          "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
        },
        "blades": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureBlades:ManagementCmeGwConfigurationsAzureBlades",
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureIdentityAwarenessSettings:ManagementCmeGwConfigurationsAzureIdentityAwarenessSettings",
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "ipv6": {
          "type": "boolean",
          "description": "Enable IPv6 for Azure VMSS.\n"
        },
        "managementCmeGwConfigurationsAzureId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name without spaces.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The CME account name to associate with the Gateway Configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureRepositoryGatewayScript:ManagementCmeGwConfigurationsAzureRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "requiredInputs": [
        "base64SicKey",
        "blades",
        "policy",
        "relatedAccount",
        "version"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeGwConfigurationsAzure resources.\n",
        "properties": {
          "base64SicKey": {
            "type": "string",
            "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
          },
          "blades": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureBlades:ManagementCmeGwConfigurationsAzureBlades",
            "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the gateways objects in SmartConsole.\n"
          },
          "communicationWithServersBehindNat": {
            "type": "string",
            "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
          },
          "identityAwarenessSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureIdentityAwarenessSettings:ManagementCmeGwConfigurationsAzureIdentityAwarenessSettings",
            "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
          },
          "ipv6": {
            "type": "boolean",
            "description": "Enable IPv6 for Azure VMSS.\n"
          },
          "managementCmeGwConfigurationsAzureId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The Gateway configuration name without spaces.\n"
          },
          "policy": {
            "type": "string",
            "description": "The policy name to install on the Gateway.\n"
          },
          "relatedAccount": {
            "type": "string",
            "description": "The CME account name to associate with the Gateway Configuration.\n"
          },
          "repositoryGatewayScripts": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsAzureRepositoryGatewayScript:ManagementCmeGwConfigurationsAzureRepositoryGatewayScript"
            },
            "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
          },
          "sectionName": {
            "type": "string",
            "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
          },
          "sendAlertsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
          },
          "sendLogsToBackupServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
          },
          "sendLogsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
          },
          "version": {
            "type": "string",
            "description": "The Gateway version.\n"
          },
          "xForwardedFor": {
            "type": "boolean",
            "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeGwConfigurationsGcp:ManagementCmeGwConfigurationsGcp": {
      "description": "## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigGcp = new checkpoint.ManagementCmeGwConfigurationsGcp(\"gw_config_gcp\", {\n    name: \"gcpGWConfigurations\",\n    relatedAccount: \"gcpAccount\",\n    version: \"R81\",\n    base64SicKey: \"MTIzNDU2Nzg=\",\n    policy: \"Standard\",\n    sendLogsToServers: [\"PLS_A\"],\n    sendLogsToBackupServers: [\"BLS_B\"],\n    sendAlertsToServers: [\"ALS_C\"],\n    sectionName: \"my_section\",\n    xForwardedFor: true,\n    color: \"blue\",\n    communicationWithServersBehindNat: \"translated-ip-only\",\n    repositoryGatewayScripts: [{\n        name: \"myScript\",\n        parameters: \"ls -l\",\n    }],\n    blades: {\n        ips: true,\n        antiBot: true,\n        antiVirus: true,\n        httpsInspection: true,\n        applicationControl: false,\n        autonomousThreatPrevention: false,\n        contentAwareness: false,\n        identityAwareness: true,\n        ipsecVpn: false,\n        threatEmulation: false,\n        urlFiltering: false,\n        vpn: false,\n    },\n    identityAwarenessSettings: {\n        enableCloudguardController: false,\n        receiveIdentitiesFroms: [\n            \"PDP1\",\n            \"PDP2\",\n        ],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_config_gcp = checkpoint.ManagementCmeGwConfigurationsGcp(\"gw_config_gcp\",\n    name=\"gcpGWConfigurations\",\n    related_account=\"gcpAccount\",\n    version=\"R81\",\n    base64_sic_key=\"MTIzNDU2Nzg=\",\n    policy=\"Standard\",\n    send_logs_to_servers=[\"PLS_A\"],\n    send_logs_to_backup_servers=[\"BLS_B\"],\n    send_alerts_to_servers=[\"ALS_C\"],\n    section_name=\"my_section\",\n    x_forwarded_for=True,\n    color=\"blue\",\n    communication_with_servers_behind_nat=\"translated-ip-only\",\n    repository_gateway_scripts=[{\n        \"name\": \"myScript\",\n        \"parameters\": \"ls -l\",\n    }],\n    blades={\n        \"ips\": True,\n        \"anti_bot\": True,\n        \"anti_virus\": True,\n        \"https_inspection\": True,\n        \"application_control\": False,\n        \"autonomous_threat_prevention\": False,\n        \"content_awareness\": False,\n        \"identity_awareness\": True,\n        \"ipsec_vpn\": False,\n        \"threat_emulation\": False,\n        \"url_filtering\": False,\n        \"vpn\": False,\n    },\n    identity_awareness_settings={\n        \"enable_cloudguard_controller\": False,\n        \"receive_identities_froms\": [\n            \"PDP1\",\n            \"PDP2\",\n        ],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var gwConfigGcp = new Checkpoint.ManagementCmeGwConfigurationsGcp(\"gw_config_gcp\", new()\n    {\n        Name = \"gcpGWConfigurations\",\n        RelatedAccount = \"gcpAccount\",\n        Version = \"R81\",\n        Base64SicKey = \"MTIzNDU2Nzg=\",\n        Policy = \"Standard\",\n        SendLogsToServers = new[]\n        {\n            \"PLS_A\",\n        },\n        SendLogsToBackupServers = new[]\n        {\n            \"BLS_B\",\n        },\n        SendAlertsToServers = new[]\n        {\n            \"ALS_C\",\n        },\n        SectionName = \"my_section\",\n        XForwardedFor = true,\n        Color = \"blue\",\n        CommunicationWithServersBehindNat = \"translated-ip-only\",\n        RepositoryGatewayScripts = new[]\n        {\n            new Checkpoint.Inputs.ManagementCmeGwConfigurationsGcpRepositoryGatewayScriptArgs\n            {\n                Name = \"myScript\",\n                Parameters = \"ls -l\",\n            },\n        },\n        Blades = new Checkpoint.Inputs.ManagementCmeGwConfigurationsGcpBladesArgs\n        {\n            Ips = true,\n            AntiBot = true,\n            AntiVirus = true,\n            HttpsInspection = true,\n            ApplicationControl = false,\n            AutonomousThreatPrevention = false,\n            ContentAwareness = false,\n            IdentityAwareness = true,\n            IpsecVpn = false,\n            ThreatEmulation = false,\n            UrlFiltering = false,\n            Vpn = false,\n        },\n        IdentityAwarenessSettings = new Checkpoint.Inputs.ManagementCmeGwConfigurationsGcpIdentityAwarenessSettingsArgs\n        {\n            EnableCloudguardController = false,\n            ReceiveIdentitiesFroms = new[]\n            {\n                \"PDP1\",\n                \"PDP2\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCmeGwConfigurationsGcp(ctx, \"gw_config_gcp\", &checkpoint.ManagementCmeGwConfigurationsGcpArgs{\n\t\t\tName:           pulumi.String(\"gcpGWConfigurations\"),\n\t\t\tRelatedAccount: pulumi.String(\"gcpAccount\"),\n\t\t\tVersion:        pulumi.String(\"R81\"),\n\t\t\tBase64SicKey:   pulumi.String(\"MTIzNDU2Nzg=\"),\n\t\t\tPolicy:         pulumi.String(\"Standard\"),\n\t\t\tSendLogsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"PLS_A\"),\n\t\t\t},\n\t\t\tSendLogsToBackupServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"BLS_B\"),\n\t\t\t},\n\t\t\tSendAlertsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"ALS_C\"),\n\t\t\t},\n\t\t\tSectionName:                       pulumi.String(\"my_section\"),\n\t\t\tXForwardedFor:                     pulumi.Bool(true),\n\t\t\tColor:                             pulumi.String(\"blue\"),\n\t\t\tCommunicationWithServersBehindNat: pulumi.String(\"translated-ip-only\"),\n\t\t\tRepositoryGatewayScripts: checkpoint.ManagementCmeGwConfigurationsGcpRepositoryGatewayScriptArray{\n\t\t\t\t&checkpoint.ManagementCmeGwConfigurationsGcpRepositoryGatewayScriptArgs{\n\t\t\t\t\tName:       pulumi.String(\"myScript\"),\n\t\t\t\t\tParameters: pulumi.String(\"ls -l\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tBlades: &checkpoint.ManagementCmeGwConfigurationsGcpBladesArgs{\n\t\t\t\tIps:                        pulumi.Bool(true),\n\t\t\t\tAntiBot:                    pulumi.Bool(true),\n\t\t\t\tAntiVirus:                  pulumi.Bool(true),\n\t\t\t\tHttpsInspection:            pulumi.Bool(true),\n\t\t\t\tApplicationControl:         pulumi.Bool(false),\n\t\t\t\tAutonomousThreatPrevention: pulumi.Bool(false),\n\t\t\t\tContentAwareness:           pulumi.Bool(false),\n\t\t\t\tIdentityAwareness:          pulumi.Bool(true),\n\t\t\t\tIpsecVpn:                   pulumi.Bool(false),\n\t\t\t\tThreatEmulation:            pulumi.Bool(false),\n\t\t\t\tUrlFiltering:               pulumi.Bool(false),\n\t\t\t\tVpn:                        pulumi.Bool(false),\n\t\t\t},\n\t\t\tIdentityAwarenessSettings: &checkpoint.ManagementCmeGwConfigurationsGcpIdentityAwarenessSettingsArgs{\n\t\t\t\tEnableCloudguardController: pulumi.Bool(false),\n\t\t\t\tReceiveIdentitiesFroms: pulumi.StringArray{\n\t\t\t\t\tpulumi.String(\"PDP1\"),\n\t\t\t\t\tpulumi.String(\"PDP2\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCmeGwConfigurationsGcp;\nimport com.pulumi.checkpoint.ManagementCmeGwConfigurationsGcpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsGcpRepositoryGatewayScriptArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsGcpBladesArgs;\nimport com.pulumi.checkpoint.inputs.ManagementCmeGwConfigurationsGcpIdentityAwarenessSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var gwConfigGcp = new ManagementCmeGwConfigurationsGcp(\"gwConfigGcp\", ManagementCmeGwConfigurationsGcpArgs.builder()\n            .name(\"gcpGWConfigurations\")\n            .relatedAccount(\"gcpAccount\")\n            .version(\"R81\")\n            .base64SicKey(\"MTIzNDU2Nzg=\")\n            .policy(\"Standard\")\n            .sendLogsToServers(\"PLS_A\")\n            .sendLogsToBackupServers(\"BLS_B\")\n            .sendAlertsToServers(\"ALS_C\")\n            .sectionName(\"my_section\")\n            .xForwardedFor(true)\n            .color(\"blue\")\n            .communicationWithServersBehindNat(\"translated-ip-only\")\n            .repositoryGatewayScripts(ManagementCmeGwConfigurationsGcpRepositoryGatewayScriptArgs.builder()\n                .name(\"myScript\")\n                .parameters(\"ls -l\")\n                .build())\n            .blades(ManagementCmeGwConfigurationsGcpBladesArgs.builder()\n                .ips(true)\n                .antiBot(true)\n                .antiVirus(true)\n                .httpsInspection(true)\n                .applicationControl(false)\n                .autonomousThreatPrevention(false)\n                .contentAwareness(false)\n                .identityAwareness(true)\n                .ipsecVpn(false)\n                .threatEmulation(false)\n                .urlFiltering(false)\n                .vpn(false)\n                .build())\n            .identityAwarenessSettings(ManagementCmeGwConfigurationsGcpIdentityAwarenessSettingsArgs.builder()\n                .enableCloudguardController(false)\n                .receiveIdentitiesFroms(                \n                    \"PDP1\",\n                    \"PDP2\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  gwConfigGcp:\n    type: checkpoint:ManagementCmeGwConfigurationsGcp\n    name: gw_config_gcp\n    properties:\n      name: gcpGWConfigurations\n      relatedAccount: gcpAccount\n      version: R81\n      base64SicKey: MTIzNDU2Nzg=\n      policy: Standard\n      sendLogsToServers:\n        - PLS_A\n      sendLogsToBackupServers:\n        - BLS_B\n      sendAlertsToServers:\n        - ALS_C\n      sectionName: my_section\n      xForwardedFor: true\n      color: blue\n      communicationWithServersBehindNat: translated-ip-only\n      repositoryGatewayScripts:\n        - name: myScript\n          parameters: ls -l\n      blades:\n        ips: true\n        antiBot: true\n        antiVirus: true\n        httpsInspection: true\n        applicationControl: false\n        autonomousThreatPrevention: false\n        contentAwareness: false\n        identityAwareness: true\n        ipsecVpn: false\n        threatEmulation: false\n        urlFiltering: false\n        vpn: false\n      identityAwarenessSettings:\n        enableCloudguardController: false\n        receiveIdentitiesFroms:\n          - PDP1\n          - PDP2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64SicKey": {
          "type": "string",
          "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
        },
        "blades": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpBlades:ManagementCmeGwConfigurationsGcpBlades",
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpIdentityAwarenessSettings:ManagementCmeGwConfigurationsGcpIdentityAwarenessSettings",
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "managementCmeGwConfigurationsGcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name without spaces.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The CME account name to associate with the Gateway Configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpRepositoryGatewayScript:ManagementCmeGwConfigurationsGcpRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "type": "object",
      "required": [
        "base64SicKey",
        "blades",
        "managementCmeGwConfigurationsGcpId",
        "name",
        "policy",
        "relatedAccount",
        "version"
      ],
      "inputProperties": {
        "base64SicKey": {
          "type": "string",
          "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
        },
        "blades": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpBlades:ManagementCmeGwConfigurationsGcpBlades",
          "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the gateways objects in SmartConsole.\n"
        },
        "communicationWithServersBehindNat": {
          "type": "string",
          "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpIdentityAwarenessSettings:ManagementCmeGwConfigurationsGcpIdentityAwarenessSettings",
          "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
        },
        "managementCmeGwConfigurationsGcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The Gateway configuration name without spaces.\n"
        },
        "policy": {
          "type": "string",
          "description": "The policy name to install on the Gateway.\n"
        },
        "relatedAccount": {
          "type": "string",
          "description": "The CME account name to associate with the Gateway Configuration.\n"
        },
        "repositoryGatewayScripts": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpRepositoryGatewayScript:ManagementCmeGwConfigurationsGcpRepositoryGatewayScript"
          },
          "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
        },
        "sectionName": {
          "type": "string",
          "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
        },
        "version": {
          "type": "string",
          "description": "The Gateway version.\n"
        },
        "xForwardedFor": {
          "type": "boolean",
          "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
        }
      },
      "requiredInputs": [
        "base64SicKey",
        "blades",
        "policy",
        "relatedAccount",
        "version"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeGwConfigurationsGcp resources.\n",
        "properties": {
          "base64SicKey": {
            "type": "string",
            "description": "Base64 key for trusted communication between the Management and the Gateway.\n"
          },
          "blades": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpBlades:ManagementCmeGwConfigurationsGcpBlades",
            "description": "Dictionary of activated/deactivated blades on the Gateway. Supports these blades:\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the gateways objects in SmartConsole.\n"
          },
          "communicationWithServersBehindNat": {
            "type": "string",
            "description": "Gateway behind NAT communications settings with the Check Point Servers(Management, Multi-Domain, Log Servers).\n"
          },
          "identityAwarenessSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpIdentityAwarenessSettings:ManagementCmeGwConfigurationsGcpIdentityAwarenessSettings",
            "description": "Dictionary of Identity Awareness settings that can be configured on the gateway:\n"
          },
          "managementCmeGwConfigurationsGcpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The Gateway configuration name without spaces.\n"
          },
          "policy": {
            "type": "string",
            "description": "The policy name to install on the Gateway.\n"
          },
          "relatedAccount": {
            "type": "string",
            "description": "The CME account name to associate with the Gateway Configuration.\n"
          },
          "repositoryGatewayScripts": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementCmeGwConfigurationsGcpRepositoryGatewayScript:ManagementCmeGwConfigurationsGcpRepositoryGatewayScript"
            },
            "description": "List of objects that each contain the name/UID of a script that exists in\nthe scripts repository on the Management server. Supports these parameters:\n"
          },
          "sectionName": {
            "type": "string",
            "description": "Name of a rule section in the Access and NAT layers in the policy, where to insert the automatically generated rules.\n"
          },
          "sendAlertsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Alert Log Servers names to which alerts are sent.\n"
          },
          "sendLogsToBackupServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Backup Log Servers names to which logs are sent if\nthe Primary Log Servers are unavailable.\n"
          },
          "sendLogsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Comma-separated list of Primary Log Servers names to which logs are sent.\nConfigured Log Servers act as Log and Alert Servers. Must be defined as a part of Log Servers parameters.\n"
          },
          "version": {
            "type": "string",
            "description": "The Gateway version.\n"
          },
          "xForwardedFor": {
            "type": "boolean",
            "description": "Enable XFF headers in HTTP / HTTPS requests.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCmeManagement:ManagementCmeManagement": {
      "description": "## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst mgmt = new checkpoint.ManagementCmeManagement(\"mgmt\", {name: \"newManagement\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmgmt = checkpoint.ManagementCmeManagement(\"mgmt\", name=\"newManagement\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var mgmt = new Checkpoint.ManagementCmeManagement(\"mgmt\", new()\n    {\n        Name = \"newManagement\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCmeManagement(ctx, \"mgmt\", &checkpoint.ManagementCmeManagementArgs{\n\t\t\tName: pulumi.String(\"newManagement\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCmeManagement;\nimport com.pulumi.checkpoint.ManagementCmeManagementArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var mgmt = new ManagementCmeManagement(\"mgmt\", ManagementCmeManagementArgs.builder()\n            .name(\"newManagement\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  mgmt:\n    type: checkpoint:ManagementCmeManagement\n    properties:\n      name: newManagement\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "domain": {
          "type": "string",
          "description": "The management's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "host": {
          "type": "string",
          "description": "The host of the management server."
        },
        "managementCmeManagementId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the Management server.\n"
        }
      },
      "type": "object",
      "required": [
        "host",
        "managementCmeManagementId",
        "name"
      ],
      "inputProperties": {
        "domain": {
          "type": "string",
          "description": "The management's domain name in Multi-Domain Security Management Server environment.\n"
        },
        "managementCmeManagementId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the Management server.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCmeManagement resources.\n",
        "properties": {
          "domain": {
            "type": "string",
            "description": "The management's domain name in Multi-Domain Security Management Server environment.\n"
          },
          "host": {
            "type": "string",
            "description": "The host of the management server."
          },
          "managementCmeManagementId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the Management server.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandAbortGetInterfaces:ManagementCommandAbortGetInterfaces": {
      "description": "This resource allows you to execute Check Point Abort Get Interfaces.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst getInterfaces = new checkpoint.ManagementCommandGetInterfaces(\"get_interfaces\", {targetUid: \"2220d9ad-a251-5555-9a0a-4772a6511111\"});\nconst abortGetInterfaces = new checkpoint.ManagementCommandAbortGetInterfaces(\"abort_get_interfaces\", {taskId: getInterfaces.taskId});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nget_interfaces = checkpoint.ManagementCommandGetInterfaces(\"get_interfaces\", target_uid=\"2220d9ad-a251-5555-9a0a-4772a6511111\")\nabort_get_interfaces = checkpoint.ManagementCommandAbortGetInterfaces(\"abort_get_interfaces\", task_id=get_interfaces.task_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var getInterfaces = new Checkpoint.ManagementCommandGetInterfaces(\"get_interfaces\", new()\n    {\n        TargetUid = \"2220d9ad-a251-5555-9a0a-4772a6511111\",\n    });\n\n    var abortGetInterfaces = new Checkpoint.ManagementCommandAbortGetInterfaces(\"abort_get_interfaces\", new()\n    {\n        TaskId = getInterfaces.TaskId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tgetInterfaces, err := checkpoint.NewManagementCommandGetInterfaces(ctx, \"get_interfaces\", &checkpoint.ManagementCommandGetInterfacesArgs{\n\t\t\tTargetUid: pulumi.String(\"2220d9ad-a251-5555-9a0a-4772a6511111\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementCommandAbortGetInterfaces(ctx, \"abort_get_interfaces\", &checkpoint.ManagementCommandAbortGetInterfacesArgs{\n\t\t\tTaskId: getInterfaces.TaskId,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCommandGetInterfaces;\nimport com.pulumi.checkpoint.ManagementCommandGetInterfacesArgs;\nimport com.pulumi.checkpoint.ManagementCommandAbortGetInterfaces;\nimport com.pulumi.checkpoint.ManagementCommandAbortGetInterfacesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var getInterfaces = new ManagementCommandGetInterfaces(\"getInterfaces\", ManagementCommandGetInterfacesArgs.builder()\n            .targetUid(\"2220d9ad-a251-5555-9a0a-4772a6511111\")\n            .build());\n\n        var abortGetInterfaces = new ManagementCommandAbortGetInterfaces(\"abortGetInterfaces\", ManagementCommandAbortGetInterfacesArgs.builder()\n            .taskId(getInterfaces.taskId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  getInterfaces:\n    type: checkpoint:ManagementCommandGetInterfaces\n    name: get_interfaces\n    properties:\n      targetUid: 2220d9ad-a251-5555-9a0a-4772a6511111\n  abortGetInterfaces:\n    type: checkpoint:ManagementCommandAbortGetInterfaces\n    name: abort_get_interfaces\n    properties:\n      taskId: ${getInterfaces.taskId}\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "forceCleanup": {
          "type": "boolean",
          "description": "Forcefully abort the \"get-interfaces\" task.\n"
        },
        "managementCommandAbortGetInterfacesId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Operation status.\n"
        },
        "taskId": {
          "type": "string",
          "description": "get-interfaces task UID.\n"
        }
      },
      "type": "object",
      "required": [
        "managementCommandAbortGetInterfacesId",
        "message",
        "taskId"
      ],
      "inputProperties": {
        "forceCleanup": {
          "type": "boolean",
          "description": "Forcefully abort the \"get-interfaces\" task.\n"
        },
        "managementCommandAbortGetInterfacesId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "get-interfaces task UID.\n"
        }
      },
      "requiredInputs": [
        "taskId"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandAbortGetInterfaces resources.\n",
        "properties": {
          "forceCleanup": {
            "type": "boolean",
            "description": "Forcefully abort the \"get-interfaces\" task.\n"
          },
          "managementCommandAbortGetInterfacesId": {
            "type": "string"
          },
          "message": {
            "type": "string",
            "description": "Operation status.\n"
          },
          "taskId": {
            "type": "string",
            "description": "get-interfaces task UID.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandExportManagement:ManagementCommandExportManagement": {
      "properties": {
        "domainName": {
          "type": "string",
          "description": "Domain name to be exported.<br><font color=\"red\">Required only for</font> exporting a Domain from the Multi-Domain Server or backing up Domain."
        },
        "filePath": {
          "type": "string",
          "description": "Path in which the exported database file is saved.<br><font color=\"red\">Required only</font> when not using pre-export-verification-only flag."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Ignoring the verification warnings. By Setting this parameter to 'true' export will not be blocked by warnings."
        },
        "includeEndpointConfiguration": {
          "type": "boolean",
          "description": "Include export of the Endpoint Security Management configuration files."
        },
        "includeEndpointDatabase": {
          "type": "boolean",
          "description": "Include export of the Endpoint Security Management database."
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Export logs without log indexes."
        },
        "includeLogsIndexes": {
          "type": "boolean",
          "description": "Export logs with log indexes."
        },
        "isDomainBackup": {
          "type": "boolean",
          "description": "If true, the exported Domain will be suitable for import on the same Multi-Domain Server only."
        },
        "isSmcToMds": {
          "type": "boolean",
          "description": "If true, the exported Security Management Server will be suitable for import on the Multi-Domain Server only."
        },
        "managementCommandExportManagementId": {
          "type": "string"
        },
        "preExportVerificationOnly": {
          "type": "boolean",
          "description": "If true, only runs the pre-export verifications instead of the full export."
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier."
        },
        "version": {
          "type": "string",
          "description": "Target version."
        }
      },
      "type": "object",
      "required": [
        "managementCommandExportManagementId",
        "taskId"
      ],
      "inputProperties": {
        "domainName": {
          "type": "string",
          "description": "Domain name to be exported.<br><font color=\"red\">Required only for</font> exporting a Domain from the Multi-Domain Server or backing up Domain."
        },
        "filePath": {
          "type": "string",
          "description": "Path in which the exported database file is saved.<br><font color=\"red\">Required only</font> when not using pre-export-verification-only flag."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Ignoring the verification warnings. By Setting this parameter to 'true' export will not be blocked by warnings."
        },
        "includeEndpointConfiguration": {
          "type": "boolean",
          "description": "Include export of the Endpoint Security Management configuration files."
        },
        "includeEndpointDatabase": {
          "type": "boolean",
          "description": "Include export of the Endpoint Security Management database."
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Export logs without log indexes."
        },
        "includeLogsIndexes": {
          "type": "boolean",
          "description": "Export logs with log indexes."
        },
        "isDomainBackup": {
          "type": "boolean",
          "description": "If true, the exported Domain will be suitable for import on the same Multi-Domain Server only."
        },
        "isSmcToMds": {
          "type": "boolean",
          "description": "If true, the exported Security Management Server will be suitable for import on the Multi-Domain Server only."
        },
        "managementCommandExportManagementId": {
          "type": "string"
        },
        "preExportVerificationOnly": {
          "type": "boolean",
          "description": "If true, only runs the pre-export verifications instead of the full export."
        },
        "version": {
          "type": "string",
          "description": "Target version."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandExportManagement resources.\n",
        "properties": {
          "domainName": {
            "type": "string",
            "description": "Domain name to be exported.<br><font color=\"red\">Required only for</font> exporting a Domain from the Multi-Domain Server or backing up Domain."
          },
          "filePath": {
            "type": "string",
            "description": "Path in which the exported database file is saved.<br><font color=\"red\">Required only</font> when not using pre-export-verification-only flag."
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Ignoring the verification warnings. By Setting this parameter to 'true' export will not be blocked by warnings."
          },
          "includeEndpointConfiguration": {
            "type": "boolean",
            "description": "Include export of the Endpoint Security Management configuration files."
          },
          "includeEndpointDatabase": {
            "type": "boolean",
            "description": "Include export of the Endpoint Security Management database."
          },
          "includeLogs": {
            "type": "boolean",
            "description": "Export logs without log indexes."
          },
          "includeLogsIndexes": {
            "type": "boolean",
            "description": "Export logs with log indexes."
          },
          "isDomainBackup": {
            "type": "boolean",
            "description": "If true, the exported Domain will be suitable for import on the same Multi-Domain Server only."
          },
          "isSmcToMds": {
            "type": "boolean",
            "description": "If true, the exported Security Management Server will be suitable for import on the Multi-Domain Server only."
          },
          "managementCommandExportManagementId": {
            "type": "string"
          },
          "preExportVerificationOnly": {
            "type": "boolean",
            "description": "If true, only runs the pre-export verifications instead of the full export."
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier."
          },
          "version": {
            "type": "string",
            "description": "Target version."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandExportSmartTask:ManagementCommandExportSmartTask": {
      "properties": {
        "filePath": {
          "type": "string",
          "description": "Path to the SmartTask file to be exported. <br>Should be the full file path (example, \"/home/admin/exported-smart-task.txt)\".<br>If no path was inserted the default will be: \"/var/log/<task_name>.txt\"."
        },
        "managementCommandExportSmartTaskId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Name of task to be exported."
        }
      },
      "type": "object",
      "required": [
        "managementCommandExportSmartTaskId",
        "name"
      ],
      "inputProperties": {
        "filePath": {
          "type": "string",
          "description": "Path to the SmartTask file to be exported. <br>Should be the full file path (example, \"/home/admin/exported-smart-task.txt)\".<br>If no path was inserted the default will be: \"/var/log/<task_name>.txt\"."
        },
        "managementCommandExportSmartTaskId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Name of task to be exported."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandExportSmartTask resources.\n",
        "properties": {
          "filePath": {
            "type": "string",
            "description": "Path to the SmartTask file to be exported. <br>Should be the full file path (example, \"/home/admin/exported-smart-task.txt)\".<br>If no path was inserted the default will be: \"/var/log/<task_name>.txt\"."
          },
          "managementCommandExportSmartTaskId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Name of task to be exported."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandGaiaApi:ManagementCommandGaiaApi": {
      "properties": {
        "commandName": {
          "type": "string",
          "description": "GAIA API command name or path"
        },
        "managementCommandGaiaApiId": {
          "type": "string"
        },
        "otherParameter": {
          "type": "string",
          "description": "Other input parameters for the request payload in JSON format"
        },
        "responseMessage": {
          "type": "string",
          "description": "Response message in JSON format"
        },
        "target": {
          "type": "string",
          "description": "Gateway object name or Gateway IP address or Gateway UID"
        }
      },
      "type": "object",
      "required": [
        "commandName",
        "managementCommandGaiaApiId",
        "responseMessage",
        "target"
      ],
      "inputProperties": {
        "commandName": {
          "type": "string",
          "description": "GAIA API command name or path"
        },
        "managementCommandGaiaApiId": {
          "type": "string"
        },
        "otherParameter": {
          "type": "string",
          "description": "Other input parameters for the request payload in JSON format"
        },
        "target": {
          "type": "string",
          "description": "Gateway object name or Gateway IP address or Gateway UID"
        }
      },
      "requiredInputs": [
        "commandName",
        "target"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandGaiaApi resources.\n",
        "properties": {
          "commandName": {
            "type": "string",
            "description": "GAIA API command name or path"
          },
          "managementCommandGaiaApiId": {
            "type": "string"
          },
          "otherParameter": {
            "type": "string",
            "description": "Other input parameters for the request payload in JSON format"
          },
          "responseMessage": {
            "type": "string",
            "description": "Response message in JSON format"
          },
          "target": {
            "type": "string",
            "description": "Gateway object name or Gateway IP address or Gateway UID"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandGetInterfaces:ManagementCommandGetInterfaces": {
      "description": "This resource allows you to execute Check Point Get Interfaces.\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst getInterfaces = new checkpoint.ManagementCommandGetInterfaces(\"get_interfaces\", {targetUid: \"2220d9ad-a251-5555-9a0a-4772a6511111\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nget_interfaces = checkpoint.ManagementCommandGetInterfaces(\"get_interfaces\", target_uid=\"2220d9ad-a251-5555-9a0a-4772a6511111\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var getInterfaces = new Checkpoint.ManagementCommandGetInterfaces(\"get_interfaces\", new()\n    {\n        TargetUid = \"2220d9ad-a251-5555-9a0a-4772a6511111\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementCommandGetInterfaces(ctx, \"get_interfaces\", &checkpoint.ManagementCommandGetInterfacesArgs{\n\t\t\tTargetUid: pulumi.String(\"2220d9ad-a251-5555-9a0a-4772a6511111\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCommandGetInterfaces;\nimport com.pulumi.checkpoint.ManagementCommandGetInterfacesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var getInterfaces = new ManagementCommandGetInterfaces(\"getInterfaces\", ManagementCommandGetInterfacesArgs.builder()\n            .targetUid(\"2220d9ad-a251-5555-9a0a-4772a6511111\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  getInterfaces:\n    type: checkpoint:ManagementCommandGetInterfaces\n    name: get_interfaces\n    properties:\n      targetUid: 2220d9ad-a251-5555-9a0a-4772a6511111\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "groupInterfacesBySubnet": {
          "type": "boolean",
          "description": "Specify whether to group the cluster interfaces by a subnet. Otherwise, group the cluster interfaces by their names.\n"
        },
        "managementCommandGetInterfacesId": {
          "type": "string"
        },
        "targetName": {
          "type": "string",
          "description": "Target name.\n"
        },
        "targetUid": {
          "type": "string",
          "description": "Target unique identifier.\n"
        },
        "taskId": {
          "type": "string",
          "description": "The UID of the \"get-interfaces\" task. Use the \"show-task\" command to check the progress of the \"get-interfaces\" task.\n"
        },
        "useDefinedByRoutes": {
          "type": "boolean",
          "description": "Specify whether to configure the topology \"Defined by Routes\" where applicable. Otherwise, configure the topology to \"This Network\" as default for internal interfaces.\n"
        },
        "withTopology": {
          "type": "boolean",
          "description": "Specify whether to fetch the interfaces with their topology. Otherwise, the Management Server fetches the interfaces without their topology.\n"
        }
      },
      "type": "object",
      "required": [
        "managementCommandGetInterfacesId",
        "taskId"
      ],
      "inputProperties": {
        "groupInterfacesBySubnet": {
          "type": "boolean",
          "description": "Specify whether to group the cluster interfaces by a subnet. Otherwise, group the cluster interfaces by their names.\n"
        },
        "managementCommandGetInterfacesId": {
          "type": "string"
        },
        "targetName": {
          "type": "string",
          "description": "Target name.\n"
        },
        "targetUid": {
          "type": "string",
          "description": "Target unique identifier.\n"
        },
        "useDefinedByRoutes": {
          "type": "boolean",
          "description": "Specify whether to configure the topology \"Defined by Routes\" where applicable. Otherwise, configure the topology to \"This Network\" as default for internal interfaces.\n"
        },
        "withTopology": {
          "type": "boolean",
          "description": "Specify whether to fetch the interfaces with their topology. Otherwise, the Management Server fetches the interfaces without their topology.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandGetInterfaces resources.\n",
        "properties": {
          "groupInterfacesBySubnet": {
            "type": "boolean",
            "description": "Specify whether to group the cluster interfaces by a subnet. Otherwise, group the cluster interfaces by their names.\n"
          },
          "managementCommandGetInterfacesId": {
            "type": "string"
          },
          "targetName": {
            "type": "string",
            "description": "Target name.\n"
          },
          "targetUid": {
            "type": "string",
            "description": "Target unique identifier.\n"
          },
          "taskId": {
            "type": "string",
            "description": "The UID of the \"get-interfaces\" task. Use the \"show-task\" command to check the progress of the \"get-interfaces\" task.\n"
          },
          "useDefinedByRoutes": {
            "type": "boolean",
            "description": "Specify whether to configure the topology \"Defined by Routes\" where applicable. Otherwise, configure the topology to \"This Network\" as default for internal interfaces.\n"
          },
          "withTopology": {
            "type": "boolean",
            "description": "Specify whether to fetch the interfaces with their topology. Otherwise, the Management Server fetches the interfaces without their topology.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandImportManagement:ManagementCommandImportManagement": {
      "properties": {
        "domainIpAddress": {
          "type": "string",
          "description": "IPv4 address for the imported Domain. Required only for importing the Security Management Server into the Multi-Domain Server."
        },
        "domainName": {
          "type": "string",
          "description": "Domain name to be imported. Must be unique in the Multi-Domain Server. Required only for importing the Security Management Server into the Multi-Domain Server."
        },
        "domainServerName": {
          "type": "string",
          "description": "Multi-Domain Server name for the imported Domain. Required only for importing the Security Management Server into the Multi-Domain Server."
        },
        "filePath": {
          "type": "string",
          "description": "Path to the exported database file to be imported."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Ignoring the verification warnings. By Setting this parameter to 'true' import will not be blocked by warnings."
        },
        "includeEndpointConfiguration": {
          "type": "boolean",
          "description": "Include import of the Endpoint Security Management configuration files."
        },
        "includeEndpointDatabase": {
          "type": "boolean",
          "description": "Include import of the Endpoint Security Management database."
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Import logs without log indexes."
        },
        "includeLogsIndexes": {
          "type": "boolean",
          "description": "Import logs with log indexes."
        },
        "loginRequired": {
          "type": "string",
          "description": "If set to \"True\", session is expired and login is required."
        },
        "managementCommandImportManagementId": {
          "type": "string"
        },
        "preImportVerificationOnly": {
          "type": "boolean",
          "description": "If true, only runs the pre-import verifications instead of the full import."
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier."
        },
        "verifyDomainRestore": {
          "type": "boolean",
          "description": "If true, verify that the restore operation is valid for this input file and this environment. <br>Note: Restore operation will not be executed."
        }
      },
      "type": "object",
      "required": [
        "filePath",
        "loginRequired",
        "managementCommandImportManagementId",
        "taskId"
      ],
      "inputProperties": {
        "domainIpAddress": {
          "type": "string",
          "description": "IPv4 address for the imported Domain. Required only for importing the Security Management Server into the Multi-Domain Server."
        },
        "domainName": {
          "type": "string",
          "description": "Domain name to be imported. Must be unique in the Multi-Domain Server. Required only for importing the Security Management Server into the Multi-Domain Server."
        },
        "domainServerName": {
          "type": "string",
          "description": "Multi-Domain Server name for the imported Domain. Required only for importing the Security Management Server into the Multi-Domain Server."
        },
        "filePath": {
          "type": "string",
          "description": "Path to the exported database file to be imported."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Ignoring the verification warnings. By Setting this parameter to 'true' import will not be blocked by warnings."
        },
        "includeEndpointConfiguration": {
          "type": "boolean",
          "description": "Include import of the Endpoint Security Management configuration files."
        },
        "includeEndpointDatabase": {
          "type": "boolean",
          "description": "Include import of the Endpoint Security Management database."
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Import logs without log indexes."
        },
        "includeLogsIndexes": {
          "type": "boolean",
          "description": "Import logs with log indexes."
        },
        "managementCommandImportManagementId": {
          "type": "string"
        },
        "preImportVerificationOnly": {
          "type": "boolean",
          "description": "If true, only runs the pre-import verifications instead of the full import."
        },
        "verifyDomainRestore": {
          "type": "boolean",
          "description": "If true, verify that the restore operation is valid for this input file and this environment. <br>Note: Restore operation will not be executed."
        }
      },
      "requiredInputs": [
        "filePath"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandImportManagement resources.\n",
        "properties": {
          "domainIpAddress": {
            "type": "string",
            "description": "IPv4 address for the imported Domain. Required only for importing the Security Management Server into the Multi-Domain Server."
          },
          "domainName": {
            "type": "string",
            "description": "Domain name to be imported. Must be unique in the Multi-Domain Server. Required only for importing the Security Management Server into the Multi-Domain Server."
          },
          "domainServerName": {
            "type": "string",
            "description": "Multi-Domain Server name for the imported Domain. Required only for importing the Security Management Server into the Multi-Domain Server."
          },
          "filePath": {
            "type": "string",
            "description": "Path to the exported database file to be imported."
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Ignoring the verification warnings. By Setting this parameter to 'true' import will not be blocked by warnings."
          },
          "includeEndpointConfiguration": {
            "type": "boolean",
            "description": "Include import of the Endpoint Security Management configuration files."
          },
          "includeEndpointDatabase": {
            "type": "boolean",
            "description": "Include import of the Endpoint Security Management database."
          },
          "includeLogs": {
            "type": "boolean",
            "description": "Import logs without log indexes."
          },
          "includeLogsIndexes": {
            "type": "boolean",
            "description": "Import logs with log indexes."
          },
          "loginRequired": {
            "type": "string",
            "description": "If set to \"True\", session is expired and login is required."
          },
          "managementCommandImportManagementId": {
            "type": "string"
          },
          "preImportVerificationOnly": {
            "type": "boolean",
            "description": "If true, only runs the pre-import verifications instead of the full import."
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier."
          },
          "verifyDomainRestore": {
            "type": "boolean",
            "description": "If true, verify that the restore operation is valid for this input file and this environment. <br>Note: Restore operation will not be executed."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandImportSmartTask:ManagementCommandImportSmartTask": {
      "properties": {
        "filePath": {
          "type": "string",
          "description": "Path to the SmartTask file to be imported. <br>Should be the full file path (example, \"/home/admin/exported-smart-task.txt\")."
        },
        "managementCommandImportSmartTaskId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Operation status."
        }
      },
      "type": "object",
      "required": [
        "filePath",
        "managementCommandImportSmartTaskId",
        "message"
      ],
      "inputProperties": {
        "filePath": {
          "type": "string",
          "description": "Path to the SmartTask file to be imported. <br>Should be the full file path (example, \"/home/admin/exported-smart-task.txt\")."
        },
        "managementCommandImportSmartTaskId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "filePath"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandImportSmartTask resources.\n",
        "properties": {
          "filePath": {
            "type": "string",
            "description": "Path to the SmartTask file to be imported. <br>Should be the full file path (example, \"/home/admin/exported-smart-task.txt\")."
          },
          "managementCommandImportSmartTaskId": {
            "type": "string"
          },
          "message": {
            "type": "string",
            "description": "Operation status."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandLockObject:ManagementCommandLockObject": {
      "properties": {
        "layer": {
          "type": "string",
          "description": "Object layer, need to specify the layer if the object is rule/section and uid is not supplied."
        },
        "managementCommandLockObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain."
        },
        "type": {
          "type": "string",
          "description": "Object type."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementCommandLockObjectId",
        "name"
      ],
      "inputProperties": {
        "layer": {
          "type": "string",
          "description": "Object layer, need to specify the layer if the object is rule/section and uid is not supplied."
        },
        "managementCommandLockObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain."
        },
        "type": {
          "type": "string",
          "description": "Object type."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandLockObject resources.\n",
        "properties": {
          "layer": {
            "type": "string",
            "description": "Object layer, need to specify the layer if the object is rule/section and uid is not supplied."
          },
          "managementCommandLockObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain."
          },
          "type": {
            "type": "string",
            "description": "Object type."
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandLoginToDomain:ManagementCommandLoginToDomain": {
      "properties": {
        "apiServerVersion": {
          "type": "string",
          "description": "API Server version."
        },
        "continueLastSession": {
          "type": "boolean",
          "description": "When 'continue-last-session' is set to 'True', the new session would continue where the last session was stopped. This option is available when the administrator has only one session that can be continued. If there is more than one session, see 'switch-session' API."
        },
        "diskSpaceMessage": {
          "type": "string",
          "description": "Information about the available disk space on the management server."
        },
        "domain": {
          "type": "string",
          "description": "Domain identified by the name or UID."
        },
        "lastLoginWasAt": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Timestamp when administrator last accessed the management server."
        },
        "loginMessage": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Login message."
        },
        "managementCommandLoginToDomainId": {
          "type": "string"
        },
        "readOnly": {
          "type": "boolean",
          "description": "Login with Read Only permissions. This parameter is not considered in case continue-last-session is true."
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Session expiration timeout in seconds."
        },
        "sid": {
          "type": "string",
          "description": "Session unique identifier. Enter this session unique identifier in the 'X-chkp-sid' header of each request."
        },
        "standby": {
          "type": "boolean",
          "description": "True if this management server is in the standby mode."
        },
        "uid": {
          "type": "string",
          "description": "Session object unique identifier. This identifier may be used in the discard API to discard changes that were made in this session, when administrator is working from another session, or in the 'switch-session' API."
        },
        "url": {
          "type": "string",
          "description": "URL that was used to reach the API server."
        }
      },
      "type": "object",
      "required": [
        "apiServerVersion",
        "diskSpaceMessage",
        "domain",
        "lastLoginWasAt",
        "loginMessage",
        "managementCommandLoginToDomainId",
        "sessionTimeout",
        "sid",
        "standby",
        "uid",
        "url"
      ],
      "inputProperties": {
        "continueLastSession": {
          "type": "boolean",
          "description": "When 'continue-last-session' is set to 'True', the new session would continue where the last session was stopped. This option is available when the administrator has only one session that can be continued. If there is more than one session, see 'switch-session' API."
        },
        "domain": {
          "type": "string",
          "description": "Domain identified by the name or UID."
        },
        "managementCommandLoginToDomainId": {
          "type": "string"
        },
        "readOnly": {
          "type": "boolean",
          "description": "Login with Read Only permissions. This parameter is not considered in case continue-last-session is true."
        }
      },
      "requiredInputs": [
        "domain"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandLoginToDomain resources.\n",
        "properties": {
          "apiServerVersion": {
            "type": "string",
            "description": "API Server version."
          },
          "continueLastSession": {
            "type": "boolean",
            "description": "When 'continue-last-session' is set to 'True', the new session would continue where the last session was stopped. This option is available when the administrator has only one session that can be continued. If there is more than one session, see 'switch-session' API."
          },
          "diskSpaceMessage": {
            "type": "string",
            "description": "Information about the available disk space on the management server."
          },
          "domain": {
            "type": "string",
            "description": "Domain identified by the name or UID."
          },
          "lastLoginWasAt": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Timestamp when administrator last accessed the management server."
          },
          "loginMessage": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Login message."
          },
          "managementCommandLoginToDomainId": {
            "type": "string"
          },
          "readOnly": {
            "type": "boolean",
            "description": "Login with Read Only permissions. This parameter is not considered in case continue-last-session is true."
          },
          "sessionTimeout": {
            "type": "number",
            "description": "Session expiration timeout in seconds."
          },
          "sid": {
            "type": "string",
            "description": "Session unique identifier. Enter this session unique identifier in the 'X-chkp-sid' header of each request."
          },
          "standby": {
            "type": "boolean",
            "description": "True if this management server is in the standby mode."
          },
          "uid": {
            "type": "string",
            "description": "Session object unique identifier. This identifier may be used in the discard API to discard changes that were made in this session, when administrator is working from another session, or in the 'switch-session' API."
          },
          "url": {
            "type": "string",
            "description": "URL that was used to reach the API server."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandSetCpTrustedCaCertificate:ManagementCommandSetCpTrustedCaCertificate": {
      "properties": {
        "managementCommandSetCpTrustedCaCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Certificate Object name."
        },
        "status": {
          "type": "string",
          "description": "Indicates whether the trusted CP CA certificate is enabled/disabled."
        },
        "uid": {
          "type": "string",
          "description": "Certificate Object uid."
        }
      },
      "type": "object",
      "required": [
        "managementCommandSetCpTrustedCaCertificateId",
        "name"
      ],
      "inputProperties": {
        "managementCommandSetCpTrustedCaCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Certificate Object name."
        },
        "status": {
          "type": "string",
          "description": "Indicates whether the trusted CP CA certificate is enabled/disabled."
        },
        "uid": {
          "type": "string",
          "description": "Certificate Object uid."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandSetCpTrustedCaCertificate resources.\n",
        "properties": {
          "managementCommandSetCpTrustedCaCertificateId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Certificate Object name."
          },
          "status": {
            "type": "string",
            "description": "Indicates whether the trusted CP CA certificate is enabled/disabled."
          },
          "uid": {
            "type": "string",
            "description": "Certificate Object uid."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandSetGlobalProperties:ManagementCommandSetGlobalProperties": {
      "properties": {
        "advancedConf": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values."
        },
        "allowRemoteRegistrationOfOpsecProducts": {
          "type": "boolean",
          "description": "After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise,  the RA utility can only be run from the Security Management host."
        },
        "authentication": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication)."
        },
        "carrierSecurity": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests."
        },
        "connectControl": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure settings that relate to ConnectControl server load balancing."
        },
        "dataAccessControl": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server."
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER."
        },
        "firewall": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them."
        },
        "hitCount": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Enable the Hit Count feature that tracks the number of connections that each rule matches."
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "logAndAlert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Define system-wide logging and alerting parameters."
        },
        "managementCommandSetGlobalPropertiesId": {
          "type": "string"
        },
        "nat": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure settings that apply to all NAT connections."
        },
        "nonUniqueIpAddressRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange:ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange"
          },
          "description": "Specify Non Unique IP Address Ranges."
        },
        "numSpoofingErrsThatTriggerBruteForce": {
          "type": "number",
          "description": "Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key."
        },
        "proxy": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used."
        },
        "qos": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Define the general parameters of Quality of Service (QoS) and apply them to QoS rules."
        },
        "remoteAccess": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure Remote Access properties."
        },
        "statefulInspection": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Adjust Stateful Inspection parameters."
        },
        "userAccounts": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Set the expiration for a user account and configure \"about to expire\" warnings."
        },
        "userAuthority": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization."
        },
        "userCheck": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Set a language for the UserCheck message if the language setting in the user's browser cannot be determined."
        },
        "userDirectory": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases."
        },
        "vpn": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure settings relevant to VPN."
        }
      },
      "type": "object",
      "required": [
        "managementCommandSetGlobalPropertiesId"
      ],
      "inputProperties": {
        "advancedConf": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values."
        },
        "allowRemoteRegistrationOfOpsecProducts": {
          "type": "boolean",
          "description": "After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise,  the RA utility can only be run from the Security Management host."
        },
        "authentication": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication)."
        },
        "carrierSecurity": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests."
        },
        "connectControl": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure settings that relate to ConnectControl server load balancing."
        },
        "dataAccessControl": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server."
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER."
        },
        "firewall": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them."
        },
        "hitCount": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Enable the Hit Count feature that tracks the number of connections that each rule matches."
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "logAndAlert": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Define system-wide logging and alerting parameters."
        },
        "managementCommandSetGlobalPropertiesId": {
          "type": "string"
        },
        "nat": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure settings that apply to all NAT connections."
        },
        "nonUniqueIpAddressRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange:ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange"
          },
          "description": "Specify Non Unique IP Address Ranges."
        },
        "numSpoofingErrsThatTriggerBruteForce": {
          "type": "number",
          "description": "Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key."
        },
        "proxy": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used."
        },
        "qos": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Define the general parameters of Quality of Service (QoS) and apply them to QoS rules."
        },
        "remoteAccess": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure Remote Access properties."
        },
        "statefulInspection": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Adjust Stateful Inspection parameters."
        },
        "userAccounts": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Set the expiration for a user account and configure \"about to expire\" warnings."
        },
        "userAuthority": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization."
        },
        "userCheck": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Set a language for the UserCheck message if the language setting in the user's browser cannot be determined."
        },
        "userDirectory": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases."
        },
        "vpn": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Configure settings relevant to VPN."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandSetGlobalProperties resources.\n",
        "properties": {
          "advancedConf": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Configure advanced global attributes. It's highly recommended to consult with Check Point's Technical Support before modifying these values."
          },
          "allowRemoteRegistrationOfOpsecProducts": {
            "type": "boolean",
            "description": "After installing an OPSEC application, the remote administration (RA) utility enables an OPSEC product to finish registering itself without having to access the SmartConsole. If set to true, any host including the application host can run the utility. Otherwise,  the RA utility can only be run from the Security Management host."
          },
          "authentication": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Define Authentication properties that are common to all users and to the various ways that the Check Point Security Gateway asks for passwords (User, Client and Session Authentication)."
          },
          "carrierSecurity": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Specify system-wide properties. Select GTP intra tunnel inspection options, including anti-spoofing; tracking and logging options, and integrity tests."
          },
          "connectControl": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Configure settings that relate to ConnectControl server load balancing."
          },
          "dataAccessControl": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Configure automatic downloads from Check Point and anonymously share product data. Options selected here apply to all Security Gateways, Clusters and VSX devices managed by this management server."
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER."
          },
          "firewall": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Add implied rules to or remove them from the Firewall Rule Base. Determine the position of the implied rules in the Rule Base, and whether or not to log them."
          },
          "hitCount": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Enable the Hit Count feature that tracks the number of connections that each rule matches."
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings."
          },
          "logAndAlert": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Define system-wide logging and alerting parameters."
          },
          "managementCommandSetGlobalPropertiesId": {
            "type": "string"
          },
          "nat": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Configure settings that apply to all NAT connections."
          },
          "nonUniqueIpAddressRanges": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange:ManagementCommandSetGlobalPropertiesNonUniqueIpAddressRange"
            },
            "description": "Specify Non Unique IP Address Ranges."
          },
          "numSpoofingErrsThatTriggerBruteForce": {
            "type": "number",
            "description": "Indicates how many incorrectly signed packets will be tolerated before assuming that there is an attack on the packet tagging and revoking the client's key."
          },
          "proxy": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Select whether a proxy server is used when servers, gateways, or clients need to access the internet for certain Check Point features and set the default proxy server that will be used."
          },
          "qos": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Define the general parameters of Quality of Service (QoS) and apply them to QoS rules."
          },
          "remoteAccess": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Configure Remote Access properties."
          },
          "statefulInspection": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Adjust Stateful Inspection parameters."
          },
          "userAccounts": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Set the expiration for a user account and configure \"about to expire\" warnings."
          },
          "userAuthority": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Decide whether to display and access the WebAccess rule base. This policy defines which users (that is, which Windows Domains) have access to the internal sites of the organization."
          },
          "userCheck": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Set a language for the UserCheck message if the language setting in the user's browser cannot be determined."
          },
          "userDirectory": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "User can enable LDAP User Directory as well as specify global parameters for LDAP. If LDAP User Directory is enabled, this means that users are managed on an external LDAP server and not on the internal Check Point Security Gateway users databases."
          },
          "vpn": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Configure settings relevant to VPN."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandSetInternalTrustedCa:ManagementCommandSetInternalTrustedCa": {
      "properties": {
        "allowCertificatesFromBranches": {
          "type": "boolean",
          "description": "Allow only certificates from listed branches."
        },
        "branches": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\"."
        },
        "cacheCrl": {
          "type": "boolean",
          "description": "Cache Certificate Revocation List on the Security Gateway."
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors."
        },
        "comments": {
          "type": "string",
          "description": "Comments string."
        },
        "crlCacheMethod": {
          "type": "string",
          "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period."
        },
        "crlCacheTimeout": {
          "type": "number",
          "description": "When to fetch new Certificate Revocation List (in minutes)."
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER."
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "managementCommandSetInternalTrustedCaId": {
          "type": "string"
        },
        "retrieveCrlFromHttpServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from http servers."
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementCommandSetInternalTrustedCaId",
        "uid"
      ],
      "inputProperties": {
        "allowCertificatesFromBranches": {
          "type": "boolean",
          "description": "Allow only certificates from listed branches."
        },
        "branches": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\"."
        },
        "cacheCrl": {
          "type": "boolean",
          "description": "Cache Certificate Revocation List on the Security Gateway."
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors."
        },
        "comments": {
          "type": "string",
          "description": "Comments string."
        },
        "crlCacheMethod": {
          "type": "string",
          "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period."
        },
        "crlCacheTimeout": {
          "type": "number",
          "description": "When to fetch new Certificate Revocation List (in minutes)."
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER."
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "managementCommandSetInternalTrustedCaId": {
          "type": "string"
        },
        "retrieveCrlFromHttpServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from http servers."
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandSetInternalTrustedCa resources.\n",
        "properties": {
          "allowCertificatesFromBranches": {
            "type": "boolean",
            "description": "Allow only certificates from listed branches."
          },
          "branches": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\"."
          },
          "cacheCrl": {
            "type": "boolean",
            "description": "Cache Certificate Revocation List on the Security Gateway."
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors."
          },
          "comments": {
            "type": "string",
            "description": "Comments string."
          },
          "crlCacheMethod": {
            "type": "string",
            "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period."
          },
          "crlCacheTimeout": {
            "type": "number",
            "description": "When to fetch new Certificate Revocation List (in minutes)."
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER."
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings."
          },
          "managementCommandSetInternalTrustedCaId": {
            "type": "string"
          },
          "retrieveCrlFromHttpServers": {
            "type": "boolean",
            "description": "Whether to retrieve Certificate Revocation List from http servers."
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers."
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandSetPolicySettings:ManagementCommandSetPolicySettings": {
      "properties": {
        "lastInCell": {
          "type": "string",
          "description": "Added object after removing the last object in cell."
        },
        "managementCommandSetPolicySettingsId": {
          "type": "string"
        },
        "noneObjectBehavior": {
          "type": "string",
          "description": "'None' object behavior. Rules with object 'None' will never be matched."
        },
        "securityAccessDefaults": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Access Policy default values."
        }
      },
      "type": "object",
      "required": [
        "managementCommandSetPolicySettingsId"
      ],
      "inputProperties": {
        "lastInCell": {
          "type": "string",
          "description": "Added object after removing the last object in cell."
        },
        "managementCommandSetPolicySettingsId": {
          "type": "string"
        },
        "noneObjectBehavior": {
          "type": "string",
          "description": "'None' object behavior. Rules with object 'None' will never be matched."
        },
        "securityAccessDefaults": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Access Policy default values."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandSetPolicySettings resources.\n",
        "properties": {
          "lastInCell": {
            "type": "string",
            "description": "Added object after removing the last object in cell."
          },
          "managementCommandSetPolicySettingsId": {
            "type": "string"
          },
          "noneObjectBehavior": {
            "type": "string",
            "description": "'None' object behavior. Rules with object 'None' will never be matched."
          },
          "securityAccessDefaults": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Access Policy default values."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandSetThreatAdvancedSettings:ManagementCommandSetThreatAdvancedSettings": {
      "properties": {
        "feedRetrievingInterval": {
          "type": "string",
          "description": "Feed retrieving intervals of External Feed, in the form of HH:MM."
        },
        "httpiNonStandardPorts": {
          "type": "boolean",
          "description": "Enable HTTP Inspection on non standard ports for Threat Prevention blades."
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "internalErrorFailMode": {
          "type": "string",
          "description": "In case of internal system error, allow or block all connections."
        },
        "logUnificationTimeout": {
          "type": "number",
          "description": "Session unification timeout for logs (minutes)."
        },
        "managementCommandSetThreatAdvancedSettingsId": {
          "type": "string"
        },
        "resourceClassification": {
          "$ref": "#/types/checkpoint:index%2FManagementCommandSetThreatAdvancedSettingsResourceClassification:ManagementCommandSetThreatAdvancedSettingsResourceClassification",
          "description": "Allow (Background) or Block (Hold) requests until categorization is complete."
        }
      },
      "type": "object",
      "required": [
        "managementCommandSetThreatAdvancedSettingsId"
      ],
      "inputProperties": {
        "feedRetrievingInterval": {
          "type": "string",
          "description": "Feed retrieving intervals of External Feed, in the form of HH:MM."
        },
        "httpiNonStandardPorts": {
          "type": "boolean",
          "description": "Enable HTTP Inspection on non standard ports for Threat Prevention blades."
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "internalErrorFailMode": {
          "type": "string",
          "description": "In case of internal system error, allow or block all connections."
        },
        "logUnificationTimeout": {
          "type": "number",
          "description": "Session unification timeout for logs (minutes)."
        },
        "managementCommandSetThreatAdvancedSettingsId": {
          "type": "string"
        },
        "resourceClassification": {
          "$ref": "#/types/checkpoint:index%2FManagementCommandSetThreatAdvancedSettingsResourceClassification:ManagementCommandSetThreatAdvancedSettingsResourceClassification",
          "description": "Allow (Background) or Block (Hold) requests until categorization is complete."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandSetThreatAdvancedSettings resources.\n",
        "properties": {
          "feedRetrievingInterval": {
            "type": "string",
            "description": "Feed retrieving intervals of External Feed, in the form of HH:MM."
          },
          "httpiNonStandardPorts": {
            "type": "boolean",
            "description": "Enable HTTP Inspection on non standard ports for Threat Prevention blades."
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored."
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings."
          },
          "internalErrorFailMode": {
            "type": "string",
            "description": "In case of internal system error, allow or block all connections."
          },
          "logUnificationTimeout": {
            "type": "number",
            "description": "Session unification timeout for logs (minutes)."
          },
          "managementCommandSetThreatAdvancedSettingsId": {
            "type": "string"
          },
          "resourceClassification": {
            "$ref": "#/types/checkpoint:index%2FManagementCommandSetThreatAdvancedSettingsResourceClassification:ManagementCommandSetThreatAdvancedSettingsResourceClassification",
            "description": "Allow (Background) or Block (Hold) requests until categorization is complete."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandSetTrustedCaSettings:ManagementCommandSetTrustedCaSettings": {
      "properties": {
        "automaticUpdate": {
          "type": "boolean",
          "description": "Whether the trusted CAs package should be updated automatically."
        },
        "managementCommandSetTrustedCaSettingsId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementCommandSetTrustedCaSettingsId"
      ],
      "inputProperties": {
        "automaticUpdate": {
          "type": "boolean",
          "description": "Whether the trusted CAs package should be updated automatically."
        },
        "managementCommandSetTrustedCaSettingsId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandSetTrustedCaSettings resources.\n",
        "properties": {
          "automaticUpdate": {
            "type": "boolean",
            "description": "Whether the trusted CAs package should be updated automatically."
          },
          "managementCommandSetTrustedCaSettingsId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementCommandUnlockObject:ManagementCommandUnlockObject": {
      "properties": {
        "layer": {
          "type": "string",
          "description": "Object layer, need to specify the layer if the object is rule/section and uid is not supplied."
        },
        "managementCommandUnlockObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain."
        },
        "type": {
          "type": "string",
          "description": "Object type."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier. When using uid, there is no need to use name/type parameters"
        }
      },
      "type": "object",
      "required": [
        "managementCommandUnlockObjectId",
        "name"
      ],
      "inputProperties": {
        "layer": {
          "type": "string",
          "description": "Object layer, need to specify the layer if the object is rule/section and uid is not supplied."
        },
        "managementCommandUnlockObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain."
        },
        "type": {
          "type": "string",
          "description": "Object type."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier. When using uid, there is no need to use name/type parameters"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementCommandUnlockObject resources.\n",
        "properties": {
          "layer": {
            "type": "string",
            "description": "Object layer, need to specify the layer if the object is rule/section and uid is not supplied."
          },
          "managementCommandUnlockObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain."
          },
          "type": {
            "type": "string",
            "description": "Object type."
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier. When using uid, there is no need to use name/type parameters"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementComplianceScan:ManagementComplianceScan": {
      "properties": {
        "managementComplianceScanId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Compliance scan task UID."
        }
      },
      "type": "object",
      "required": [
        "managementComplianceScanId",
        "taskId"
      ],
      "inputProperties": {
        "managementComplianceScanId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementComplianceScan resources.\n",
        "properties": {
          "managementComplianceScanId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Compliance scan task UID."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementConnectCloudServices:ManagementConnectCloudServices": {
      "properties": {
        "authToken": {
          "type": "string",
          "description": "Copy the authentication token from the Smart-1 cloud service hosted in the Infinity Portal.\n"
        },
        "connectedAt": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "The time of the connection between the Management Server and the Infinity Portal.<span pulumi-lang-nodejs=\" connectedAt \" pulumi-lang-dotnet=\" ConnectedAt \" pulumi-lang-go=\" connectedAt \" pulumi-lang-python=\" connected_at \" pulumi-lang-yaml=\" connectedAt \" pulumi-lang-java=\" connectedAt \"> connected_at </span>is documented below.\n"
        },
        "managementConnectCloudServicesId": {
          "type": "string"
        },
        "managementUrl": {
          "type": "string",
          "description": "The Management Server's public URL.\n"
        },
        "status": {
          "type": "string",
          "description": "Status of the connection to the Infinity Portal.\n"
        }
      },
      "type": "object",
      "required": [
        "authToken",
        "connectedAt",
        "managementConnectCloudServicesId",
        "managementUrl",
        "status"
      ],
      "inputProperties": {
        "authToken": {
          "type": "string",
          "description": "Copy the authentication token from the Smart-1 cloud service hosted in the Infinity Portal.\n"
        },
        "managementConnectCloudServicesId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "authToken"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementConnectCloudServices resources.\n",
        "properties": {
          "authToken": {
            "type": "string",
            "description": "Copy the authentication token from the Smart-1 cloud service hosted in the Infinity Portal.\n"
          },
          "connectedAt": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "The time of the connection between the Management Server and the Infinity Portal.<span pulumi-lang-nodejs=\" connectedAt \" pulumi-lang-dotnet=\" ConnectedAt \" pulumi-lang-go=\" connectedAt \" pulumi-lang-python=\" connected_at \" pulumi-lang-yaml=\" connectedAt \" pulumi-lang-java=\" connectedAt \"> connected_at </span>is documented below.\n"
          },
          "managementConnectCloudServicesId": {
            "type": "string"
          },
          "managementUrl": {
            "type": "string",
            "description": "The Management Server's public URL.\n"
          },
          "status": {
            "type": "string",
            "description": "Status of the connection to the Infinity Portal.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementContentAwarenessAdvancedSettings:ManagementContentAwarenessAdvancedSettings": {
      "properties": {
        "httpiNonStandardPorts": {
          "type": "boolean",
          "description": "Servers usually send HTTP traffic on TCP port 80. Some servers send HTTP traffic on other ports also. By default, this setting is enabled and Content Awareness inspects HTTP traffic on non-standard ports. You can disable this setting and configure Content Awareness to inspect HTTP traffic only on port 80."
        },
        "inspectArchives": {
          "type": "boolean",
          "description": "Examine the content of archive files. For example, files with the extension .zip, .gz, .tgz, .tar.Z, .tar, .lzma, .tlz, 7z, .rar."
        },
        "internalErrorFailMode": {
          "type": "string",
          "description": "In case of internal system error, allow or block all connections."
        },
        "managementContentAwarenessAdvancedSettingsId": {
          "type": "string"
        },
        "supportedServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Specify the services that Content Awareness inspects."
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementContentAwarenessAdvancedSettingsId",
        "uid"
      ],
      "inputProperties": {
        "httpiNonStandardPorts": {
          "type": "boolean",
          "description": "Servers usually send HTTP traffic on TCP port 80. Some servers send HTTP traffic on other ports also. By default, this setting is enabled and Content Awareness inspects HTTP traffic on non-standard ports. You can disable this setting and configure Content Awareness to inspect HTTP traffic only on port 80."
        },
        "inspectArchives": {
          "type": "boolean",
          "description": "Examine the content of archive files. For example, files with the extension .zip, .gz, .tgz, .tar.Z, .tar, .lzma, .tlz, 7z, .rar."
        },
        "internalErrorFailMode": {
          "type": "string",
          "description": "In case of internal system error, allow or block all connections."
        },
        "managementContentAwarenessAdvancedSettingsId": {
          "type": "string"
        },
        "supportedServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Specify the services that Content Awareness inspects."
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementContentAwarenessAdvancedSettings resources.\n",
        "properties": {
          "httpiNonStandardPorts": {
            "type": "boolean",
            "description": "Servers usually send HTTP traffic on TCP port 80. Some servers send HTTP traffic on other ports also. By default, this setting is enabled and Content Awareness inspects HTTP traffic on non-standard ports. You can disable this setting and configure Content Awareness to inspect HTTP traffic only on port 80."
          },
          "inspectArchives": {
            "type": "boolean",
            "description": "Examine the content of archive files. For example, files with the extension .zip, .gz, .tgz, .tar.Z, .tar, .lzma, .tlz, 7z, .rar."
          },
          "internalErrorFailMode": {
            "type": "string",
            "description": "In case of internal system error, allow or block all connections."
          },
          "managementContentAwarenessAdvancedSettingsId": {
            "type": "string"
          },
          "supportedServices": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Specify the services that Content Awareness inspects."
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataCenterObject:ManagementDataCenterObject": {
      "description": "This resource allows you to add/update/delete Check Point Data Center Object.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dco1 = new checkpoint.ManagementDataCenterObject(\"dco1\", {\n    dataCenterName: \"myAws1\",\n    uri: \"/Region - EU (Frankfurt)/VPCs/vpc-0e5983c1d08b53e75/VPCEndpoints\",\n    name: \"my_data_object_center\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndco1 = checkpoint.ManagementDataCenterObject(\"dco1\",\n    data_center_name=\"myAws1\",\n    uri=\"/Region - EU (Frankfurt)/VPCs/vpc-0e5983c1d08b53e75/VPCEndpoints\",\n    name=\"my_data_object_center\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var dco1 = new Checkpoint.ManagementDataCenterObject(\"dco1\", new()\n    {\n        DataCenterName = \"myAws1\",\n        Uri = \"/Region - EU (Frankfurt)/VPCs/vpc-0e5983c1d08b53e75/VPCEndpoints\",\n        Name = \"my_data_object_center\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataCenterObject(ctx, \"dco1\", &checkpoint.ManagementDataCenterObjectArgs{\n\t\t\tDataCenterName: pulumi.String(\"myAws1\"),\n\t\t\tUri:            pulumi.String(\"/Region - EU (Frankfurt)/VPCs/vpc-0e5983c1d08b53e75/VPCEndpoints\"),\n\t\t\tName:           pulumi.String(\"my_data_object_center\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataCenterObject;\nimport com.pulumi.checkpoint.ManagementDataCenterObjectArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var dco1 = new ManagementDataCenterObject(\"dco1\", ManagementDataCenterObjectArgs.builder()\n            .dataCenterName(\"myAws1\")\n            .uri(\"/Region - EU (Frankfurt)/VPCs/vpc-0e5983c1d08b53e75/VPCEndpoints\")\n            .name(\"my_data_object_center\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  dco1:\n    type: checkpoint:ManagementDataCenterObject\n    properties:\n      dataCenterName: myAws1\n      uri: /Region - EU (Frankfurt)/VPCs/vpc-0e5983c1d08b53e75/VPCEndpoints\n      name: my_data_object_center\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "additionalProperties": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataCenterObjectAdditionalProperty:ManagementDataCenterObjectAdditionalProperty"
          },
          "description": "Additional properties on the object.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenterName": {
          "type": "string",
          "description": "Name of the Data Center Server the object is in.\n"
        },
        "dataCenterUid": {
          "type": "string",
          "description": "Unique identifier of the Data Center Server the object is in.\n"
        },
        "dataCenters": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataCenterObjectDataCenter:ManagementDataCenterObjectDataCenter"
          },
          "description": "The Data Center the object is on.\n"
        },
        "deleted": {
          "type": "boolean",
          "description": "Indicates if the object is inaccessible or deleted on Data Center Server.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataCenterObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Override default name on data-center.\n"
        },
        "nameInDataCenter": {
          "type": "string",
          "description": "Object Name in Data Center"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "typeInDataCenter": {
          "type": "string",
          "description": "Object type in Data Center.\n"
        },
        "uidInDataCenter": {
          "type": "string",
          "description": "Unique identifier of the object in the Data Center.\n"
        },
        "updatedOnDataCenter": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Last update time in the Data Center\n"
        },
        "uri": {
          "type": "string",
          "description": "URI of the object in the Data Center Server.\n"
        },
        "waitForObjectSync": {
          "type": "boolean",
          "description": "When set to true, the provider will wait for object sync with the management server.\n"
        }
      },
      "type": "object",
      "required": [
        "additionalProperties",
        "dataCenters",
        "deleted",
        "managementDataCenterObjectId",
        "name",
        "nameInDataCenter",
        "typeInDataCenter",
        "updatedOnDataCenter"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenterName": {
          "type": "string",
          "description": "Name of the Data Center Server the object is in.\n"
        },
        "dataCenterUid": {
          "type": "string",
          "description": "Unique identifier of the Data Center Server the object is in.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataCenterObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Override default name on data-center.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "uidInDataCenter": {
          "type": "string",
          "description": "Unique identifier of the object in the Data Center.\n"
        },
        "uri": {
          "type": "string",
          "description": "URI of the object in the Data Center Server.\n"
        },
        "waitForObjectSync": {
          "type": "boolean",
          "description": "When set to true, the provider will wait for object sync with the management server.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataCenterObject resources.\n",
        "properties": {
          "additionalProperties": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementDataCenterObjectAdditionalProperty:ManagementDataCenterObjectAdditionalProperty"
            },
            "description": "Additional properties on the object.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataCenterName": {
            "type": "string",
            "description": "Name of the Data Center Server the object is in.\n"
          },
          "dataCenterUid": {
            "type": "string",
            "description": "Unique identifier of the Data Center Server the object is in.\n"
          },
          "dataCenters": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementDataCenterObjectDataCenter:ManagementDataCenterObjectDataCenter"
            },
            "description": "The Data Center the object is on.\n"
          },
          "deleted": {
            "type": "boolean",
            "description": "Indicates if the object is inaccessible or deleted on Data Center Server.\n"
          },
          "groups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of group identifiers.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataCenterObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Override default name on data-center.\n"
          },
          "nameInDataCenter": {
            "type": "string",
            "description": "Object Name in Data Center"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "typeInDataCenter": {
            "type": "string",
            "description": "Object type in Data Center.\n"
          },
          "uidInDataCenter": {
            "type": "string",
            "description": "Unique identifier of the object in the Data Center.\n"
          },
          "updatedOnDataCenter": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Last update time in the Data Center\n"
          },
          "uri": {
            "type": "string",
            "description": "URI of the object in the Data Center Server.\n"
          },
          "waitForObjectSync": {
            "type": "boolean",
            "description": "When set to true, the provider will wait for object sync with the management server.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataCenterQuery:ManagementDataCenterQuery": {
      "description": "This resource allows you to execute Check Point Data Center Query.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataCenterQuery(\"example\", {\n    name: \"myQuery\",\n    dataCenters: [\"All\"],\n    queryRules: [{\n        keyType: \"predefined\",\n        key: \"name-in-data-center\",\n        values: [\n            \"firstVal\",\n            \"secondVal\",\n        ],\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataCenterQuery(\"example\",\n    name=\"myQuery\",\n    data_centers=[\"All\"],\n    query_rules=[{\n        \"key_type\": \"predefined\",\n        \"key\": \"name-in-data-center\",\n        \"values\": [\n            \"firstVal\",\n            \"secondVal\",\n        ],\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataCenterQuery(\"example\", new()\n    {\n        Name = \"myQuery\",\n        DataCenters = new[]\n        {\n            \"All\",\n        },\n        QueryRules = new[]\n        {\n            new Checkpoint.Inputs.ManagementDataCenterQueryQueryRuleArgs\n            {\n                KeyType = \"predefined\",\n                Key = \"name-in-data-center\",\n                Values = new[]\n                {\n                    \"firstVal\",\n                    \"secondVal\",\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataCenterQuery(ctx, \"example\", &checkpoint.ManagementDataCenterQueryArgs{\n\t\t\tName: pulumi.String(\"myQuery\"),\n\t\t\tDataCenters: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"All\"),\n\t\t\t},\n\t\t\tQueryRules: checkpoint.ManagementDataCenterQueryQueryRuleArray{\n\t\t\t\t&checkpoint.ManagementDataCenterQueryQueryRuleArgs{\n\t\t\t\t\tKeyType: pulumi.String(\"predefined\"),\n\t\t\t\t\tKey:     pulumi.String(\"name-in-data-center\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"firstVal\"),\n\t\t\t\t\t\tpulumi.String(\"secondVal\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataCenterQuery;\nimport com.pulumi.checkpoint.ManagementDataCenterQueryArgs;\nimport com.pulumi.checkpoint.inputs.ManagementDataCenterQueryQueryRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataCenterQuery(\"example\", ManagementDataCenterQueryArgs.builder()\n            .name(\"myQuery\")\n            .dataCenters(\"All\")\n            .queryRules(ManagementDataCenterQueryQueryRuleArgs.builder()\n                .keyType(\"predefined\")\n                .key(\"name-in-data-center\")\n                .values(                \n                    \"firstVal\",\n                    \"secondVal\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataCenterQuery\n    properties:\n      name: myQuery\n      dataCenters:\n        - All\n      queryRules:\n        - keyType: predefined\n          key: name-in-data-center\n          values:\n            - firstVal\n            - secondVal\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenters": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Data Center servers identified by the name or UID. Use \"All\" to select all data centers.data_centers blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataCenterQueryId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "queryRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataCenterQueryQueryRule:ManagementDataCenterQueryQueryRule"
          },
          "description": "Data Center Query Rules.<br>There is an 'AND' operation between multiple Query Rules.query_rules blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataCenterQueryId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenters": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Data Center servers identified by the name or UID. Use \"All\" to select all data centers.data_centers blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataCenterQueryId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "queryRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataCenterQueryQueryRule:ManagementDataCenterQueryQueryRule"
          },
          "description": "Data Center Query Rules.<br>There is an 'AND' operation between multiple Query Rules.query_rules blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataCenterQuery resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataCenters": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Data Center servers identified by the name or UID. Use \"All\" to select all data centers.data_centers blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataCenterQueryId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "queryRules": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementDataCenterQueryQueryRule:ManagementDataCenterQueryQueryRule"
            },
            "description": "Data Center Query Rules.<br>There is an 'AND' operation between multiple Query Rules.query_rules blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypeCompoundGroup:ManagementDataTypeCompoundGroup": {
      "description": "This resource allows you to execute Check Point Data Type Compound Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeCompoundGroup(\"example\", {\n    name: \"compound-group-obj\",\n    description: \"Compound group object\",\n    matchedGroups: [\"Source Code\"],\n    unmatchedGroups: [\"Large File\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeCompoundGroup(\"example\",\n    name=\"compound-group-obj\",\n    description=\"Compound group object\",\n    matched_groups=[\"Source Code\"],\n    unmatched_groups=[\"Large File\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypeCompoundGroup(\"example\", new()\n    {\n        Name = \"compound-group-obj\",\n        Description = \"Compound group object\",\n        MatchedGroups = new[]\n        {\n            \"Source Code\",\n        },\n        UnmatchedGroups = new[]\n        {\n            \"Large File\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeCompoundGroup(ctx, \"example\", &checkpoint.ManagementDataTypeCompoundGroupArgs{\n\t\t\tName:        pulumi.String(\"compound-group-obj\"),\n\t\t\tDescription: pulumi.String(\"Compound group object\"),\n\t\t\tMatchedGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Source Code\"),\n\t\t\t},\n\t\t\tUnmatchedGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Large File\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeCompoundGroup;\nimport com.pulumi.checkpoint.ManagementDataTypeCompoundGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeCompoundGroup(\"example\", ManagementDataTypeCompoundGroupArgs.builder()\n            .name(\"compound-group-obj\")\n            .description(\"Compound group object\")\n            .matchedGroups(\"Source Code\")\n            .unmatchedGroups(\"Large File\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeCompoundGroup\n    properties:\n      name: compound-group-obj\n      description: Compound group object\n      matchedGroups:\n        - Source Code\n      unmatchedGroups:\n        - Large File\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeCompoundGroupId": {
          "type": "string"
        },
        "matchedGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Each one of these data types must be matched - Select existing data types to add. Traffic must match all the data types of this group to match a rule.\nIdentified by name or UID.matched_groups blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "unmatchedGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Each one of these data types must not be matched - Select existing data types to add to the definition. Traffic that does not contain any data matching the types in this list will match this compound data type.\nIdentified by name or UID.unmatched_groups blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypeCompoundGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeCompoundGroupId": {
          "type": "string"
        },
        "matchedGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Each one of these data types must be matched - Select existing data types to add. Traffic must match all the data types of this group to match a rule.\nIdentified by name or UID.matched_groups blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "unmatchedGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Each one of these data types must not be matched - Select existing data types to add to the definition. Traffic that does not contain any data matching the types in this list will match this compound data type.\nIdentified by name or UID.unmatched_groups blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypeCompoundGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataTypeCompoundGroupId": {
            "type": "string"
          },
          "matchedGroups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Each one of these data types must be matched - Select existing data types to add. Traffic must match all the data types of this group to match a rule.\nIdentified by name or UID.matched_groups blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "unmatchedGroups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Each one of these data types must not be matched - Select existing data types to add to the definition. Traffic that does not contain any data matching the types in this list will match this compound data type.\nIdentified by name or UID.unmatched_groups blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypeFileAttributes:ManagementDataTypeFileAttributes": {
      "description": "This resource allows you to execute Check Point Data Type File Attributes.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeFileAttributes(\"example\", {\n    name: \"file-attr-obj\",\n    matchByFileType: true,\n    fileGroupsLists: [\"Viewer\"],\n    matchByFileName: true,\n    fileNameContains: \"expression\",\n    matchByFileSize: true,\n    fileSize: 14,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeFileAttributes(\"example\",\n    name=\"file-attr-obj\",\n    match_by_file_type=True,\n    file_groups_lists=[\"Viewer\"],\n    match_by_file_name=True,\n    file_name_contains=\"expression\",\n    match_by_file_size=True,\n    file_size=14)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypeFileAttributes(\"example\", new()\n    {\n        Name = \"file-attr-obj\",\n        MatchByFileType = true,\n        FileGroupsLists = new[]\n        {\n            \"Viewer\",\n        },\n        MatchByFileName = true,\n        FileNameContains = \"expression\",\n        MatchByFileSize = true,\n        FileSize = 14,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeFileAttributes(ctx, \"example\", &checkpoint.ManagementDataTypeFileAttributesArgs{\n\t\t\tName:            pulumi.String(\"file-attr-obj\"),\n\t\t\tMatchByFileType: pulumi.Bool(true),\n\t\t\tFileGroupsLists: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Viewer\"),\n\t\t\t},\n\t\t\tMatchByFileName:  pulumi.Bool(true),\n\t\t\tFileNameContains: pulumi.String(\"expression\"),\n\t\t\tMatchByFileSize:  pulumi.Bool(true),\n\t\t\tFileSize:         pulumi.Float64(14),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeFileAttributes;\nimport com.pulumi.checkpoint.ManagementDataTypeFileAttributesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeFileAttributes(\"example\", ManagementDataTypeFileAttributesArgs.builder()\n            .name(\"file-attr-obj\")\n            .matchByFileType(true)\n            .fileGroupsLists(\"Viewer\")\n            .matchByFileName(true)\n            .fileNameContains(\"expression\")\n            .matchByFileSize(true)\n            .fileSize(14.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeFileAttributes\n    properties:\n      name: file-attr-obj\n      matchByFileType: true\n      fileGroupsLists:\n        - Viewer\n      matchByFileName: true\n      fileNameContains: expression\n      matchByFileSize: true\n      fileSize: 14\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "fileGroupsLists": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "The file must be one of the types specified in the list.\nIdentified by name or UID.file_groups_list blocks are documented below.\n"
        },
        "fileNameContains": {
          "type": "string",
          "description": "File name should contain the expression.\n"
        },
        "fileSize": {
          "type": "number",
          "description": "Min File size in KB.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeFileAttributesId": {
          "type": "string"
        },
        "matchByFileName": {
          "type": "boolean",
          "description": "Determine whether to consider file name.\n"
        },
        "matchByFileSize": {
          "type": "boolean",
          "description": "Determine whether to consider file size.\n"
        },
        "matchByFileType": {
          "type": "boolean",
          "description": "Determine whether to consider file type.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypeFileAttributesId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "fileGroupsLists": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "The file must be one of the types specified in the list.\nIdentified by name or UID.file_groups_list blocks are documented below.\n"
        },
        "fileNameContains": {
          "type": "string",
          "description": "File name should contain the expression.\n"
        },
        "fileSize": {
          "type": "number",
          "description": "Min File size in KB.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeFileAttributesId": {
          "type": "string"
        },
        "matchByFileName": {
          "type": "boolean",
          "description": "Determine whether to consider file name.\n"
        },
        "matchByFileSize": {
          "type": "boolean",
          "description": "Determine whether to consider file size.\n"
        },
        "matchByFileType": {
          "type": "boolean",
          "description": "Determine whether to consider file type.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypeFileAttributes resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "fileGroupsLists": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "The file must be one of the types specified in the list.\nIdentified by name or UID.file_groups_list blocks are documented below.\n"
          },
          "fileNameContains": {
            "type": "string",
            "description": "File name should contain the expression.\n"
          },
          "fileSize": {
            "type": "number",
            "description": "Min File size in KB.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataTypeFileAttributesId": {
            "type": "string"
          },
          "matchByFileName": {
            "type": "boolean",
            "description": "Determine whether to consider file name.\n"
          },
          "matchByFileSize": {
            "type": "boolean",
            "description": "Determine whether to consider file size.\n"
          },
          "matchByFileType": {
            "type": "boolean",
            "description": "Determine whether to consider file type.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypeGroup:ManagementDataTypeGroup": {
      "description": "This resource allows you to execute Check Point Data Type Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeGroup(\"example\", {\n    name: \"data-group-obj\",\n    description: \"add data type group object\",\n    fileTypes: [\"Archive File\"],\n    fileContents: [\"CSV File\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeGroup(\"example\",\n    name=\"data-group-obj\",\n    description=\"add data type group object\",\n    file_types=[\"Archive File\"],\n    file_contents=[\"CSV File\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypeGroup(\"example\", new()\n    {\n        Name = \"data-group-obj\",\n        Description = \"add data type group object\",\n        FileTypes = new[]\n        {\n            \"Archive File\",\n        },\n        FileContents = new[]\n        {\n            \"CSV File\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeGroup(ctx, \"example\", &checkpoint.ManagementDataTypeGroupArgs{\n\t\t\tName:        pulumi.String(\"data-group-obj\"),\n\t\t\tDescription: pulumi.String(\"add data type group object\"),\n\t\t\tFileTypes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Archive File\"),\n\t\t\t},\n\t\t\tFileContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"CSV File\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeGroup;\nimport com.pulumi.checkpoint.ManagementDataTypeGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeGroup(\"example\", ManagementDataTypeGroupArgs.builder()\n            .name(\"data-group-obj\")\n            .description(\"add data type group object\")\n            .fileTypes(\"Archive File\")\n            .fileContents(\"CSV File\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeGroup\n    properties:\n      name: data-group-obj\n      description: add data type group object\n      fileTypes:\n        - Archive File\n      fileContents:\n        - CSV File\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "fileContents": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of Data Types. At least one must be matched.\nIdentified by name or UID.file_content blocks are documented below.\n"
        },
        "fileTypes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of data-types-file-attributes objects.\nIdentified by name or UID.file_type blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypeGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "fileContents": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of Data Types. At least one must be matched.\nIdentified by name or UID.file_content blocks are documented below.\n"
        },
        "fileTypes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of data-types-file-attributes objects.\nIdentified by name or UID.file_type blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypeGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "fileContents": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of Data Types. At least one must be matched.\nIdentified by name or UID.file_content blocks are documented below.\n"
          },
          "fileTypes": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of data-types-file-attributes objects.\nIdentified by name or UID.file_type blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataTypeGroupId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypeKeywords:ManagementDataTypeKeywords": {
      "description": "This resource allows you to execute Check Point Data Type Keywords.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeKeywords(\"example\", {\n    name: \"keywords_obj\",\n    description: \"keywords object\",\n    keywords: [\n        \"word1\",\n        \"word2\",\n    ],\n    dataMatchThreshold: \"all-keywords\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeKeywords(\"example\",\n    name=\"keywords_obj\",\n    description=\"keywords object\",\n    keywords=[\n        \"word1\",\n        \"word2\",\n    ],\n    data_match_threshold=\"all-keywords\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypeKeywords(\"example\", new()\n    {\n        Name = \"keywords_obj\",\n        Description = \"keywords object\",\n        Keywords = new[]\n        {\n            \"word1\",\n            \"word2\",\n        },\n        DataMatchThreshold = \"all-keywords\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeKeywords(ctx, \"example\", &checkpoint.ManagementDataTypeKeywordsArgs{\n\t\t\tName:        pulumi.String(\"keywords_obj\"),\n\t\t\tDescription: pulumi.String(\"keywords object\"),\n\t\t\tKeywords: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"word1\"),\n\t\t\t\tpulumi.String(\"word2\"),\n\t\t\t},\n\t\t\tDataMatchThreshold: pulumi.String(\"all-keywords\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeKeywords;\nimport com.pulumi.checkpoint.ManagementDataTypeKeywordsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeKeywords(\"example\", ManagementDataTypeKeywordsArgs.builder()\n            .name(\"keywords_obj\")\n            .description(\"keywords object\")\n            .keywords(            \n                \"word1\",\n                \"word2\")\n            .dataMatchThreshold(\"all-keywords\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeKeywords\n    properties:\n      name: keywords_obj\n      description: keywords object\n      keywords:\n        - word1\n        - word2\n      dataMatchThreshold: all-keywords\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataMatchThreshold": {
          "type": "string",
          "description": "If set to all-keywords - the data will be matched to the rule only if all the words in the list appear in the data contents.\nWhen set to min-keywords any number of the words may appear according to configuration.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keywords": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Specify keywords or phrases to search for.keywords blocks are documented below.\n"
        },
        "managementDataTypeKeywordsId": {
          "type": "string"
        },
        "minNumberOfKeywords": {
          "type": "number",
          "description": "Define how many of the words in the list must appear in the contents of the data to match the rule.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypeKeywordsId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataMatchThreshold": {
          "type": "string",
          "description": "If set to all-keywords - the data will be matched to the rule only if all the words in the list appear in the data contents.\nWhen set to min-keywords any number of the words may appear according to configuration.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keywords": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Specify keywords or phrases to search for.keywords blocks are documented below.\n"
        },
        "managementDataTypeKeywordsId": {
          "type": "string"
        },
        "minNumberOfKeywords": {
          "type": "number",
          "description": "Define how many of the words in the list must appear in the contents of the data to match the rule.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypeKeywords resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataMatchThreshold": {
            "type": "string",
            "description": "If set to all-keywords - the data will be matched to the rule only if all the words in the list appear in the data contents.\nWhen set to min-keywords any number of the words may appear according to configuration.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keywords": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Specify keywords or phrases to search for.keywords blocks are documented below.\n"
          },
          "managementDataTypeKeywordsId": {
            "type": "string"
          },
          "minNumberOfKeywords": {
            "type": "number",
            "description": "Define how many of the words in the list must appear in the contents of the data to match the rule.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypePatterns:ManagementDataTypePatterns": {
      "description": "This resource allows you to execute Check Point Data Type Patterns.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypePatterns(\"example\", {\n    name: \"pattern-obj\",\n    description: \"data type pattern object\",\n    patterns: [\n        \"g*\",\n        \"^k\",\n    ],\n    numberOfOccurrences: 4,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypePatterns(\"example\",\n    name=\"pattern-obj\",\n    description=\"data type pattern object\",\n    patterns=[\n        \"g*\",\n        \"^k\",\n    ],\n    number_of_occurrences=4)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypePatterns(\"example\", new()\n    {\n        Name = \"pattern-obj\",\n        Description = \"data type pattern object\",\n        Patterns = new[]\n        {\n            \"g*\",\n            \"^k\",\n        },\n        NumberOfOccurrences = 4,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypePatterns(ctx, \"example\", &checkpoint.ManagementDataTypePatternsArgs{\n\t\t\tName:        pulumi.String(\"pattern-obj\"),\n\t\t\tDescription: pulumi.String(\"data type pattern object\"),\n\t\t\tPatterns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"g*\"),\n\t\t\t\tpulumi.String(\"^k\"),\n\t\t\t},\n\t\t\tNumberOfOccurrences: pulumi.Float64(4),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypePatterns;\nimport com.pulumi.checkpoint.ManagementDataTypePatternsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypePatterns(\"example\", ManagementDataTypePatternsArgs.builder()\n            .name(\"pattern-obj\")\n            .description(\"data type pattern object\")\n            .patterns(            \n                \"g*\",\n                \"^k\")\n            .numberOfOccurrences(4.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypePatterns\n    properties:\n      name: pattern-obj\n      description: data type pattern object\n      patterns:\n        - g*\n        - ^k\n      numberOfOccurrences: 4\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypePatternsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "numberOfOccurrences": {
          "type": "number",
          "description": "Define how many times the patterns must appear to be considered data to be protected.\n"
        },
        "patterns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Regular expressions to be evaluated.patterns blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypePatternsId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypePatternsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "numberOfOccurrences": {
          "type": "number",
          "description": "Define how many times the patterns must appear to be considered data to be protected.\n"
        },
        "patterns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Regular expressions to be evaluated.patterns blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypePatterns resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataTypePatternsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "numberOfOccurrences": {
            "type": "number",
            "description": "Define how many times the patterns must appear to be considered data to be protected.\n"
          },
          "patterns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Regular expressions to be evaluated.patterns blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypeTraditionalGroup:ManagementDataTypeTraditionalGroup": {
      "description": "This resource allows you to execute Check Point Data Type Traditional Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeTraditionalGroup(\"example\", {\n    name: \"trad-group-obj\",\n    description: \"traditional group object\",\n    dataTypes: [\n        \"SSH Private Key\",\n        \"CSV File\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeTraditionalGroup(\"example\",\n    name=\"trad-group-obj\",\n    description=\"traditional group object\",\n    data_types=[\n        \"SSH Private Key\",\n        \"CSV File\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypeTraditionalGroup(\"example\", new()\n    {\n        Name = \"trad-group-obj\",\n        Description = \"traditional group object\",\n        DataTypes = new[]\n        {\n            \"SSH Private Key\",\n            \"CSV File\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeTraditionalGroup(ctx, \"example\", &checkpoint.ManagementDataTypeTraditionalGroupArgs{\n\t\t\tName:        pulumi.String(\"trad-group-obj\"),\n\t\t\tDescription: pulumi.String(\"traditional group object\"),\n\t\t\tDataTypes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SSH Private Key\"),\n\t\t\t\tpulumi.String(\"CSV File\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeTraditionalGroup;\nimport com.pulumi.checkpoint.ManagementDataTypeTraditionalGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeTraditionalGroup(\"example\", ManagementDataTypeTraditionalGroupArgs.builder()\n            .name(\"trad-group-obj\")\n            .description(\"traditional group object\")\n            .dataTypes(            \n                \"SSH Private Key\",\n                \"CSV File\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeTraditionalGroup\n    properties:\n      name: trad-group-obj\n      description: traditional group object\n      dataTypes:\n        - SSH Private Key\n        - CSV File\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataTypes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of data-types.\nIf data matches any of the data types in the group, the data type group is matched.\nIdentified by name or UID.data_types blocks are documented below.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeTraditionalGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypeTraditionalGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataTypes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "List of data-types.\nIf data matches any of the data types in the group, the data type group is matched.\nIdentified by name or UID.data_types blocks are documented below.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeTraditionalGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypeTraditionalGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataTypes": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of data-types.\nIf data matches any of the data types in the group, the data type group is matched.\nIdentified by name or UID.data_types blocks are documented below.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataTypeTraditionalGroupId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDataTypeWeightedKeywords:ManagementDataTypeWeightedKeywords": {
      "description": "This resource allows you to execute Check Point Data Type Weighted Keywords.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeWeightedKeywords(\"example\", {\n    name: \"weighted-words-obj\",\n    weightedKeywords: [\n        {\n            keyword: \"name\",\n            weight: 4,\n            maxWeight: 4,\n            regex: true,\n        },\n        {\n            keyword: \"name2\",\n            weight: 5,\n            maxWeight: 8,\n            regex: false,\n        },\n    ],\n    sumOfWeightsThreshold: 10,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeWeightedKeywords(\"example\",\n    name=\"weighted-words-obj\",\n    weighted_keywords=[\n        {\n            \"keyword\": \"name\",\n            \"weight\": 4,\n            \"max_weight\": 4,\n            \"regex\": True,\n        },\n        {\n            \"keyword\": \"name2\",\n            \"weight\": 5,\n            \"max_weight\": 8,\n            \"regex\": False,\n        },\n    ],\n    sum_of_weights_threshold=10)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDataTypeWeightedKeywords(\"example\", new()\n    {\n        Name = \"weighted-words-obj\",\n        WeightedKeywords = new[]\n        {\n            new Checkpoint.Inputs.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs\n            {\n                Keyword = \"name\",\n                Weight = 4,\n                MaxWeight = 4,\n                Regex = true,\n            },\n            new Checkpoint.Inputs.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs\n            {\n                Keyword = \"name2\",\n                Weight = 5,\n                MaxWeight = 8,\n                Regex = false,\n            },\n        },\n        SumOfWeightsThreshold = 10,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeWeightedKeywords(ctx, \"example\", &checkpoint.ManagementDataTypeWeightedKeywordsArgs{\n\t\t\tName: pulumi.String(\"weighted-words-obj\"),\n\t\t\tWeightedKeywords: checkpoint.ManagementDataTypeWeightedKeywordsWeightedKeywordArray{\n\t\t\t\t&checkpoint.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs{\n\t\t\t\t\tKeyword:   pulumi.String(\"name\"),\n\t\t\t\t\tWeight:    pulumi.Float64(4),\n\t\t\t\t\tMaxWeight: pulumi.Float64(4),\n\t\t\t\t\tRegex:     pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t\t&checkpoint.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs{\n\t\t\t\t\tKeyword:   pulumi.String(\"name2\"),\n\t\t\t\t\tWeight:    pulumi.Float64(5),\n\t\t\t\t\tMaxWeight: pulumi.Float64(8),\n\t\t\t\t\tRegex:     pulumi.Bool(false),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSumOfWeightsThreshold: pulumi.Float64(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeWeightedKeywords;\nimport com.pulumi.checkpoint.ManagementDataTypeWeightedKeywordsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeWeightedKeywords(\"example\", ManagementDataTypeWeightedKeywordsArgs.builder()\n            .name(\"weighted-words-obj\")\n            .weightedKeywords(            \n                ManagementDataTypeWeightedKeywordsWeightedKeywordArgs.builder()\n                    .keyword(\"name\")\n                    .weight(4.0)\n                    .maxWeight(4.0)\n                    .regex(true)\n                    .build(),\n                ManagementDataTypeWeightedKeywordsWeightedKeywordArgs.builder()\n                    .keyword(\"name2\")\n                    .weight(5.0)\n                    .maxWeight(8.0)\n                    .regex(false)\n                    .build())\n            .sumOfWeightsThreshold(10.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeWeightedKeywords\n    properties:\n      name: weighted-words-obj\n      weightedKeywords:\n        - keyword: name\n          weight: '4'\n          maxWeight: '4'\n          regex: true\n        - keyword: name2\n          weight: '5'\n          maxWeight: '8'\n          regex: false\n      sumOfWeightsThreshold: 10\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeWeightedKeywordsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "sumOfWeightsThreshold": {
          "type": "number",
          "description": "Define the number of appearances, by weight, of all the keywords that, beyond this threshold,\nthe data containing this list of words or phrases will be recognized as data to be protected.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "weightedKeywords": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataTypeWeightedKeywordsWeightedKeyword:ManagementDataTypeWeightedKeywordsWeightedKeyword"
          },
          "description": "List of keywords or phrases.weighted_keywords blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDataTypeWeightedKeywordsId",
        "name",
        "weightedKeywords"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "description": {
          "type": "string",
          "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDataTypeWeightedKeywordsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "sumOfWeightsThreshold": {
          "type": "number",
          "description": "Define the number of appearances, by weight, of all the keywords that, beyond this threshold,\nthe data containing this list of words or phrases will be recognized as data to be protected.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "weightedKeywords": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDataTypeWeightedKeywordsWeightedKeyword:ManagementDataTypeWeightedKeywordsWeightedKeyword"
          },
          "description": "List of keywords or phrases.weighted_keywords blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "weightedKeywords"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDataTypeWeightedKeywords resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "description": {
            "type": "string",
            "description": "For built-in data types, the description explains the purpose of this type of data representation.\nFor custom-made data types, you can use this field to provide more details.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDataTypeWeightedKeywordsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "sumOfWeightsThreshold": {
            "type": "number",
            "description": "Define the number of appearances, by weight, of all the keywords that, beyond this threshold,\nthe data containing this list of words or phrases will be recognized as data to be protected.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "weightedKeywords": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementDataTypeWeightedKeywordsWeightedKeyword:ManagementDataTypeWeightedKeywordsWeightedKeyword"
            },
            "description": "List of keywords or phrases.weighted_keywords blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteApiKey:ManagementDeleteApiKey": {
      "properties": {
        "adminName": {
          "type": "string",
          "description": "Administrator name to generate API key for.\n"
        },
        "adminUid": {
          "type": "string",
          "description": "Administrator uid to generate API key for.\n"
        },
        "apiKey": {
          "type": "string",
          "description": "API key to be deleted.\n",
          "secret": true
        },
        "managementDeleteApiKeyId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementDeleteApiKeyId"
      ],
      "inputProperties": {
        "adminName": {
          "type": "string",
          "description": "Administrator name to generate API key for.\n"
        },
        "adminUid": {
          "type": "string",
          "description": "Administrator uid to generate API key for.\n"
        },
        "apiKey": {
          "type": "string",
          "description": "API key to be deleted.\n",
          "secret": true
        },
        "managementDeleteApiKeyId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteApiKey resources.\n",
        "properties": {
          "adminName": {
            "type": "string",
            "description": "Administrator name to generate API key for.\n"
          },
          "adminUid": {
            "type": "string",
            "description": "Administrator uid to generate API key for.\n"
          },
          "apiKey": {
            "type": "string",
            "description": "API key to be deleted.\n",
            "secret": true
          },
          "managementDeleteApiKeyId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteCustomTrustedCaCertificate:ManagementDeleteCustomTrustedCaCertificate": {
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteCustomTrustedCaCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDeleteCustomTrustedCaCertificateId",
        "name"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteCustomTrustedCaCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteCustomTrustedCaCertificate resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDeleteCustomTrustedCaCertificateId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object name.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteDataCenterObject:ManagementDeleteDataCenterObject": {
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteDataCenterObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDeleteDataCenterObjectId",
        "name"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteDataCenterObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteDataCenterObject resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDeleteDataCenterObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteInfinityIdp:ManagementDeleteInfinityIdp": {
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteInfinityIdpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object UID.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDeleteInfinityIdpId",
        "name"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteInfinityIdpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object UID.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteInfinityIdp resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDeleteInfinityIdpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object UID.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteInfinityIdpObject:ManagementDeleteInfinityIdpObject": {
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteInfinityIdpObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object UID.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDeleteInfinityIdpObjectId",
        "name"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteInfinityIdpObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object UID.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteInfinityIdpObject resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDeleteInfinityIdpObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object UID.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteRepositoryPackage:ManagementDeleteRepositoryPackage": {
      "properties": {
        "managementDeleteRepositoryPackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementDeleteRepositoryPackageId",
        "name",
        "taskId"
      ],
      "inputProperties": {
        "managementDeleteRepositoryPackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteRepositoryPackage resources.\n",
        "properties": {
          "managementDeleteRepositoryPackageId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the software package.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteThreatProtections:ManagementDeleteThreatProtections": {
      "properties": {
        "managementDeleteThreatProtectionsId": {
          "type": "string"
        },
        "packageFormat": {
          "type": "string",
          "description": "Protections package format.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementDeleteThreatProtectionsId",
        "taskId"
      ],
      "inputProperties": {
        "managementDeleteThreatProtectionsId": {
          "type": "string"
        },
        "packageFormat": {
          "type": "string",
          "description": "Protections package format.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteThreatProtections resources.\n",
        "properties": {
          "managementDeleteThreatProtectionsId": {
            "type": "string"
          },
          "packageFormat": {
            "type": "string",
            "description": "Protections package format.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDeleteUpdatableObject:ManagementDeleteUpdatableObject": {
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteUpdatableObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDeleteUpdatableObjectId",
        "name"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDeleteUpdatableObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDeleteUpdatableObject resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDeleteUpdatableObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDiscard:ManagementDiscard": {
      "properties": {
        "managementDiscardId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementDiscardId"
      ],
      "inputProperties": {
        "managementDiscardId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDiscard resources.\n",
        "properties": {
          "managementDiscardId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDisconnect:ManagementDisconnect": {
      "properties": {
        "discard": {
          "type": "boolean",
          "description": "Discard all changes committed during the session.\n"
        },
        "managementDisconnectId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementDisconnectId"
      ],
      "inputProperties": {
        "discard": {
          "type": "boolean",
          "description": "Discard all changes committed during the session.\n"
        },
        "managementDisconnectId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDisconnect resources.\n",
        "properties": {
          "discard": {
            "type": "boolean",
            "description": "Discard all changes committed during the session.\n"
          },
          "managementDisconnectId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDisconnectCloudServices:ManagementDisconnectCloudServices": {
      "properties": {
        "force": {
          "type": "boolean",
          "description": "Disconnect the Management Server from Check Point Infinity Portal, and reset the connection locally, regardless of the result in the Infinity Portal. This flag can be used if the disconnect-cloud-services command failed. Since with this flag this command affects only the local configuration, make sure to disconnect the Management Server in the Infinity Portal as well.\n"
        },
        "managementDisconnectCloudServicesId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementDisconnectCloudServicesId"
      ],
      "inputProperties": {
        "force": {
          "type": "boolean",
          "description": "Disconnect the Management Server from Check Point Infinity Portal, and reset the connection locally, regardless of the result in the Infinity Portal. This flag can be used if the disconnect-cloud-services command failed. Since with this flag this command affects only the local configuration, make sure to disconnect the Management Server in the Infinity Portal as well.\n"
        },
        "managementDisconnectCloudServicesId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDisconnectCloudServices resources.\n",
        "properties": {
          "force": {
            "type": "boolean",
            "description": "Disconnect the Management Server from Check Point Infinity Portal, and reset the connection locally, regardless of the result in the Infinity Portal. This flag can be used if the disconnect-cloud-services command failed. Since with this flag this command affects only the local configuration, make sure to disconnect the Management Server in the Infinity Portal as well.\n"
          },
          "managementDisconnectCloudServicesId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDnsDomain:ManagementDnsDomain": {
      "description": "This resource allows you to execute Check Point Dns Domain.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDnsDomain(\"example\", {\n    name: \".www.example.com\",\n    isSubDomain: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDnsDomain(\"example\",\n    name=\".www.example.com\",\n    is_sub_domain=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDnsDomain(\"example\", new()\n    {\n        Name = \".www.example.com\",\n        IsSubDomain = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDnsDomain(ctx, \"example\", &checkpoint.ManagementDnsDomainArgs{\n\t\t\tName:        pulumi.String(\".www.example.com\"),\n\t\t\tIsSubDomain: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDnsDomain;\nimport com.pulumi.checkpoint.ManagementDnsDomainArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDnsDomain(\"example\", ManagementDnsDomainArgs.builder()\n            .name(\".www.example.com\")\n            .isSubDomain(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDnsDomain\n    properties:\n      name: .www.example.com\n      isSubDomain: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "isSubDomain": {
          "type": "boolean",
          "description": "Whether to match sub-domains in addition to the domain itself.\n"
        },
        "managementDnsDomainId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDnsDomainId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "isSubDomain": {
          "type": "boolean",
          "description": "Whether to match sub-domains in addition to the domain itself.\n"
        },
        "managementDnsDomainId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDnsDomain resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "isSubDomain": {
            "type": "boolean",
            "description": "Whether to match sub-domains in addition to the domain itself.\n"
          },
          "managementDnsDomainId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDomain:ManagementDomain": {
      "description": "This resource allows you to execute Check Point Domain.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDomain(\"example\", {\n    name: \"domain1\",\n    servers: [{\n        name: \"domain1_ManagementServer_1\",\n        ipv4Address: \"192.0.2.1\",\n        multiDomainServer: \"MDM_Server\",\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDomain(\"example\",\n    name=\"domain1\",\n    servers=[{\n        \"name\": \"domain1_ManagementServer_1\",\n        \"ipv4_address\": \"192.0.2.1\",\n        \"multi_domain_server\": \"MDM_Server\",\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDomain(\"example\", new()\n    {\n        Name = \"domain1\",\n        Servers = new[]\n        {\n            new Checkpoint.Inputs.ManagementDomainServerArgs\n            {\n                Name = \"domain1_ManagementServer_1\",\n                Ipv4Address = \"192.0.2.1\",\n                MultiDomainServer = \"MDM_Server\",\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDomain(ctx, \"example\", &checkpoint.ManagementDomainArgs{\n\t\t\tName: pulumi.String(\"domain1\"),\n\t\t\tServers: checkpoint.ManagementDomainServerArray{\n\t\t\t\t&checkpoint.ManagementDomainServerArgs{\n\t\t\t\t\tName:              pulumi.String(\"domain1_ManagementServer_1\"),\n\t\t\t\t\tIpv4Address:       pulumi.String(\"192.0.2.1\"),\n\t\t\t\t\tMultiDomainServer: pulumi.String(\"MDM_Server\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDomain;\nimport com.pulumi.checkpoint.ManagementDomainArgs;\nimport com.pulumi.checkpoint.inputs.ManagementDomainServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDomain(\"example\", ManagementDomainArgs.builder()\n            .name(\"domain1\")\n            .servers(ManagementDomainServerArgs.builder()\n                .name(\"domain1_ManagementServer_1\")\n                .ipv4Address(\"192.0.2.1\")\n                .multiDomainServer(\"MDM_Server\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDomain\n    properties:\n      name: domain1\n      servers:\n        - name: domain1_ManagementServer_1\n          ipv4Address: 192.0.2.1\n          multiDomainServer: MDM_Server\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDomainId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "servers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDomainServer:ManagementDomainServer"
          },
          "description": "Domain servers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDomainId",
        "name",
        "servers"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDomainId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "servers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementDomainServer:ManagementDomainServer"
          },
          "description": "Domain servers.\n"
        }
      },
      "requiredInputs": [
        "servers"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDomain resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDomainId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "servers": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementDomainServer:ManagementDomainServer"
            },
            "description": "Domain servers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDomainPermissionsProfile:ManagementDomainPermissionsProfile": {
      "description": "This resource allows you to execute Check Point Domain Permissions Profile.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDomainPermissionsProfile(\"example\", {name: \"customize profile\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDomainPermissionsProfile(\"example\", name=\"customize profile\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDomainPermissionsProfile(\"example\", new()\n    {\n        Name = \"customize profile\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, \"example\", &checkpoint.ManagementDomainPermissionsProfileArgs{\n\t\t\tName: pulumi.String(\"customize profile\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDomainPermissionsProfile;\nimport com.pulumi.checkpoint.ManagementDomainPermissionsProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDomainPermissionsProfile(\"example\", ManagementDomainPermissionsProfileArgs.builder()\n            .name(\"customize profile\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDomainPermissionsProfile\n    properties:\n      name: customize profile\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "accessControl": {
          "$ref": "#/types/checkpoint:index%2FManagementDomainPermissionsProfileAccessControl:ManagementDomainPermissionsProfileAccessControl",
          "description": "Access Control permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "editCommonObjects": {
          "type": "boolean",
          "description": "Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.<br>Only a 'Customized' permission-type profile can edit this permission.\n"
        },
        "endpoint": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Endpoint permissions. Not supported for Multi-Domain Servers.<br>Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.\n"
        },
        "eventsAndReports": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Events and Reports permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.\n"
        },
        "gateways": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Gateways permissions. <br>Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "management": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Management permissions.management blocks are documented below.\n"
        },
        "managementDomainPermissionsProfileId": {
          "type": "string"
        },
        "monitoringAndLogging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Monitoring and Logging permissions.<br>'Customized' permission-type profile can edit all these permissions. \"Read Write All\" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "others": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.\n"
        },
        "permissionType": {
          "type": "string",
          "description": "The type of the Permissions Profile.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "threatPrevention": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Threat Prevention permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDomainPermissionsProfileId",
        "name"
      ],
      "inputProperties": {
        "accessControl": {
          "$ref": "#/types/checkpoint:index%2FManagementDomainPermissionsProfileAccessControl:ManagementDomainPermissionsProfileAccessControl",
          "description": "Access Control permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "editCommonObjects": {
          "type": "boolean",
          "description": "Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.<br>Only a 'Customized' permission-type profile can edit this permission.\n"
        },
        "endpoint": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Endpoint permissions. Not supported for Multi-Domain Servers.<br>Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.\n"
        },
        "eventsAndReports": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Events and Reports permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.\n"
        },
        "gateways": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Gateways permissions. <br>Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "management": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Management permissions.management blocks are documented below.\n"
        },
        "managementDomainPermissionsProfileId": {
          "type": "string"
        },
        "monitoringAndLogging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Monitoring and Logging permissions.<br>'Customized' permission-type profile can edit all these permissions. \"Read Write All\" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "others": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.\n"
        },
        "permissionType": {
          "type": "string",
          "description": "The type of the Permissions Profile.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "threatPrevention": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Threat Prevention permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDomainPermissionsProfile resources.\n",
        "properties": {
          "accessControl": {
            "$ref": "#/types/checkpoint:index%2FManagementDomainPermissionsProfileAccessControl:ManagementDomainPermissionsProfileAccessControl",
            "description": "Access Control permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.access_control blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "editCommonObjects": {
            "type": "boolean",
            "description": "Define and manage objects in the Check Point database: Network Objects, Services, Custom Application Site, VPN Community, Users, Servers, Resources, Time, UserCheck, and Limit.<br>Only a 'Customized' permission-type profile can edit this permission.\n"
          },
          "endpoint": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Endpoint permissions. Not supported for Multi-Domain Servers.<br>Only a 'Customized' permission-type profile can edit these permissions.endpoint blocks are documented below.\n"
          },
          "eventsAndReports": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Events and Reports permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.events_and_reports blocks are documented below.\n"
          },
          "gateways": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Gateways permissions. <br>Only a 'Customized' permission-type profile can edit these permissions.gateways blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "management": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Management permissions.management blocks are documented below.\n"
          },
          "managementDomainPermissionsProfileId": {
            "type": "string"
          },
          "monitoringAndLogging": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Monitoring and Logging permissions.<br>'Customized' permission-type profile can edit all these permissions. \"Read Write All\" permission-type can edit only dlp-logs-including-confidential-fields and manage-dlp-messages permissions.monitoring_and_logging blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "others": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Additional permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.others blocks are documented below.\n"
          },
          "permissionType": {
            "type": "string",
            "description": "The type of the Permissions Profile.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "threatPrevention": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Threat Prevention permissions.<br>Only a 'Customized' permission-type profile can edit these permissions.threat_prevention blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDynamicGlobalNetworkObject:ManagementDynamicGlobalNetworkObject": {
      "description": "This resource allows you to execute Check Point Dynamic Global Network Object.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDynamicGlobalNetworkObject(\"example\", {name: \"obj_global\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDynamicGlobalNetworkObject(\"example\", name=\"obj_global\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDynamicGlobalNetworkObject(\"example\", new()\n    {\n        Name = \"obj_global\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDynamicGlobalNetworkObject(ctx, \"example\", &checkpoint.ManagementDynamicGlobalNetworkObjectArgs{\n\t\t\tName: pulumi.String(\"obj_global\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDynamicGlobalNetworkObject;\nimport com.pulumi.checkpoint.ManagementDynamicGlobalNetworkObjectArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDynamicGlobalNetworkObject(\"example\", ManagementDynamicGlobalNetworkObjectArgs.builder()\n            .name(\"obj_global\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDynamicGlobalNetworkObject\n    properties:\n      name: obj_global\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDynamicGlobalNetworkObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDynamicGlobalNetworkObjectId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDynamicGlobalNetworkObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDynamicGlobalNetworkObject resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDynamicGlobalNetworkObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementDynamicObject:ManagementDynamicObject": {
      "description": "This resource allows you to execute Check Point Dynamic Object.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDynamicObject(\"example\", {\n    name: \"Dynamic_Object_1\",\n    comments: \"My Dynamic Object 1\",\n    color: \"yellow\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDynamicObject(\"example\",\n    name=\"Dynamic_Object_1\",\n    comments=\"My Dynamic Object 1\",\n    color=\"yellow\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementDynamicObject(\"example\", new()\n    {\n        Name = \"Dynamic_Object_1\",\n        Comments = \"My Dynamic Object 1\",\n        Color = \"yellow\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDynamicObject(ctx, \"example\", &checkpoint.ManagementDynamicObjectArgs{\n\t\t\tName:     pulumi.String(\"Dynamic_Object_1\"),\n\t\t\tComments: pulumi.String(\"My Dynamic Object 1\"),\n\t\t\tColor:    pulumi.String(\"yellow\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDynamicObject;\nimport com.pulumi.checkpoint.ManagementDynamicObjectArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDynamicObject(\"example\", ManagementDynamicObjectArgs.builder()\n            .name(\"Dynamic_Object_1\")\n            .comments(\"My Dynamic Object 1\")\n            .color(\"yellow\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDynamicObject\n    properties:\n      name: Dynamic_Object_1\n      comments: My Dynamic Object 1\n      color: yellow\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDynamicObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementDynamicObjectId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementDynamicObjectId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementDynamicObject resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementDynamicObjectId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementExceptionGroup:ManagementExceptionGroup": {
      "description": "This resource allows you to execute Check Point Exception Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementExceptionGroup(\"example\", {\n    name: \"exception_group_2\",\n    applyOn: \"manually-select-threat-rules\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementExceptionGroup(\"example\",\n    name=\"exception_group_2\",\n    apply_on=\"manually-select-threat-rules\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementExceptionGroup(\"example\", new()\n    {\n        Name = \"exception_group_2\",\n        ApplyOn = \"manually-select-threat-rules\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementExceptionGroup(ctx, \"example\", &checkpoint.ManagementExceptionGroupArgs{\n\t\t\tName:    pulumi.String(\"exception_group_2\"),\n\t\t\tApplyOn: pulumi.String(\"manually-select-threat-rules\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementExceptionGroup;\nimport com.pulumi.checkpoint.ManagementExceptionGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementExceptionGroup(\"example\", ManagementExceptionGroupArgs.builder()\n            .name(\"exception_group_2\")\n            .applyOn(\"manually-select-threat-rules\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementExceptionGroup\n    properties:\n      name: exception_group_2\n      applyOn: manually-select-threat-rules\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "appliedProfile": {
          "type": "string",
          "description": "The threat profile to apply this group to in the case of apply-on threat-rules-with-specific-profile.\n"
        },
        "appliedThreatRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementExceptionGroupAppliedThreatRule:ManagementExceptionGroupAppliedThreatRule"
          },
          "description": "The threat rules to apply this group on in the case of apply-on manually-select-threat-rules.applied_threat_rules blocks are documented below.\n"
        },
        "applyOn": {
          "type": "string",
          "description": "An exception group can be set to apply on all threat rules, all threat rules which have a specific profile, or those rules manually chosen by the user.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementExceptionGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementExceptionGroupId",
        "name"
      ],
      "inputProperties": {
        "appliedProfile": {
          "type": "string",
          "description": "The threat profile to apply this group to in the case of apply-on threat-rules-with-specific-profile.\n"
        },
        "appliedThreatRules": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementExceptionGroupAppliedThreatRule:ManagementExceptionGroupAppliedThreatRule"
          },
          "description": "The threat rules to apply this group on in the case of apply-on manually-select-threat-rules.applied_threat_rules blocks are documented below.\n"
        },
        "applyOn": {
          "type": "string",
          "description": "An exception group can be set to apply on all threat rules, all threat rules which have a specific profile, or those rules manually chosen by the user.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementExceptionGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementExceptionGroup resources.\n",
        "properties": {
          "appliedProfile": {
            "type": "string",
            "description": "The threat profile to apply this group to in the case of apply-on threat-rules-with-specific-profile.\n"
          },
          "appliedThreatRules": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementExceptionGroupAppliedThreatRule:ManagementExceptionGroupAppliedThreatRule"
            },
            "description": "The threat rules to apply this group on in the case of apply-on manually-select-threat-rules.applied_threat_rules blocks are documented below.\n"
          },
          "applyOn": {
            "type": "string",
            "description": "An exception group can be set to apply on all threat rules, all threat rules which have a specific profile, or those rules manually chosen by the user.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementExceptionGroupId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementExport:ManagementExport": {
      "properties": {
        "excludeClasses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Aexclude_classes blocks are documented below.\n"
        },
        "excludeTopics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Aexclude_topics blocks are documented below.\n"
        },
        "exportFilesByClass": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "includeClasses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Ainclude_classes blocks are documented below.\n"
        },
        "includeTopics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Ainclude_topics blocks are documented below.\n"
        },
        "managementExportId": {
          "type": "string"
        },
        "queryLimit": {
          "type": "number",
          "description": "N/A\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementExportId",
        "taskId"
      ],
      "inputProperties": {
        "excludeClasses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Aexclude_classes blocks are documented below.\n"
        },
        "excludeTopics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Aexclude_topics blocks are documented below.\n"
        },
        "exportFilesByClass": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "includeClasses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Ainclude_classes blocks are documented below.\n"
        },
        "includeTopics": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "N/Ainclude_topics blocks are documented below.\n"
        },
        "managementExportId": {
          "type": "string"
        },
        "queryLimit": {
          "type": "number",
          "description": "N/A\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementExport resources.\n",
        "properties": {
          "excludeClasses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "N/Aexclude_classes blocks are documented below.\n"
          },
          "excludeTopics": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "N/Aexclude_topics blocks are documented below.\n"
          },
          "exportFilesByClass": {
            "type": "boolean",
            "description": "N/A\n"
          },
          "includeClasses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "N/Ainclude_classes blocks are documented below.\n"
          },
          "includeTopics": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "N/Ainclude_topics blocks are documented below.\n"
          },
          "managementExportId": {
            "type": "string"
          },
          "queryLimit": {
            "type": "number",
            "description": "N/A\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementExternalTrustedCa:ManagementExternalTrustedCa": {
      "description": "This resource allows you to execute Check Point External Trusted Ca.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementExternalTrustedCa(\"example\", {\n    name: \"external_ca\",\n    base64Certificate: \"MIICujCCAaKgAwIBAgIIP1+IHWHbl0EwDQYJKoZIhvcNAQELBQAwFDESMBAGA1UEAxMJd3d3LnouY29tMB4XDTIzMTEyOTEyMzAwMFoXDTI0MTEyMDE2MDAwMFowFDESMBAGA1UEAxMJd3d3LnouY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoBreRGuq8u43GBog+ZaAnaR8ZF8cT2ppvtd3JoFmzTOQivLIt9sNtFYqEgHCtnNkKn9TRrxN14YscHgKIxfDSVlC9Rh0rrBvWgFqcm715Whr99Ogx6JbYFkusFWJarSejIFx4n6MM48MJxLdtCP6Hy1G2cj1BCiCHj4i3VIVaDE/aMkSqJbYEvf+vFqUWxY8/uEuKI/HGhI7mhUPW4NSGL0Oafz5eEFVsxqV5NA19/JJZ9NajSkyANnaNL5raxGV0oeqaE3JB3lSEZfWbH6mQsToUxxwIQfsZiIBozajDdTgP3Kn4SMY0b+I/WAWgfigMSDTAIR8J1sdzGXy2w2kqQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBUgrHztHwC1E0mU5c4reMrHg+z+YRHrgJNHVIYQbL5I2TJHk9S3UZsynoMa1CO86rReOtR5xoGv4PCkyyOW+PNlWUtXF3tNgqWj/21+XzG4RBHPw89TaTxRCdo+MHX58fi07SIzKjmxfdkEi+7+HQEQluDZGViolrGBAw2rXq/SZ3q/11mNqlb5ZyqyOa2u1sBF1ApvG5a/FBRTaO8gaiNelRf0PGYkuV+1HhF2XyP8Qk565d+uxUH5M7eHF2PNyVk/r/36T+x+UMql9y9iizA0ekuAjXLok1xYl3Vw4S5zXCXYtNZLOVrs+plJb7IrlElyTOAbDFuPugh0medz7uZ\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementExternalTrustedCa(\"example\",\n    name=\"external_ca\",\n    base64_certificate=\"MIICujCCAaKgAwIBAgIIP1+IHWHbl0EwDQYJKoZIhvcNAQELBQAwFDESMBAGA1UEAxMJd3d3LnouY29tMB4XDTIzMTEyOTEyMzAwMFoXDTI0MTEyMDE2MDAwMFowFDESMBAGA1UEAxMJd3d3LnouY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoBreRGuq8u43GBog+ZaAnaR8ZF8cT2ppvtd3JoFmzTOQivLIt9sNtFYqEgHCtnNkKn9TRrxN14YscHgKIxfDSVlC9Rh0rrBvWgFqcm715Whr99Ogx6JbYFkusFWJarSejIFx4n6MM48MJxLdtCP6Hy1G2cj1BCiCHj4i3VIVaDE/aMkSqJbYEvf+vFqUWxY8/uEuKI/HGhI7mhUPW4NSGL0Oafz5eEFVsxqV5NA19/JJZ9NajSkyANnaNL5raxGV0oeqaE3JB3lSEZfWbH6mQsToUxxwIQfsZiIBozajDdTgP3Kn4SMY0b+I/WAWgfigMSDTAIR8J1sdzGXy2w2kqQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBUgrHztHwC1E0mU5c4reMrHg+z+YRHrgJNHVIYQbL5I2TJHk9S3UZsynoMa1CO86rReOtR5xoGv4PCkyyOW+PNlWUtXF3tNgqWj/21+XzG4RBHPw89TaTxRCdo+MHX58fi07SIzKjmxfdkEi+7+HQEQluDZGViolrGBAw2rXq/SZ3q/11mNqlb5ZyqyOa2u1sBF1ApvG5a/FBRTaO8gaiNelRf0PGYkuV+1HhF2XyP8Qk565d+uxUH5M7eHF2PNyVk/r/36T+x+UMql9y9iizA0ekuAjXLok1xYl3Vw4S5zXCXYtNZLOVrs+plJb7IrlElyTOAbDFuPugh0medz7uZ\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementExternalTrustedCa(\"example\", new()\n    {\n        Name = \"external_ca\",\n        Base64Certificate = \"MIICujCCAaKgAwIBAgIIP1+IHWHbl0EwDQYJKoZIhvcNAQELBQAwFDESMBAGA1UEAxMJd3d3LnouY29tMB4XDTIzMTEyOTEyMzAwMFoXDTI0MTEyMDE2MDAwMFowFDESMBAGA1UEAxMJd3d3LnouY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoBreRGuq8u43GBog+ZaAnaR8ZF8cT2ppvtd3JoFmzTOQivLIt9sNtFYqEgHCtnNkKn9TRrxN14YscHgKIxfDSVlC9Rh0rrBvWgFqcm715Whr99Ogx6JbYFkusFWJarSejIFx4n6MM48MJxLdtCP6Hy1G2cj1BCiCHj4i3VIVaDE/aMkSqJbYEvf+vFqUWxY8/uEuKI/HGhI7mhUPW4NSGL0Oafz5eEFVsxqV5NA19/JJZ9NajSkyANnaNL5raxGV0oeqaE3JB3lSEZfWbH6mQsToUxxwIQfsZiIBozajDdTgP3Kn4SMY0b+I/WAWgfigMSDTAIR8J1sdzGXy2w2kqQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBUgrHztHwC1E0mU5c4reMrHg+z+YRHrgJNHVIYQbL5I2TJHk9S3UZsynoMa1CO86rReOtR5xoGv4PCkyyOW+PNlWUtXF3tNgqWj/21+XzG4RBHPw89TaTxRCdo+MHX58fi07SIzKjmxfdkEi+7+HQEQluDZGViolrGBAw2rXq/SZ3q/11mNqlb5ZyqyOa2u1sBF1ApvG5a/FBRTaO8gaiNelRf0PGYkuV+1HhF2XyP8Qk565d+uxUH5M7eHF2PNyVk/r/36T+x+UMql9y9iizA0ekuAjXLok1xYl3Vw4S5zXCXYtNZLOVrs+plJb7IrlElyTOAbDFuPugh0medz7uZ\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementExternalTrustedCa(ctx, \"example\", &checkpoint.ManagementExternalTrustedCaArgs{\n\t\t\tName:              pulumi.String(\"external_ca\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementExternalTrustedCa;\nimport com.pulumi.checkpoint.ManagementExternalTrustedCaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementExternalTrustedCa(\"example\", ManagementExternalTrustedCaArgs.builder()\n            .name(\"external_ca\")\n            .base64Certificate(\"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\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementExternalTrustedCa\n    properties:\n      name: external_ca\n      base64Certificate: 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\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowCertificatesFromBranches": {
          "type": "boolean",
          "description": "Allow only certificates from listed branches.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "branches": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\".branches blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "crlCacheMethod": {
          "type": "string",
          "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period.\n"
        },
        "crlCacheTimeout": {
          "type": "number",
          "description": "When to fetch new Certificate Revocation List (in minutes).\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementExternalTrustedCaId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "retrieveCrlFromHttpServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from http servers.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementExternalTrustedCaId",
        "name"
      ],
      "inputProperties": {
        "allowCertificatesFromBranches": {
          "type": "boolean",
          "description": "Allow only certificates from listed branches.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "branches": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\".branches blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "crlCacheMethod": {
          "type": "string",
          "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period.\n"
        },
        "crlCacheTimeout": {
          "type": "number",
          "description": "When to fetch new Certificate Revocation List (in minutes).\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementExternalTrustedCaId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "retrieveCrlFromHttpServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from http servers.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementExternalTrustedCa resources.\n",
        "properties": {
          "allowCertificatesFromBranches": {
            "type": "boolean",
            "description": "Allow only certificates from listed branches.\n"
          },
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64.\n"
          },
          "branches": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\".branches blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "crlCacheMethod": {
            "type": "string",
            "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period.\n"
          },
          "crlCacheTimeout": {
            "type": "number",
            "description": "When to fetch new Certificate Revocation List (in minutes).\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementExternalTrustedCaId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "retrieveCrlFromHttpServers": {
            "type": "boolean",
            "description": "Whether to retrieve Certificate Revocation List from http servers.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGaiaBestPractice:ManagementGaiaBestPractice": {
      "description": "This resource allows you to execute Check Point Gaia Best Practice.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementGaiaBestPractice(\"example\", {\n    name: \"Make sure that the network access via Telnet is disabled.\",\n    description: \"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\",\n    actionItem: \"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\",\n    expectedOutputText: \"Success\",\n    practiceScriptBase64: \"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementGaiaBestPractice(\"example\",\n    name=\"Make sure that the network access via Telnet is disabled.\",\n    description=\"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\",\n    action_item=\"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\",\n    expected_output_text=\"Success\",\n    practice_script_base64=\"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementGaiaBestPractice(\"example\", new()\n    {\n        Name = \"Make sure that the network access via Telnet is disabled.\",\n        Description = \"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\",\n        ActionItem = \"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\",\n        ExpectedOutputText = \"Success\",\n        PracticeScriptBase64 = \"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGaiaBestPractice(ctx, \"example\", &checkpoint.ManagementGaiaBestPracticeArgs{\n\t\t\tName:                 pulumi.String(\"Make sure that the network access via Telnet is disabled.\"),\n\t\t\tDescription:          pulumi.String(\"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\"),\n\t\t\tActionItem:           pulumi.String(\"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\"),\n\t\t\tExpectedOutputText:   pulumi.String(\"Success\"),\n\t\t\tPracticeScriptBase64: pulumi.String(\"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGaiaBestPractice;\nimport com.pulumi.checkpoint.ManagementGaiaBestPracticeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementGaiaBestPractice(\"example\", ManagementGaiaBestPracticeArgs.builder()\n            .name(\"Make sure that the network access via Telnet is disabled.\")\n            .description(\"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\")\n            .actionItem(\"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\")\n            .expectedOutputText(\"Success\")\n            .practiceScriptBase64(\"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementGaiaBestPractice\n    properties:\n      name: Make sure that the network access via Telnet is disabled.\n      description: This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\n      actionItem: Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\n      expectedOutputText: Success\n      practiceScriptBase64: IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "actionItem": {
          "type": "string",
          "description": "To comply with Best Practice, do this action item.\n"
        },
        "bestPracticeId": {
          "type": "string",
          "description": "ID of the Best Practice.\n"
        },
        "description": {
          "type": "string",
          "description": "Description of the Best Practice.\n"
        },
        "expectedOutputBase64": {
          "type": "string",
          "description": "The expected output of the script as Base64.\n"
        },
        "expectedOutputText": {
          "type": "string",
          "description": "The expected output of the script as plain text.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGaiaBestPracticeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Best Practice Name.\n"
        },
        "practiceScriptBase64": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64 to run on Gaia Security Gateways during the Compliance scans.\n"
        },
        "practiceScriptPath": {
          "type": "string",
          "description": "The absolute path of the script on the Management Server to run on Gaia Security Gateways during the Compliance scans.\n"
        },
        "regulations": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementGaiaBestPracticeRegulation:ManagementGaiaBestPracticeRegulation"
          },
          "description": "The applicable regulations of the Gaia Best Practice. Appear only when the value of the 'details-level' parameter is set to 'full'. regulations blocks are documented below.\n"
        },
        "relevantObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementGaiaBestPracticeRelevantObject:ManagementGaiaBestPracticeRelevantObject"
          },
          "description": "The applicable objects of the Gaia Best Practice. Appear only when the value of the 'details-level' parameter is set to 'full'.<span pulumi-lang-nodejs=\" relevantObjects \" pulumi-lang-dotnet=\" RelevantObjects \" pulumi-lang-go=\" relevantObjects \" pulumi-lang-python=\" relevant_objects \" pulumi-lang-yaml=\" relevantObjects \" pulumi-lang-java=\" relevantObjects \"> relevant_objects </span>blocks are documented below.\n"
        },
        "status": {
          "type": "string",
          "description": "The current status of the Best Practice.\n"
        },
        "userDefined": {
          "type": "boolean",
          "description": "Determines if the Gaia Best Practice is a user-defined best practice.\n"
        }
      },
      "type": "object",
      "required": [
        "actionItem",
        "description",
        "managementGaiaBestPracticeId",
        "name",
        "regulations",
        "relevantObjects",
        "status",
        "userDefined"
      ],
      "inputProperties": {
        "actionItem": {
          "type": "string",
          "description": "To comply with Best Practice, do this action item.\n"
        },
        "bestPracticeId": {
          "type": "string",
          "description": "ID of the Best Practice.\n"
        },
        "description": {
          "type": "string",
          "description": "Description of the Best Practice.\n"
        },
        "expectedOutputBase64": {
          "type": "string",
          "description": "The expected output of the script as Base64.\n"
        },
        "expectedOutputText": {
          "type": "string",
          "description": "The expected output of the script as plain text.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGaiaBestPracticeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Best Practice Name.\n"
        },
        "practiceScriptBase64": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64 to run on Gaia Security Gateways during the Compliance scans.\n"
        },
        "practiceScriptPath": {
          "type": "string",
          "description": "The absolute path of the script on the Management Server to run on Gaia Security Gateways during the Compliance scans.\n"
        }
      },
      "requiredInputs": [
        "actionItem",
        "description"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGaiaBestPractice resources.\n",
        "properties": {
          "actionItem": {
            "type": "string",
            "description": "To comply with Best Practice, do this action item.\n"
          },
          "bestPracticeId": {
            "type": "string",
            "description": "ID of the Best Practice.\n"
          },
          "description": {
            "type": "string",
            "description": "Description of the Best Practice.\n"
          },
          "expectedOutputBase64": {
            "type": "string",
            "description": "The expected output of the script as Base64.\n"
          },
          "expectedOutputText": {
            "type": "string",
            "description": "The expected output of the script as plain text.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementGaiaBestPracticeId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Best Practice Name.\n"
          },
          "practiceScriptBase64": {
            "type": "string",
            "description": "The entire content of the script encoded in Base64 to run on Gaia Security Gateways during the Compliance scans.\n"
          },
          "practiceScriptPath": {
            "type": "string",
            "description": "The absolute path of the script on the Management Server to run on Gaia Security Gateways during the Compliance scans.\n"
          },
          "regulations": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementGaiaBestPracticeRegulation:ManagementGaiaBestPracticeRegulation"
            },
            "description": "The applicable regulations of the Gaia Best Practice. Appear only when the value of the 'details-level' parameter is set to 'full'. regulations blocks are documented below.\n"
          },
          "relevantObjects": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementGaiaBestPracticeRelevantObject:ManagementGaiaBestPracticeRelevantObject"
            },
            "description": "The applicable objects of the Gaia Best Practice. Appear only when the value of the 'details-level' parameter is set to 'full'.<span pulumi-lang-nodejs=\" relevantObjects \" pulumi-lang-dotnet=\" RelevantObjects \" pulumi-lang-go=\" relevantObjects \" pulumi-lang-python=\" relevant_objects \" pulumi-lang-yaml=\" relevantObjects \" pulumi-lang-java=\" relevantObjects \"> relevant_objects </span>blocks are documented below.\n"
          },
          "status": {
            "type": "string",
            "description": "The current status of the Best Practice.\n"
          },
          "userDefined": {
            "type": "boolean",
            "description": "Determines if the Gaia Best Practice is a user-defined best practice.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGcpDataCenterServer:ManagementGcpDataCenterServer": {
      "description": "This resource allows you to execute Check Point Google Cloud Platform Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testGcp = new checkpoint.ManagementGcpDataCenterServer(\"testGcp\", {\n    name: \"myGcp\",\n    authenticationMethod: \"key-authentication\",\n    privateKey: \"MYKEY.json\",\n    ignoreWarnings: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_gcp = checkpoint.ManagementGcpDataCenterServer(\"testGcp\",\n    name=\"myGcp\",\n    authentication_method=\"key-authentication\",\n    private_key=\"MYKEY.json\",\n    ignore_warnings=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testGcp = new Checkpoint.ManagementGcpDataCenterServer(\"testGcp\", new()\n    {\n        Name = \"myGcp\",\n        AuthenticationMethod = \"key-authentication\",\n        PrivateKey = \"MYKEY.json\",\n        IgnoreWarnings = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGcpDataCenterServer(ctx, \"testGcp\", &checkpoint.ManagementGcpDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"myGcp\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"key-authentication\"),\n\t\t\tPrivateKey:           pulumi.String(\"MYKEY.json\"),\n\t\t\tIgnoreWarnings:       pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGcpDataCenterServer;\nimport com.pulumi.checkpoint.ManagementGcpDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testGcp = new ManagementGcpDataCenterServer(\"testGcp\", ManagementGcpDataCenterServerArgs.builder()\n            .name(\"myGcp\")\n            .authenticationMethod(\"key-authentication\")\n            .privateKey(\"MYKEY.json\")\n            .ignoreWarnings(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testGcp:\n    type: checkpoint:ManagementGcpDataCenterServer\n    properties:\n      name: myGcp\n      authenticationMethod: key-authentication\n      privateKey: MYKEY.json\n      ignoreWarnings: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "key-authentication Uses the Service Account private key file to authenticate. vm-instance-authentication Uses the Service Account VM Instance to authenticate. This option requires the Security Management Server deployed in a GCP, and runs as a Service Account with the required permissions.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGcpDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "privateKey": {
          "type": "string",
          "description": "A Service Account Key JSON file, encoded in base64. Required for authentication-method:key-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "managementGcpDataCenterServerId",
        "name"
      ],
      "inputProperties": {
        "authenticationMethod": {
          "type": "string",
          "description": "key-authentication Uses the Service Account private key file to authenticate. vm-instance-authentication Uses the Service Account VM Instance to authenticate. This option requires the Security Management Server deployed in a GCP, and runs as a Service Account with the required permissions.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGcpDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "privateKey": {
          "type": "string",
          "description": "A Service Account Key JSON file, encoded in base64. Required for authentication-method:key-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "authenticationMethod"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGcpDataCenterServer resources.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string",
            "description": "key-authentication Uses the Service Account private key file to authenticate. vm-instance-authentication Uses the Service Account VM Instance to authenticate. This option requires the Security Management Server deployed in a GCP, and runs as a Service Account with the required permissions.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementGcpDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "privateKey": {
            "type": "string",
            "description": "A Service Account Key JSON file, encoded in base64. Required for authentication-method:key-authentication.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGenericDataCenterServer:ManagementGenericDataCenterServer": {
      "description": "This resource allows you to execute Check Point Generic Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst genericTest = new checkpoint.ManagementGenericDataCenterServer(\"generic_test\", {\n    name: \"test\",\n    url: \"MY_URL\",\n    interval: \"60\",\n    comments: \"testing generic data center\",\n    color: \"crete blue\",\n    tags: [\"terraform\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngeneric_test = checkpoint.ManagementGenericDataCenterServer(\"generic_test\",\n    name=\"test\",\n    url=\"MY_URL\",\n    interval=\"60\",\n    comments=\"testing generic data center\",\n    color=\"crete blue\",\n    tags=[\"terraform\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var genericTest = new Checkpoint.ManagementGenericDataCenterServer(\"generic_test\", new()\n    {\n        Name = \"test\",\n        Url = \"MY_URL\",\n        Interval = \"60\",\n        Comments = \"testing generic data center\",\n        Color = \"crete blue\",\n        Tags = new[]\n        {\n            \"terraform\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGenericDataCenterServer(ctx, \"generic_test\", &checkpoint.ManagementGenericDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"test\"),\n\t\t\tUrl:      pulumi.String(\"MY_URL\"),\n\t\t\tInterval: pulumi.String(\"60\"),\n\t\t\tComments: pulumi.String(\"testing generic data center\"),\n\t\t\tColor:    pulumi.String(\"crete blue\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"terraform\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGenericDataCenterServer;\nimport com.pulumi.checkpoint.ManagementGenericDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var genericTest = new ManagementGenericDataCenterServer(\"genericTest\", ManagementGenericDataCenterServerArgs.builder()\n            .name(\"test\")\n            .url(\"MY_URL\")\n            .interval(\"60\")\n            .comments(\"testing generic data center\")\n            .color(\"crete blue\")\n            .tags(\"terraform\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  genericTest:\n    type: checkpoint:ManagementGenericDataCenterServer\n    name: generic_test\n    properties:\n      name: test\n      url: MY_URL\n      interval: '60'\n      comments: testing generic data center\n      color: crete blue\n      tags:\n        - terraform\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customHeader": {
          "type": "boolean",
          "description": "When set to false, The admin is not using Key and Value for a Custom Header in order to\nconnect to the feed server. When set to true, The admin is using Key and Value for a Custom Header in order to connect\nto the feed server.\n"
        },
        "customKey": {
          "type": "string",
          "description": "Key for the Custom Header, relevant and required only when<span pulumi-lang-nodejs=\" customHeader \" pulumi-lang-dotnet=\" CustomHeader \" pulumi-lang-go=\" customHeader \" pulumi-lang-python=\" custom_header \" pulumi-lang-yaml=\" customHeader \" pulumi-lang-java=\" customHeader \"> custom_header </span>set to true.\n"
        },
        "customValue": {
          "type": "string",
          "description": "Value for the Custom Header, relevant and required only when<span pulumi-lang-nodejs=\" customHeader \" pulumi-lang-dotnet=\" CustomHeader \" pulumi-lang-go=\" customHeader \" pulumi-lang-python=\" custom_header \" pulumi-lang-yaml=\" customHeader \" pulumi-lang-java=\" customHeader \"> custom_header </span>set to true.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interval": {
          "type": "string",
          "description": "Update interval of the feed in seconds.\n"
        },
        "managementGenericDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "url": {
          "type": "string",
          "description": "URL of the JSON feed (e.g. https://example.com/file.json).\n"
        }
      },
      "type": "object",
      "required": [
        "interval",
        "managementGenericDataCenterServerId",
        "name",
        "url"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customHeader": {
          "type": "boolean",
          "description": "When set to false, The admin is not using Key and Value for a Custom Header in order to\nconnect to the feed server. When set to true, The admin is using Key and Value for a Custom Header in order to connect\nto the feed server.\n"
        },
        "customKey": {
          "type": "string",
          "description": "Key for the Custom Header, relevant and required only when<span pulumi-lang-nodejs=\" customHeader \" pulumi-lang-dotnet=\" CustomHeader \" pulumi-lang-go=\" customHeader \" pulumi-lang-python=\" custom_header \" pulumi-lang-yaml=\" customHeader \" pulumi-lang-java=\" customHeader \"> custom_header </span>set to true.\n"
        },
        "customValue": {
          "type": "string",
          "description": "Value for the Custom Header, relevant and required only when<span pulumi-lang-nodejs=\" customHeader \" pulumi-lang-dotnet=\" CustomHeader \" pulumi-lang-go=\" customHeader \" pulumi-lang-python=\" custom_header \" pulumi-lang-yaml=\" customHeader \" pulumi-lang-java=\" customHeader \"> custom_header </span>set to true.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interval": {
          "type": "string",
          "description": "Update interval of the feed in seconds.\n"
        },
        "managementGenericDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "url": {
          "type": "string",
          "description": "URL of the JSON feed (e.g. https://example.com/file.json).\n"
        }
      },
      "requiredInputs": [
        "interval",
        "url"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGenericDataCenterServer resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "customHeader": {
            "type": "boolean",
            "description": "When set to false, The admin is not using Key and Value for a Custom Header in order to\nconnect to the feed server. When set to true, The admin is using Key and Value for a Custom Header in order to connect\nto the feed server.\n"
          },
          "customKey": {
            "type": "string",
            "description": "Key for the Custom Header, relevant and required only when<span pulumi-lang-nodejs=\" customHeader \" pulumi-lang-dotnet=\" CustomHeader \" pulumi-lang-go=\" customHeader \" pulumi-lang-python=\" custom_header \" pulumi-lang-yaml=\" customHeader \" pulumi-lang-java=\" customHeader \"> custom_header </span>set to true.\n"
          },
          "customValue": {
            "type": "string",
            "description": "Value for the Custom Header, relevant and required only when<span pulumi-lang-nodejs=\" customHeader \" pulumi-lang-dotnet=\" CustomHeader \" pulumi-lang-go=\" customHeader \" pulumi-lang-python=\" custom_header \" pulumi-lang-yaml=\" customHeader \" pulumi-lang-java=\" customHeader \"> custom_header </span>set to true.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If\nignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interval": {
            "type": "string",
            "description": "Update interval of the feed in seconds.\n"
          },
          "managementGenericDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "url": {
            "type": "string",
            "description": "URL of the JSON feed (e.g. https://example.com/file.json).\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGetAttachment:ManagementGetAttachment": {
      "description": "This command resource allows you to execute Check Point Get Attachment.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementGetAttachment(\"example\", {attachmentId: \"MjY5HlNtYXJ0RGVmZW5zZR5jbj1jcF9tZ210LG89aHVnbzEtYmxvYkFwaS1uZXctdGFrZS0yLmNoZWNrcG9pbnQuY29tLnM2MjdvMx57MHg1OTg4\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementGetAttachment(\"example\", attachment_id=\"MjY5HlNtYXJ0RGVmZW5zZR5jbj1jcF9tZ210LG89aHVnbzEtYmxvYkFwaS1uZXctdGFrZS0yLmNoZWNrcG9pbnQuY29tLnM2MjdvMx57MHg1OTg4\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementGetAttachment(\"example\", new()\n    {\n        AttachmentId = \"MjY5HlNtYXJ0RGVmZW5zZR5jbj1jcF9tZ210LG89aHVnbzEtYmxvYkFwaS1uZXctdGFrZS0yLmNoZWNrcG9pbnQuY29tLnM2MjdvMx57MHg1OTg4\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGetAttachment(ctx, \"example\", &checkpoint.ManagementGetAttachmentArgs{\n\t\t\tAttachmentId: pulumi.String(\"MjY5HlNtYXJ0RGVmZW5zZR5jbj1jcF9tZ210LG89aHVnbzEtYmxvYkFwaS1uZXctdGFrZS0yLmNoZWNrcG9pbnQuY29tLnM2MjdvMx57MHg1OTg4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGetAttachment;\nimport com.pulumi.checkpoint.ManagementGetAttachmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementGetAttachment(\"example\", ManagementGetAttachmentArgs.builder()\n            .attachmentId(\"MjY5HlNtYXJ0RGVmZW5zZR5jbj1jcF9tZ210LG89aHVnbzEtYmxvYkFwaS1uZXctdGFrZS0yLmNoZWNrcG9pbnQuY29tLnM2MjdvMx57MHg1OTg4\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementGetAttachment\n    properties:\n      attachmentId: MjY5HlNtYXJ0RGVmZW5zZR5jbj1jcF9tZ210LG89aHVnbzEtYmxvYkFwaS1uZXctdGFrZS0yLmNoZWNrcG9pbnQuY29tLnM2MjdvMx57MHg1OTg4\n```\n<!--End PulumiCodeChooser -->\n\n## How To Use\n\nMake sure this command will be executed in the right execution order.\n",
      "properties": {
        "attachmentId": {
          "type": "string",
          "description": "Attachment identifier from a log record.\n"
        },
        "managementGetAttachmentId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "uid": {
          "type": "string",
          "description": "Log id from a log record.\n"
        }
      },
      "type": "object",
      "required": [
        "managementGetAttachmentId",
        "taskId"
      ],
      "inputProperties": {
        "attachmentId": {
          "type": "string",
          "description": "Attachment identifier from a log record.\n"
        },
        "managementGetAttachmentId": {
          "type": "string"
        },
        "uid": {
          "type": "string",
          "description": "Log id from a log record.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGetAttachment resources.\n",
        "properties": {
          "attachmentId": {
            "type": "string",
            "description": "Attachment identifier from a log record.\n"
          },
          "managementGetAttachmentId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "uid": {
            "type": "string",
            "description": "Log id from a log record.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGetPlatform:ManagementGetPlatform": {
      "properties": {
        "managementGetPlatformId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Gateway, cluster or Check Point host name.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementGetPlatformId",
        "name",
        "taskId"
      ],
      "inputProperties": {
        "managementGetPlatformId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Gateway, cluster or Check Point host name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGetPlatform resources.\n",
        "properties": {
          "managementGetPlatformId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Gateway, cluster or Check Point host name.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGlobalAssignment:ManagementGlobalAssignment": {
      "description": "This resource allows you to execute Check Point Global Assignment.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementGlobalAssignment(\"example\", {\n    globalDomain: \"Global\",\n    dependentDomain: \"domain2\",\n    globalAccessPolicy: \"standard\",\n    globalThreatPreventionPolicy: \"standard\",\n    manageProtectionActions: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementGlobalAssignment(\"example\",\n    global_domain=\"Global\",\n    dependent_domain=\"domain2\",\n    global_access_policy=\"standard\",\n    global_threat_prevention_policy=\"standard\",\n    manage_protection_actions=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementGlobalAssignment(\"example\", new()\n    {\n        GlobalDomain = \"Global\",\n        DependentDomain = \"domain2\",\n        GlobalAccessPolicy = \"standard\",\n        GlobalThreatPreventionPolicy = \"standard\",\n        ManageProtectionActions = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGlobalAssignment(ctx, \"example\", &checkpoint.ManagementGlobalAssignmentArgs{\n\t\t\tGlobalDomain:                 pulumi.String(\"Global\"),\n\t\t\tDependentDomain:              pulumi.String(\"domain2\"),\n\t\t\tGlobalAccessPolicy:           pulumi.String(\"standard\"),\n\t\t\tGlobalThreatPreventionPolicy: pulumi.String(\"standard\"),\n\t\t\tManageProtectionActions:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGlobalAssignment;\nimport com.pulumi.checkpoint.ManagementGlobalAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementGlobalAssignment(\"example\", ManagementGlobalAssignmentArgs.builder()\n            .globalDomain(\"Global\")\n            .dependentDomain(\"domain2\")\n            .globalAccessPolicy(\"standard\")\n            .globalThreatPreventionPolicy(\"standard\")\n            .manageProtectionActions(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementGlobalAssignment\n    properties:\n      globalDomain: Global\n      dependentDomain: domain2\n      globalAccessPolicy: standard\n      globalThreatPreventionPolicy: standard\n      manageProtectionActions: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "assignmentStatus": {
          "type": "string"
        },
        "assignmentUpToDate": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "The time when the assignment was assigned.<span pulumi-lang-nodejs=\" assignmentUpToDate \" pulumi-lang-dotnet=\" AssignmentUpToDate \" pulumi-lang-go=\" assignmentUpToDate \" pulumi-lang-python=\" assignment_up_to_date \" pulumi-lang-yaml=\" assignmentUpToDate \" pulumi-lang-java=\" assignmentUpToDate \"> assignment_up_to_date </span>blocks are documented below.\n\n\n<span pulumi-lang-nodejs=\"`assignmentUpToDate`\" pulumi-lang-dotnet=\"`AssignmentUpToDate`\" pulumi-lang-go=\"`assignmentUpToDate`\" pulumi-lang-python=\"`assignment_up_to_date`\" pulumi-lang-yaml=\"`assignmentUpToDate`\" pulumi-lang-java=\"`assignmentUpToDate`\">`assignment_up_to_date`</span> supports the follwoing:\n"
        },
        "dependentDomain": {
          "type": "string",
          "description": "N/A\n"
        },
        "globalAccessPolicy": {
          "type": "string",
          "description": "Global domain access policy that is assigned to a dependent domain.\n"
        },
        "globalDomain": {
          "type": "string",
          "description": "N/A\n"
        },
        "globalThreatPreventionPolicy": {
          "type": "string",
          "description": "Global domain threat prevention policy that is assigned to a dependent domain.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "manageProtectionActions": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "managementGlobalAssignmentId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "assignmentStatus",
        "assignmentUpToDate",
        "managementGlobalAssignmentId"
      ],
      "inputProperties": {
        "dependentDomain": {
          "type": "string",
          "description": "N/A\n"
        },
        "globalAccessPolicy": {
          "type": "string",
          "description": "Global domain access policy that is assigned to a dependent domain.\n"
        },
        "globalDomain": {
          "type": "string",
          "description": "N/A\n"
        },
        "globalThreatPreventionPolicy": {
          "type": "string",
          "description": "Global domain threat prevention policy that is assigned to a dependent domain.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "manageProtectionActions": {
          "type": "boolean",
          "description": "N/A\n"
        },
        "managementGlobalAssignmentId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGlobalAssignment resources.\n",
        "properties": {
          "assignmentStatus": {
            "type": "string"
          },
          "assignmentUpToDate": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "The time when the assignment was assigned.<span pulumi-lang-nodejs=\" assignmentUpToDate \" pulumi-lang-dotnet=\" AssignmentUpToDate \" pulumi-lang-go=\" assignmentUpToDate \" pulumi-lang-python=\" assignment_up_to_date \" pulumi-lang-yaml=\" assignmentUpToDate \" pulumi-lang-java=\" assignmentUpToDate \"> assignment_up_to_date </span>blocks are documented below.\n\n\n<span pulumi-lang-nodejs=\"`assignmentUpToDate`\" pulumi-lang-dotnet=\"`AssignmentUpToDate`\" pulumi-lang-go=\"`assignmentUpToDate`\" pulumi-lang-python=\"`assignment_up_to_date`\" pulumi-lang-yaml=\"`assignmentUpToDate`\" pulumi-lang-java=\"`assignmentUpToDate`\">`assignment_up_to_date`</span> supports the follwoing:\n"
          },
          "dependentDomain": {
            "type": "string",
            "description": "N/A\n"
          },
          "globalAccessPolicy": {
            "type": "string",
            "description": "Global domain access policy that is assigned to a dependent domain.\n"
          },
          "globalDomain": {
            "type": "string",
            "description": "N/A\n"
          },
          "globalThreatPreventionPolicy": {
            "type": "string",
            "description": "Global domain threat prevention policy that is assigned to a dependent domain.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "manageProtectionActions": {
            "type": "boolean",
            "description": "N/A\n"
          },
          "managementGlobalAssignmentId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGroup:ManagementGroup": {
      "description": "This resource allows you to add/update/delete Check Point Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementGroup(\"example\", {\n    name: \"New Group 4\",\n    members: [\n        \"New Host 1\",\n        \"My Test Host 3\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementGroup(\"example\",\n    name=\"New Group 4\",\n    members=[\n        \"New Host 1\",\n        \"My Test Host 3\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementGroup(\"example\", new()\n    {\n        Name = \"New Group 4\",\n        Members = new[]\n        {\n            \"New Host 1\",\n            \"My Test Host 3\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGroup(ctx, \"example\", &checkpoint.ManagementGroupArgs{\n\t\t\tName: pulumi.String(\"New Group 4\"),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"New Host 1\"),\n\t\t\t\tpulumi.String(\"My Test Host 3\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGroup;\nimport com.pulumi.checkpoint.ManagementGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementGroup(\"example\", ManagementGroupArgs.builder()\n            .name(\"New Group 4\")\n            .members(            \n                \"New Host 1\",\n                \"My Test Host 3\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementGroup\n    properties:\n      name: New Group 4\n      members:\n        - New Host 1\n        - My Test Host 3\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGroupWithExclusion:ManagementGroupWithExclusion": {
      "description": "This resource allows you to execute Check Point Group With Exclusion.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementGroupWithExclusion(\"example\", {\n    name: \"Group with exclusion\",\n    include: \"New Group 1\",\n    except: \"New Group 2\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementGroupWithExclusion(\"example\",\n    name=\"Group with exclusion\",\n    include=\"New Group 1\",\n    except_=\"New Group 2\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementGroupWithExclusion(\"example\", new()\n    {\n        Name = \"Group with exclusion\",\n        Include = \"New Group 1\",\n        Except = \"New Group 2\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGroupWithExclusion(ctx, \"example\", &checkpoint.ManagementGroupWithExclusionArgs{\n\t\t\tName:    pulumi.String(\"Group with exclusion\"),\n\t\t\tInclude: pulumi.String(\"New Group 1\"),\n\t\t\tExcept:  pulumi.String(\"New Group 2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGroupWithExclusion;\nimport com.pulumi.checkpoint.ManagementGroupWithExclusionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementGroupWithExclusion(\"example\", ManagementGroupWithExclusionArgs.builder()\n            .name(\"Group with exclusion\")\n            .include(\"New Group 1\")\n            .except(\"New Group 2\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementGroupWithExclusion\n    properties:\n      name: Group with exclusion\n      include: New Group 1\n      except: New Group 2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "except": {
          "type": "string",
          "description": "Name or UID of an object which the group excludes.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "include": {
          "type": "string",
          "description": "Name or UID of an object which the group includes.\n"
        },
        "managementGroupWithExclusionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementGroupWithExclusionId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "except": {
          "type": "string",
          "description": "Name or UID of an object which the group excludes.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "include": {
          "type": "string",
          "description": "Name or UID of an object which the group includes.\n"
        },
        "managementGroupWithExclusionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGroupWithExclusion resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "except": {
            "type": "string",
            "description": "Name or UID of an object which the group excludes.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "include": {
            "type": "string",
            "description": "Name or UID of an object which the group includes.\n"
          },
          "managementGroupWithExclusionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementGsnHandoverGroup:ManagementGsnHandoverGroup": {
      "description": "This resource allows you to execute Check Point Gsn Handover Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementGsnHandoverGroup(\"example\", {\n    name: \"gsn group\",\n    enforceGtp: true,\n    gtpRate: 2048,\n    members: [\"All_Internet\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementGsnHandoverGroup(\"example\",\n    name=\"gsn group\",\n    enforce_gtp=True,\n    gtp_rate=2048,\n    members=[\"All_Internet\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementGsnHandoverGroup(\"example\", new()\n    {\n        Name = \"gsn group\",\n        EnforceGtp = true,\n        GtpRate = 2048,\n        Members = new[]\n        {\n            \"All_Internet\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementGsnHandoverGroup(ctx, \"example\", &checkpoint.ManagementGsnHandoverGroupArgs{\n\t\t\tName:       pulumi.String(\"gsn group\"),\n\t\t\tEnforceGtp: pulumi.Bool(true),\n\t\t\tGtpRate:    pulumi.Float64(2048),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"All_Internet\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGsnHandoverGroup;\nimport com.pulumi.checkpoint.ManagementGsnHandoverGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementGsnHandoverGroup(\"example\", ManagementGsnHandoverGroupArgs.builder()\n            .name(\"gsn group\")\n            .enforceGtp(true)\n            .gtpRate(2048.0)\n            .members(\"All_Internet\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementGsnHandoverGroup\n    properties:\n      name: gsn group\n      enforceGtp: true\n      gtpRate: 2048\n      members:\n        - All_Internet\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enforceGtp": {
          "type": "boolean",
          "description": "Enable enforce GTP signal packet rate limit from this group.\n"
        },
        "gtpRate": {
          "type": "number",
          "description": "Limit of the GTP rate in PDU/sec.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGsnHandoverGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of GSN handover group members identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementGsnHandoverGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enforceGtp": {
          "type": "boolean",
          "description": "Enable enforce GTP signal packet rate limit from this group.\n"
        },
        "gtpRate": {
          "type": "number",
          "description": "Limit of the GTP rate in PDU/sec.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementGsnHandoverGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of GSN handover group members identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementGsnHandoverGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "enforceGtp": {
            "type": "boolean",
            "description": "Enable enforce GTP signal packet rate limit from this group.\n"
          },
          "gtpRate": {
            "type": "number",
            "description": "Limit of the GTP rate in PDU/sec.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementGsnHandoverGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of GSN handover group members identified by the name or UID.members blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementHaFullSync:ManagementHaFullSync": {
      "description": "This command resource allows you to execute Check Point HA Full Sync.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementHaFullSync(\"example\", {name: \"standby peer\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementHaFullSync(\"example\", name=\"standby peer\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementHaFullSync(\"example\", new()\n    {\n        Name = \"standby peer\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementHaFullSync(ctx, \"example\", &checkpoint.ManagementHaFullSyncArgs{\n\t\t\tName: pulumi.String(\"standby peer\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHaFullSync;\nimport com.pulumi.checkpoint.ManagementHaFullSyncArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementHaFullSync(\"example\", ManagementHaFullSyncArgs.builder()\n            .name(\"standby peer\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementHaFullSync\n    properties:\n      name: standby peer\n```\n<!--End PulumiCodeChooser -->\n\n## How To Use\n\nMake sure this command will be executed in the right execution order.\n",
      "properties": {
        "managementHaFullSyncId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Peer name (Multi Domain Server, Domain Server or Security Management Server).\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "uid": {
          "type": "string",
          "description": "Peer unique identifier (Multi Domain Server, Domain Server or Security Management Server).\n"
        }
      },
      "type": "object",
      "required": [
        "managementHaFullSyncId",
        "name",
        "taskId"
      ],
      "inputProperties": {
        "managementHaFullSyncId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Peer name (Multi Domain Server, Domain Server or Security Management Server).\n"
        },
        "uid": {
          "type": "string",
          "description": "Peer unique identifier (Multi Domain Server, Domain Server or Security Management Server).\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementHaFullSync resources.\n",
        "properties": {
          "managementHaFullSyncId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Peer name (Multi Domain Server, Domain Server or Security Management Server).\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "uid": {
            "type": "string",
            "description": "Peer unique identifier (Multi Domain Server, Domain Server or Security Management Server).\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementHost:ManagementHost": {
      "description": "This resource allows you to add/update/delete Check Point Host.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementHost(\"example\", {\n    name: \"New Host 1\",\n    ipv4Address: \"192.0.2.1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementHost(\"example\",\n    name=\"New Host 1\",\n    ipv4_address=\"192.0.2.1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementHost(\"example\", new()\n    {\n        Name = \"New Host 1\",\n        Ipv4Address = \"192.0.2.1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementHost(ctx, \"example\", &checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"New Host 1\"),\n\t\t\tIpv4Address: pulumi.String(\"192.0.2.1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementHost(\"example\", ManagementHostArgs.builder()\n            .name(\"New Host 1\")\n            .ipv4Address(\"192.0.2.1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementHost\n    properties:\n      name: New Host 1\n      ipv4Address: 192.0.2.1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostServers": {
          "$ref": "#/types/checkpoint:index%2FManagementHostHostServers:ManagementHostHostServers",
          "description": "Servers Configuration. Servers Configuration blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementHostInterface:ManagementHostInterface"
          },
          "description": "Host interfaces. Host interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementHostId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementHostId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostServers": {
          "$ref": "#/types/checkpoint:index%2FManagementHostHostServers:ManagementHostHostServers",
          "description": "Servers Configuration. Servers Configuration blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementHostInterface:ManagementHostInterface"
          },
          "description": "Host interfaces. Host interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementHostId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementHost resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hostServers": {
            "$ref": "#/types/checkpoint:index%2FManagementHostHostServers:ManagementHostHostServers",
            "description": "Servers Configuration. Servers Configuration blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementHostInterface:ManagementHostInterface"
            },
            "description": "Host interfaces. Host interfaces blocks are documented below.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "managementHostId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "natSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "NAT settings. NAT settings blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementHttpsLayer:ManagementHttpsLayer": {
      "description": "This resource allows you to execute Check Point Https Layer.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementHttpsLayer(\"example\", {name: \"New Layer 1\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementHttpsLayer(\"example\", name=\"New Layer 1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementHttpsLayer(\"example\", new()\n    {\n        Name = \"New Layer 1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementHttpsLayer(ctx, \"example\", &checkpoint.ManagementHttpsLayerArgs{\n\t\t\tName: pulumi.String(\"New Layer 1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHttpsLayer;\nimport com.pulumi.checkpoint.ManagementHttpsLayerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementHttpsLayer(\"example\", ManagementHttpsLayerArgs.builder()\n            .name(\"New Layer 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementHttpsLayer\n    properties:\n      name: New Layer 1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementHttpsLayerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "shared": {
          "type": "boolean",
          "description": "Define the Layer as Shared (TRUE/FALSE).\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementHttpsLayerId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementHttpsLayerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "shared": {
          "type": "boolean",
          "description": "Define the Layer as Shared (TRUE/FALSE).\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementHttpsLayer resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementHttpsLayerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "shared": {
            "type": "boolean",
            "description": "Define the Layer as Shared (TRUE/FALSE).\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementHttpsRule:ManagementHttpsRule": {
      "description": "This resource allows you to execute Check Point Https Rule.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementHttpsRule(\"example\", {\n    name: \"FirstRule\",\n    position: {\n        top: \"top\",\n    },\n    layer: \"MyLayer\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementHttpsRule(\"example\",\n    name=\"FirstRule\",\n    position={\n        \"top\": \"top\",\n    },\n    layer=\"MyLayer\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementHttpsRule(\"example\", new()\n    {\n        Name = \"FirstRule\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Layer = \"MyLayer\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementHttpsRule(ctx, \"example\", &checkpoint.ManagementHttpsRuleArgs{\n\t\t\tName: pulumi.String(\"FirstRule\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tLayer: pulumi.String(\"MyLayer\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHttpsRule;\nimport com.pulumi.checkpoint.ManagementHttpsRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementHttpsRule(\"example\", ManagementHttpsRuleArgs.builder()\n            .name(\"FirstRule\")\n            .position(Map.of(\"top\", \"top\"))\n            .layer(\"MyLayer\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementHttpsRule\n    properties:\n      name: FirstRule\n      position:\n        top: top\n      layer: MyLayer\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "Rule inspect level. \"Bypass\" or \"Inspect\".\n"
        },
        "blades": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for.\n\"Anti Bot\",\"Anti Virus\",\"Application Control\",\"Data Awareness\",\"DLP\",\"IPS\",\"Threat Emulation\",\"Url Filtering\".blade blocks are documented below.\n"
        },
        "certificate": {
          "type": "string",
          "description": "Internal Server Certificate identified by Name or UID,\notherwise, \"Outbound Certificate\" is a default value.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that holds the Object. Identified by the Name or UID.\n"
        },
        "managementHttpsRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "HTTPS rule name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.\n"
        },
        "siteCategories": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.\n"
        },
        "siteCategoryNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Site Category.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.\n"
        },
        "track": {
          "type": "string",
          "description": "\"None\",\"Log\",\"Alert\",\"Mail\",\"SNMP trap\",\"Mail\",\"User Alert\", \"User Alert 2\", \"User Alert 3\".\n"
        }
      },
      "type": "object",
      "required": [
        "layer",
        "managementHttpsRuleId",
        "name",
        "position"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "Rule inspect level. \"Bypass\" or \"Inspect\".\n"
        },
        "blades": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for.\n\"Anti Bot\",\"Anti Virus\",\"Application Control\",\"Data Awareness\",\"DLP\",\"IPS\",\"Threat Emulation\",\"Url Filtering\".blade blocks are documented below.\n"
        },
        "certificate": {
          "type": "string",
          "description": "Internal Server Certificate identified by Name or UID,\notherwise, \"Outbound Certificate\" is a default value.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that holds the Object. Identified by the Name or UID.\n"
        },
        "managementHttpsRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "HTTPS rule name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.\n"
        },
        "siteCategories": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.\n"
        },
        "siteCategoryNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Site Category.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "TRUE if \"negate\" value is set for Source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.\n"
        },
        "track": {
          "type": "string",
          "description": "\"None\",\"Log\",\"Alert\",\"Mail\",\"SNMP trap\",\"Mail\",\"User Alert\", \"User Alert 2\", \"User Alert 3\".\n"
        }
      },
      "requiredInputs": [
        "layer",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementHttpsRule resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "Rule inspect level. \"Bypass\" or \"Inspect\".\n"
          },
          "blades": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Blades for HTTPS Inspection. Identified by Name or UID to enable the inspection for.\n\"Anti Bot\",\"Anti Virus\",\"Application Control\",\"Data Awareness\",\"DLP\",\"IPS\",\"Threat Emulation\",\"Url Filtering\".blade blocks are documented below.\n"
          },
          "certificate": {
            "type": "string",
            "description": "Internal Server Certificate identified by Name or UID,\notherwise, \"Outbound Certificate\" is a default value.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "destinationNegate": {
            "type": "boolean",
            "description": "TRUE if \"negate\" value is set for Destination.\n"
          },
          "destinations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by Name or UID that represents connection destination.destination blocks are documented below.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.\n"
          },
          "layer": {
            "type": "string",
            "description": "Layer that holds the Object. Identified by the Name or UID.\n"
          },
          "managementHttpsRuleId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "HTTPS rule name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase.\n"
          },
          "serviceNegate": {
            "type": "boolean",
            "description": "TRUE if \"negate\" value is set for Service.\n"
          },
          "services": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by Name or UID that represents connection service.service blocks are documented below.\n"
          },
          "siteCategories": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Site Categories objects identified by the name or UID.site_category blocks are documented below.\n"
          },
          "siteCategoryNegate": {
            "type": "boolean",
            "description": "TRUE if \"negate\" value is set for Site Category.\n"
          },
          "sourceNegate": {
            "type": "boolean",
            "description": "TRUE if \"negate\" value is set for Source.\n"
          },
          "sources": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by Name or UID that represents connection source.source blocks are documented below.\n"
          },
          "track": {
            "type": "string",
            "description": "\"None\",\"Log\",\"Alert\",\"Mail\",\"SNMP trap\",\"Mail\",\"User Alert\", \"User Alert 2\", \"User Alert 3\".\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementHttpsSection:ManagementHttpsSection": {
      "description": "This resource allows you to execute Check Point Https Section.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementHttpsSection(\"example\", {\n    name: \"New Section 1\",\n    position: {\n        top: \"top\",\n    },\n    layer: \"Network\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementHttpsSection(\"example\",\n    name=\"New Section 1\",\n    position={\n        \"top\": \"top\",\n    },\n    layer=\"Network\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementHttpsSection(\"example\", new()\n    {\n        Name = \"New Section 1\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Layer = \"Network\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementHttpsSection(ctx, \"example\", &checkpoint.ManagementHttpsSectionArgs{\n\t\t\tName: pulumi.String(\"New Section 1\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHttpsSection;\nimport com.pulumi.checkpoint.ManagementHttpsSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementHttpsSection(\"example\", ManagementHttpsSectionArgs.builder()\n            .name(\"New Section 1\")\n            .position(Map.of(\"top\", \"top\"))\n            .layer(\"Network\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementHttpsSection\n    properties:\n      name: New Section 1\n      position:\n        top: top\n      layer: Network\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that holds the Object. Identified by the Name or UID.\n"
        },
        "managementHttpsSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        }
      },
      "type": "object",
      "required": [
        "layer",
        "managementHttpsSectionId",
        "name",
        "position"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that holds the Object. Identified by the Name or UID.\n"
        },
        "managementHttpsSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase.\n"
        }
      },
      "requiredInputs": [
        "layer",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementHttpsSection resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "layer": {
            "type": "string",
            "description": "Layer that holds the Object. Identified by the Name or UID.\n"
          },
          "managementHttpsSectionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementIdentityProvider:ManagementIdentityProvider": {
      "description": "This resource allows you to execute Check Point Identity Provider.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementIdentityProvider(\"example\", {\n    name: \"TestIdp2\",\n    usage: \"managing_administrator_access\",\n    dataReceiving: \"manually\",\n    receivedIdentifier: \"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\",\n    loginUrl: \"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\",\n    base64Certificate: \"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM4RENDQWRpZ0F3SUJBZ0lRUTBWZVpLdVBLb0pQUWhaNGhDaWRzREFOQmdrcWhraUc5dzBCQVFzRkFEQTBNVEl3TUFZRFZRUURFeWxOYVdOeWIzTnZablFnUVhwMWNtVWdSbVZrWlhKaGRHVmtJRk5UVHlCRFpYSjBhV1pwWTJGMFpUQWVGdzB4T0RBME1UVXhNVEl6TXpOYUZ3MHlNVEEwTVRVeE1USXpNek5hTURReE1qQXdCZ05WQkFNVEtVMXBZM0p2YzI5bWRDQkJlblZ5WlNCR1pXUmxjbUYwWldRZ1UxTlBJRU5sY25ScFptbGpZWFJsTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUE0VXVqYUd0OFhaODl2dXZ5a3lRVzVYb24vOFIvaVB0ejRhYjBNM3RNVXZHWHozVXh0V1pTRStUR1hydjN3VHRLMCs4RmtNeXVKYUhGSXBLLzRVREZpRk1yQmxzR0Z1dmtTc1p5VjIzZlNGN3paaXlUWTZUN0EwcCtnczUwNVhEOUdBYjlWYmR3R0cwK0tDVnlpc1ZRZ1YySXdKZ2l5aHF3RUNvY3dCcmFuN251SytURU5EMmwyZjlZcng1b1JNRU56NzB3bHlIMzZPWkJtdDBrNTk4L1doMEhEWUxaZW8wZHlTV3JOd3dlWXZTeEU4L01kbTQzWEV1U3pialR6ZnNNMHZVUndGQlNyVUxFYURPMS9JUDJVcjdCc2dId1JJL3hmb3FJbUsxS2twVXEwQWxjVEFpM3YxdTl6Qy9xTGdQd0F5UUl2dzlVQ3NpcnJQQTBZMFlPaFFJREFRQUJNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUURjam9qZEd6L0FJQ2pqTTBaN21ZbGdQNXpic2FRNWRDMmNqZjRESnFta21zV3VmUnBDNHNic3VoODcwY0NCS2N1dmgrb0dpekJRSHJQbTRUaEl2ZklsS0w4WGpMQVhiRnVSUG9IQWcwOHNMWGR2UFRCVE52REYxTWhvcU5zMmo2ZUZxL2ROdXF2ZUJIcjVENXRLblYyWEJHRUhFOVJFOVdUa1pRT2MwaEhtQ3dNbWNZb3JYRzhCa3l1OXFwNXhyMDZMQ0htMnJLcnI2ZENRVldBV0R0MzhiS2t5STRobTVSNTVCclR5UldSdzI1RS9YaFEwVksva1FJYW9GZ0hvaWo0ekg5bmxlZnZMbmhaZDVPRzROL29OS2pBKy9LbkVqaTdPQXhKWVNaR1FmRjU0R1AwQTE4VnF1NVVGaFBKMUZFQXZ5YjR0QnZtTzM1NFFVUys5UTY2agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementIdentityProvider(\"example\",\n    name=\"TestIdp2\",\n    usage=\"managing_administrator_access\",\n    data_receiving=\"manually\",\n    received_identifier=\"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\",\n    login_url=\"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\",\n    base64_certificate=\"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\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementIdentityProvider(\"example\", new()\n    {\n        Name = \"TestIdp2\",\n        Usage = \"managing_administrator_access\",\n        DataReceiving = \"manually\",\n        ReceivedIdentifier = \"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\",\n        LoginUrl = \"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\",\n        Base64Certificate = \"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\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementIdentityProvider(ctx, \"example\", &checkpoint.ManagementIdentityProviderArgs{\n\t\t\tName:               pulumi.String(\"TestIdp2\"),\n\t\t\tUsage:              pulumi.String(\"managing_administrator_access\"),\n\t\t\tDataReceiving:      pulumi.String(\"manually\"),\n\t\t\tReceivedIdentifier: pulumi.String(\"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\"),\n\t\t\tLoginUrl:           pulumi.String(\"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\"),\n\t\t\tBase64Certificate:  pulumi.String(\"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\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIdentityProvider;\nimport com.pulumi.checkpoint.ManagementIdentityProviderArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementIdentityProvider(\"example\", ManagementIdentityProviderArgs.builder()\n            .name(\"TestIdp2\")\n            .usage(\"managing_administrator_access\")\n            .dataReceiving(\"manually\")\n            .receivedIdentifier(\"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\")\n            .loginUrl(\"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\")\n            .base64Certificate(\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM4RENDQWRpZ0F3SUJBZ0lRUTBWZVpLdVBLb0pQUWhaNGhDaWRzREFOQmdrcWhraUc5dzBCQVFzRkFEQTBNVEl3TUFZRFZRUURFeWxOYVdOeWIzTnZablFnUVhwMWNtVWdSbVZrWlhKaGRHVmtJRk5UVHlCRFpYSjBhV1pwWTJGMFpUQWVGdzB4T0RBME1UVXhNVEl6TXpOYUZ3MHlNVEEwTVRVeE1USXpNek5hTURReE1qQXdCZ05WQkFNVEtVMXBZM0p2YzI5bWRDQkJlblZ5WlNCR1pXUmxjbUYwWldRZ1UxTlBJRU5sY25ScFptbGpZWFJsTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUE0VXVqYUd0OFhaODl2dXZ5a3lRVzVYb24vOFIvaVB0ejRhYjBNM3RNVXZHWHozVXh0V1pTRStUR1hydjN3VHRLMCs4RmtNeXVKYUhGSXBLLzRVREZpRk1yQmxzR0Z1dmtTc1p5VjIzZlNGN3paaXlUWTZUN0EwcCtnczUwNVhEOUdBYjlWYmR3R0cwK0tDVnlpc1ZRZ1YySXdKZ2l5aHF3RUNvY3dCcmFuN251SytURU5EMmwyZjlZcng1b1JNRU56NzB3bHlIMzZPWkJtdDBrNTk4L1doMEhEWUxaZW8wZHlTV3JOd3dlWXZTeEU4L01kbTQzWEV1U3pialR6ZnNNMHZVUndGQlNyVUxFYURPMS9JUDJVcjdCc2dId1JJL3hmb3FJbUsxS2twVXEwQWxjVEFpM3YxdTl6Qy9xTGdQd0F5UUl2dzlVQ3NpcnJQQTBZMFlPaFFJREFRQUJNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUURjam9qZEd6L0FJQ2pqTTBaN21ZbGdQNXpic2FRNWRDMmNqZjRESnFta21zV3VmUnBDNHNic3VoODcwY0NCS2N1dmgrb0dpekJRSHJQbTRUaEl2ZklsS0w4WGpMQVhiRnVSUG9IQWcwOHNMWGR2UFRCVE52REYxTWhvcU5zMmo2ZUZxL2ROdXF2ZUJIcjVENXRLblYyWEJHRUhFOVJFOVdUa1pRT2MwaEhtQ3dNbWNZb3JYRzhCa3l1OXFwNXhyMDZMQ0htMnJLcnI2ZENRVldBV0R0MzhiS2t5STRobTVSNTVCclR5UldSdzI1RS9YaFEwVksva1FJYW9GZ0hvaWo0ekg5bmxlZnZMbmhaZDVPRzROL29OS2pBKy9LbkVqaTdPQXhKWVNaR1FmRjU0R1AwQTE4VnF1NVVGaFBKMUZFQXZ5YjR0QnZtTzM1NFFVUys5UTY2agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementIdentityProvider\n    properties:\n      name: TestIdp2\n      usage: managing_administrator_access\n      dataReceiving: manually\n      receivedIdentifier: https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\n      loginUrl: https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\n      base64Certificate: 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\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64 based on provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
        },
        "base64MetadataFile": {
          "type": "string",
          "description": "Metadata file encoded in base64 based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'metadata_file'.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataReceiving": {
          "type": "string",
          "description": "Data receiving method from the SAML Identity Provider.\n"
        },
        "gateway": {
          "type": "string",
          "description": "Gateway for the SAML Identity Provider usage.\nIdentified by name or UID. <font color=\"red\">Required only when</font> 'usage' is set to 'gateway_policy_and_logs'.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "loginUrl": {
          "type": "string",
          "description": "Login URL based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
        },
        "managementIdentityProviderId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "receivedIdentifier": {
          "type": "string",
          "description": "Received Identifier (Entity ID) based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
        },
        "service": {
          "type": "string",
          "description": "Service for the selected gateway. <font color=\"red\">Required only when</font> 'usage' is set to 'gateway_policy_and_logs'.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "usage": {
          "type": "string",
          "description": "Usage of Identity Provider.\n"
        }
      },
      "type": "object",
      "required": [
        "managementIdentityProviderId",
        "name"
      ],
      "inputProperties": {
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64 based on provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
        },
        "base64MetadataFile": {
          "type": "string",
          "description": "Metadata file encoded in base64 based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'metadata_file'.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataReceiving": {
          "type": "string",
          "description": "Data receiving method from the SAML Identity Provider.\n"
        },
        "gateway": {
          "type": "string",
          "description": "Gateway for the SAML Identity Provider usage.\nIdentified by name or UID. <font color=\"red\">Required only when</font> 'usage' is set to 'gateway_policy_and_logs'.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "loginUrl": {
          "type": "string",
          "description": "Login URL based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
        },
        "managementIdentityProviderId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "receivedIdentifier": {
          "type": "string",
          "description": "Received Identifier (Entity ID) based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
        },
        "service": {
          "type": "string",
          "description": "Service for the selected gateway. <font color=\"red\">Required only when</font> 'usage' is set to 'gateway_policy_and_logs'.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "usage": {
          "type": "string",
          "description": "Usage of Identity Provider.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementIdentityProvider resources.\n",
        "properties": {
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64 based on provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
          },
          "base64MetadataFile": {
            "type": "string",
            "description": "Metadata file encoded in base64 based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'metadata_file'.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataReceiving": {
            "type": "string",
            "description": "Data receiving method from the SAML Identity Provider.\n"
          },
          "gateway": {
            "type": "string",
            "description": "Gateway for the SAML Identity Provider usage.\nIdentified by name or UID. <font color=\"red\">Required only when</font> 'usage' is set to 'gateway_policy_and_logs'.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "loginUrl": {
            "type": "string",
            "description": "Login URL based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
          },
          "managementIdentityProviderId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "receivedIdentifier": {
            "type": "string",
            "description": "Received Identifier (Entity ID) based on the provider data. <font color=\"red\">Required only when</font> 'data-receiving' is set to 'manually'.\n"
          },
          "service": {
            "type": "string",
            "description": "Service for the selected gateway. <font color=\"red\">Required only when</font> 'usage' is set to 'gateway_policy_and_logs'.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "usage": {
            "type": "string",
            "description": "Usage of Identity Provider.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementIdentityTag:ManagementIdentityTag": {
      "description": "This resource allows you to execute Check Point Identity Tag.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementIdentityTag(\"example\", {\n    name: \"mytag\",\n    externalIdentifier: \"some external identifier\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementIdentityTag(\"example\",\n    name=\"mytag\",\n    external_identifier=\"some external identifier\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementIdentityTag(\"example\", new()\n    {\n        Name = \"mytag\",\n        ExternalIdentifier = \"some external identifier\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementIdentityTag(ctx, \"example\", &checkpoint.ManagementIdentityTagArgs{\n\t\t\tName:               pulumi.String(\"mytag\"),\n\t\t\tExternalIdentifier: pulumi.String(\"some external identifier\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIdentityTag;\nimport com.pulumi.checkpoint.ManagementIdentityTagArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementIdentityTag(\"example\", ManagementIdentityTagArgs.builder()\n            .name(\"mytag\")\n            .externalIdentifier(\"some external identifier\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementIdentityTag\n    properties:\n      name: mytag\n      externalIdentifier: some external identifier\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "externalIdentifier": {
          "type": "string",
          "description": "External identifier. For example: Cisco ISE security group tag.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIdentityTagId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementIdentityTagId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "externalIdentifier": {
          "type": "string",
          "description": "External identifier. For example: Cisco ISE security group tag.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIdentityTagId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementIdentityTag resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "externalIdentifier": {
            "type": "string",
            "description": "External identifier. For example: Cisco ISE security group tag.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementIdentityTagId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementIdpAdministratorGroup:ManagementIdpAdministratorGroup": {
      "description": "This resource allows you to execute Check Point Idp Administrator Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementIdpAdministratorGroup(\"example\", {\n    name: \"my super group\",\n    groupId: \"it-team\",\n    multiDomainProfile: \"domain super user\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementIdpAdministratorGroup(\"example\",\n    name=\"my super group\",\n    group_id=\"it-team\",\n    multi_domain_profile=\"domain super user\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementIdpAdministratorGroup(\"example\", new()\n    {\n        Name = \"my super group\",\n        GroupId = \"it-team\",\n        MultiDomainProfile = \"domain super user\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementIdpAdministratorGroup(ctx, \"example\", &checkpoint.ManagementIdpAdministratorGroupArgs{\n\t\t\tName:               pulumi.String(\"my super group\"),\n\t\t\tGroupId:            pulumi.String(\"it-team\"),\n\t\t\tMultiDomainProfile: pulumi.String(\"domain super user\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIdpAdministratorGroup;\nimport com.pulumi.checkpoint.ManagementIdpAdministratorGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementIdpAdministratorGroup(\"example\", ManagementIdpAdministratorGroupArgs.builder()\n            .name(\"my super group\")\n            .groupId(\"it-team\")\n            .multiDomainProfile(\"domain super user\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementIdpAdministratorGroup\n    properties:\n      name: my super group\n      groupId: it-team\n      multiDomainProfile: domain super user\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "groupId": {
          "type": "string",
          "description": "Group ID or Name should be set base on the source attribute of 'groups' in the Saml Assertion.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIdpAdministratorGroupId": {
          "type": "string"
        },
        "multiDomainProfile": {
          "type": "string",
          "description": "Administrator multi-domain profile.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "permissionsProfiles": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementIdpAdministratorGroupPermissionsProfile:ManagementIdpAdministratorGroupPermissionsProfile"
          },
          "description": "Administrator permissions profile. Permissions profile should not be provided when multi-domain-profile is set to \"Multi-Domain Super User\" or \"Domain Super User\".permissions_profile blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementIdpAdministratorGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "groupId": {
          "type": "string",
          "description": "Group ID or Name should be set base on the source attribute of 'groups' in the Saml Assertion.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIdpAdministratorGroupId": {
          "type": "string"
        },
        "multiDomainProfile": {
          "type": "string",
          "description": "Administrator multi-domain profile.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "permissionsProfiles": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementIdpAdministratorGroupPermissionsProfile:ManagementIdpAdministratorGroupPermissionsProfile"
          },
          "description": "Administrator permissions profile. Permissions profile should not be provided when multi-domain-profile is set to \"Multi-Domain Super User\" or \"Domain Super User\".permissions_profile blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementIdpAdministratorGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "groupId": {
            "type": "string",
            "description": "Group ID or Name should be set base on the source attribute of 'groups' in the Saml Assertion.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementIdpAdministratorGroupId": {
            "type": "string"
          },
          "multiDomainProfile": {
            "type": "string",
            "description": "Administrator multi-domain profile.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "permissionsProfiles": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementIdpAdministratorGroupPermissionsProfile:ManagementIdpAdministratorGroupPermissionsProfile"
            },
            "description": "Administrator permissions profile. Permissions profile should not be provided when multi-domain-profile is set to \"Multi-Domain Super User\" or \"Domain Super User\".permissions_profile blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementIfMapServer:ManagementIfMapServer": {
      "description": "This resource allows you to execute Check Point If Map Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementIfMapServer(\"example\", {\n    name: \"TestIfMapServer\",\n    host: \"TestHost\",\n    monitoredIps: [{\n        firstIp: \"0.0.0.0\",\n        lastIp: \"0.0.0.0\",\n    }],\n    version: \"2\",\n    port: 1,\n    path: \"path\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementIfMapServer(\"example\",\n    name=\"TestIfMapServer\",\n    host=\"TestHost\",\n    monitored_ips=[{\n        \"first_ip\": \"0.0.0.0\",\n        \"last_ip\": \"0.0.0.0\",\n    }],\n    version=\"2\",\n    port=1,\n    path=\"path\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementIfMapServer(\"example\", new()\n    {\n        Name = \"TestIfMapServer\",\n        Host = \"TestHost\",\n        MonitoredIps = new[]\n        {\n            new Checkpoint.Inputs.ManagementIfMapServerMonitoredIpArgs\n            {\n                FirstIp = \"0.0.0.0\",\n                LastIp = \"0.0.0.0\",\n            },\n        },\n        Version = \"2\",\n        Port = 1,\n        Path = \"path\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementIfMapServer(ctx, \"example\", &checkpoint.ManagementIfMapServerArgs{\n\t\t\tName: pulumi.String(\"TestIfMapServer\"),\n\t\t\tHost: pulumi.String(\"TestHost\"),\n\t\t\tMonitoredIps: checkpoint.ManagementIfMapServerMonitoredIpArray{\n\t\t\t\t&checkpoint.ManagementIfMapServerMonitoredIpArgs{\n\t\t\t\t\tFirstIp: pulumi.String(\"0.0.0.0\"),\n\t\t\t\t\tLastIp:  pulumi.String(\"0.0.0.0\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tVersion: pulumi.String(\"2\"),\n\t\t\tPort:    pulumi.Float64(1),\n\t\t\tPath:    pulumi.String(\"path\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIfMapServer;\nimport com.pulumi.checkpoint.ManagementIfMapServerArgs;\nimport com.pulumi.checkpoint.inputs.ManagementIfMapServerMonitoredIpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementIfMapServer(\"example\", ManagementIfMapServerArgs.builder()\n            .name(\"TestIfMapServer\")\n            .host(\"TestHost\")\n            .monitoredIps(ManagementIfMapServerMonitoredIpArgs.builder()\n                .firstIp(\"0.0.0.0\")\n                .lastIp(\"0.0.0.0\")\n                .build())\n            .version(\"2\")\n            .port(1.0)\n            .path(\"path\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementIfMapServer\n    properties:\n      name: TestIfMapServer\n      host: TestHost\n      monitoredIps:\n        - firstIp: 0.0.0.0\n          lastIp: 0.0.0.0\n      version: '2'\n      port: 1\n      path: path\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "authentication": {
          "$ref": "#/types/checkpoint:index%2FManagementIfMapServerAuthentication:ManagementIfMapServerAuthentication",
          "description": "Authentication configuration for the IF-MAP server. authentication blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "host": {
          "type": "string",
          "description": "Host that is IF-MAP server. Identified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIfMapServerId": {
          "type": "string"
        },
        "monitoredIps": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementIfMapServerMonitoredIp:ManagementIfMapServerMonitoredIp"
          },
          "description": "IP ranges to be monitored by the IF-MAP client.<span pulumi-lang-nodejs=\" monitoredIps \" pulumi-lang-dotnet=\" MonitoredIps \" pulumi-lang-go=\" monitoredIps \" pulumi-lang-python=\" monitored_ips \" pulumi-lang-yaml=\" monitoredIps \" pulumi-lang-java=\" monitoredIps \"> monitored_ips </span>blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "path": {
          "type": "string",
          "description": "N/A\n"
        },
        "port": {
          "type": "number",
          "description": "IF-MAP server port number.\n"
        },
        "queryWholeRanges": {
          "type": "boolean",
          "description": "Indicate whether to query whole ranges instead of single IP.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "IF-MAP version.\n"
        }
      },
      "type": "object",
      "required": [
        "host",
        "managementIfMapServerId",
        "monitoredIps",
        "name"
      ],
      "inputProperties": {
        "authentication": {
          "$ref": "#/types/checkpoint:index%2FManagementIfMapServerAuthentication:ManagementIfMapServerAuthentication",
          "description": "Authentication configuration for the IF-MAP server. authentication blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "host": {
          "type": "string",
          "description": "Host that is IF-MAP server. Identified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIfMapServerId": {
          "type": "string"
        },
        "monitoredIps": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementIfMapServerMonitoredIp:ManagementIfMapServerMonitoredIp"
          },
          "description": "IP ranges to be monitored by the IF-MAP client.<span pulumi-lang-nodejs=\" monitoredIps \" pulumi-lang-dotnet=\" MonitoredIps \" pulumi-lang-go=\" monitoredIps \" pulumi-lang-python=\" monitored_ips \" pulumi-lang-yaml=\" monitoredIps \" pulumi-lang-java=\" monitoredIps \"> monitored_ips </span>blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "path": {
          "type": "string",
          "description": "N/A\n"
        },
        "port": {
          "type": "number",
          "description": "IF-MAP server port number.\n"
        },
        "queryWholeRanges": {
          "type": "boolean",
          "description": "Indicate whether to query whole ranges instead of single IP.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "IF-MAP version.\n"
        }
      },
      "requiredInputs": [
        "host",
        "monitoredIps"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementIfMapServer resources.\n",
        "properties": {
          "authentication": {
            "$ref": "#/types/checkpoint:index%2FManagementIfMapServerAuthentication:ManagementIfMapServerAuthentication",
            "description": "Authentication configuration for the IF-MAP server. authentication blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "host": {
            "type": "string",
            "description": "Host that is IF-MAP server. Identified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementIfMapServerId": {
            "type": "string"
          },
          "monitoredIps": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementIfMapServerMonitoredIp:ManagementIfMapServerMonitoredIp"
            },
            "description": "IP ranges to be monitored by the IF-MAP client.<span pulumi-lang-nodejs=\" monitoredIps \" pulumi-lang-dotnet=\" MonitoredIps \" pulumi-lang-go=\" monitoredIps \" pulumi-lang-python=\" monitored_ips \" pulumi-lang-yaml=\" monitoredIps \" pulumi-lang-java=\" monitoredIps \"> monitored_ips </span>blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "path": {
            "type": "string",
            "description": "N/A\n"
          },
          "port": {
            "type": "number",
            "description": "IF-MAP server port number.\n"
          },
          "queryWholeRanges": {
            "type": "boolean",
            "description": "Indicate whether to query whole ranges instead of single IP.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "version": {
            "type": "string",
            "description": "IF-MAP version.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInstallDatabase:ManagementInstallDatabase": {
      "properties": {
        "managementInstallDatabaseId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Check Point host(s) with one or more Management Software Blades enabled. The targets can be identified by their name or unique identifier.targets blocks are documented below.\n"
        },
        "tasks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of asynchronous task unique identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementInstallDatabaseId",
        "targets",
        "tasks"
      ],
      "inputProperties": {
        "managementInstallDatabaseId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Check Point host(s) with one or more Management Software Blades enabled. The targets can be identified by their name or unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInstallDatabase resources.\n",
        "properties": {
          "managementInstallDatabaseId": {
            "type": "string"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Check Point host(s) with one or more Management Software Blades enabled. The targets can be identified by their name or unique identifier.targets blocks are documented below.\n"
          },
          "tasks": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of asynchronous task unique identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInstallLsmPolicy:ManagementInstallLsmPolicy": {
      "properties": {
        "managementInstallLsmPolicyId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementInstallLsmPolicyId",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "managementInstallLsmPolicyId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInstallLsmPolicy resources.\n",
        "properties": {
          "managementInstallLsmPolicyId": {
            "type": "string"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInstallLsmSettings:ManagementInstallLsmSettings": {
      "properties": {
        "managementInstallLsmSettingsId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementInstallLsmSettingsId",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "managementInstallLsmSettingsId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInstallLsmSettings resources.\n",
        "properties": {
          "managementInstallLsmSettingsId": {
            "type": "string"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInstallPolicy:ManagementInstallPolicy": {
      "properties": {
        "access": {
          "type": "boolean",
          "description": "Set to be true in order to install the Access Control policy. By default, the value is true if Access Control policy is enabled on the input policy package, otherwise false.\n"
        },
        "desktopSecurity": {
          "type": "boolean",
          "description": "Set to be true in order to install the Desktop Security policy. By default, the value is true if desktop security policy is enabled on the input policy package, otherwise false.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Install policy ignoring policy mismatch warnings.\n"
        },
        "installOnAllClusterMembersOrFail": {
          "type": "boolean",
          "description": "Relevant for the gateway clusters. If true, the policy is installed on all the cluster members. If the installation on a cluster member fails, don't install on that cluster.\n"
        },
        "managementInstallPolicyId": {
          "type": "string"
        },
        "policyPackage": {
          "type": "string",
          "description": "The name of the Policy Package to be installed.\n"
        },
        "prepareOnly": {
          "type": "boolean",
          "description": "If true, prepares the policy for the installation, but doesn't install it on an installation target.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "Set to be true in order to install the QoS policy. By default, the value is true if Quality-of-Service policy is enabled on the input policy package, otherwise false.\n"
        },
        "revision": {
          "type": "string",
          "description": "The UID of the revision of the policy to install.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "threatPrevention": {
          "type": "boolean",
          "description": "Set to be true in order to install the Threat Prevention policy. By default, the value is true if Threat Prevention policy is enabled on the input policy package, otherwise false.\n"
        },
        "triggers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Triggers a install-policy if there are any changes to objects in this list.\n"
        }
      },
      "type": "object",
      "required": [
        "managementInstallPolicyId",
        "policyPackage",
        "taskId"
      ],
      "inputProperties": {
        "access": {
          "type": "boolean",
          "description": "Set to be true in order to install the Access Control policy. By default, the value is true if Access Control policy is enabled on the input policy package, otherwise false.\n"
        },
        "desktopSecurity": {
          "type": "boolean",
          "description": "Set to be true in order to install the Desktop Security policy. By default, the value is true if desktop security policy is enabled on the input policy package, otherwise false.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Install policy ignoring policy mismatch warnings.\n"
        },
        "installOnAllClusterMembersOrFail": {
          "type": "boolean",
          "description": "Relevant for the gateway clusters. If true, the policy is installed on all the cluster members. If the installation on a cluster member fails, don't install on that cluster.\n"
        },
        "managementInstallPolicyId": {
          "type": "string"
        },
        "policyPackage": {
          "type": "string",
          "description": "The name of the Policy Package to be installed.\n"
        },
        "prepareOnly": {
          "type": "boolean",
          "description": "If true, prepares the policy for the installation, but doesn't install it on an installation target.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "Set to be true in order to install the QoS policy. By default, the value is true if Quality-of-Service policy is enabled on the input policy package, otherwise false.\n"
        },
        "revision": {
          "type": "string",
          "description": "The UID of the revision of the policy to install.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.\n"
        },
        "threatPrevention": {
          "type": "boolean",
          "description": "Set to be true in order to install the Threat Prevention policy. By default, the value is true if Threat Prevention policy is enabled on the input policy package, otherwise false.\n"
        },
        "triggers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Triggers a install-policy if there are any changes to objects in this list.\n"
        }
      },
      "requiredInputs": [
        "policyPackage"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInstallPolicy resources.\n",
        "properties": {
          "access": {
            "type": "boolean",
            "description": "Set to be true in order to install the Access Control policy. By default, the value is true if Access Control policy is enabled on the input policy package, otherwise false.\n"
          },
          "desktopSecurity": {
            "type": "boolean",
            "description": "Set to be true in order to install the Desktop Security policy. By default, the value is true if desktop security policy is enabled on the input policy package, otherwise false.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Install policy ignoring policy mismatch warnings.\n"
          },
          "installOnAllClusterMembersOrFail": {
            "type": "boolean",
            "description": "Relevant for the gateway clusters. If true, the policy is installed on all the cluster members. If the installation on a cluster member fails, don't install on that cluster.\n"
          },
          "managementInstallPolicyId": {
            "type": "string"
          },
          "policyPackage": {
            "type": "string",
            "description": "The name of the Policy Package to be installed.\n"
          },
          "prepareOnly": {
            "type": "boolean",
            "description": "If true, prepares the policy for the installation, but doesn't install it on an installation target.\n"
          },
          "qos": {
            "type": "boolean",
            "description": "Set to be true in order to install the QoS policy. By default, the value is true if Quality-of-Service policy is enabled on the input policy package, otherwise false.\n"
          },
          "revision": {
            "type": "string",
            "description": "The UID of the revision of the policy to install.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "threatPrevention": {
            "type": "boolean",
            "description": "Set to be true in order to install the Threat Prevention policy. By default, the value is true if Threat Prevention policy is enabled on the input policy package, otherwise false.\n"
          },
          "triggers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Triggers a install-policy if there are any changes to objects in this list.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInstallSoftwarePackage:ManagementInstallSoftwarePackage": {
      "properties": {
        "clusterInstallationSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Installation settings for cluster.cluster_installation_settings blocks are documented below.\n"
        },
        "concurrencyLimit": {
          "type": "number",
          "description": "The number of targets, on which the same package is installed at the same time.\n"
        },
        "managementInstallSoftwarePackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementInstallSoftwarePackageId",
        "name",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "clusterInstallationSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Installation settings for cluster.cluster_installation_settings blocks are documented below.\n"
        },
        "concurrencyLimit": {
          "type": "number",
          "description": "The number of targets, on which the same package is installed at the same time.\n"
        },
        "managementInstallSoftwarePackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInstallSoftwarePackage resources.\n",
        "properties": {
          "clusterInstallationSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Installation settings for cluster.cluster_installation_settings blocks are documented below.\n"
          },
          "concurrencyLimit": {
            "type": "number",
            "description": "The number of targets, on which the same package is installed at the same time.\n"
          },
          "managementInstallSoftwarePackageId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the software package.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInterface:ManagementInterface": {
      "description": "This resource allows you to execute Check Point Interface.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementInterface(\"example\", {\n    name: \"eth0\",\n    ipv4Address: \"1.1.1.111\",\n    ipv4MaskLength: 24,\n    gatewayUid: \"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\",\n    topology: \"internal\",\n    clusterNetworkType: \"cluster\",\n    antiSpoofing: true,\n    ignoreWarnings: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementInterface(\"example\",\n    name=\"eth0\",\n    ipv4_address=\"1.1.1.111\",\n    ipv4_mask_length=24,\n    gateway_uid=\"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\",\n    topology=\"internal\",\n    cluster_network_type=\"cluster\",\n    anti_spoofing=True,\n    ignore_warnings=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementInterface(\"example\", new()\n    {\n        Name = \"eth0\",\n        Ipv4Address = \"1.1.1.111\",\n        Ipv4MaskLength = 24,\n        GatewayUid = \"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\",\n        Topology = \"internal\",\n        ClusterNetworkType = \"cluster\",\n        AntiSpoofing = true,\n        IgnoreWarnings = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementInterface(ctx, \"example\", &checkpoint.ManagementInterfaceArgs{\n\t\t\tName:               pulumi.String(\"eth0\"),\n\t\t\tIpv4Address:        pulumi.String(\"1.1.1.111\"),\n\t\t\tIpv4MaskLength:     pulumi.Float64(24),\n\t\t\tGatewayUid:         pulumi.String(\"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\"),\n\t\t\tTopology:           pulumi.String(\"internal\"),\n\t\t\tClusterNetworkType: pulumi.String(\"cluster\"),\n\t\t\tAntiSpoofing:       pulumi.Bool(true),\n\t\t\tIgnoreWarnings:     pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementInterface;\nimport com.pulumi.checkpoint.ManagementInterfaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementInterface(\"example\", ManagementInterfaceArgs.builder()\n            .name(\"eth0\")\n            .ipv4Address(\"1.1.1.111\")\n            .ipv4MaskLength(24.0)\n            .gatewayUid(\"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\")\n            .topology(\"internal\")\n            .clusterNetworkType(\"cluster\")\n            .antiSpoofing(true)\n            .ignoreWarnings(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementInterface\n    properties:\n      name: eth0\n      ipv4Address: 1.1.1.111\n      ipv4MaskLength: 24\n      gatewayUid: 20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\n      topology: internal\n      clusterNetworkType: cluster\n      antiSpoofing: true\n      ignoreWarnings: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "antiSpoofing": {
          "type": "boolean",
          "description": "Enable anti-spoofing.\n"
        },
        "antiSpoofingSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInterfaceAntiSpoofingSettings:ManagementInterfaceAntiSpoofingSettings",
          "description": "Anti Spoofing Settings.anti_spoofing_settings blocks are documented below.\n"
        },
        "clusterMembers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceClusterMember:ManagementInterfaceClusterMember"
          },
          "description": "Network interface settings for cluster members.cluster_members blocks are documented below.\n"
        },
        "clusterNetworkType": {
          "type": "string",
          "description": "Cluster interface type.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dynamicIp": {
          "type": "boolean",
          "description": "Enable dynamic interface.\n"
        },
        "gatewayUid": {
          "type": "string",
          "description": "Gateway or cluster object uid that the interface belongs to. <font color=\"red\">Required only if</font> name was specified.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv4MaskLength": {
          "type": "number",
          "description": "IPv4 mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network mask.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "number",
          "description": "IPv6 mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network mask.\n"
        },
        "managementInterfaceId": {
          "type": "string"
        },
        "monitoredByCluster": {
          "type": "boolean",
          "description": "When Private is selected as the Cluster interface type, cluster can monitor or not monitor the interface.\n"
        },
        "name": {
          "type": "string",
          "description": "Network interface name.\n"
        },
        "networkInterfaceType": {
          "type": "string",
          "description": "Network Interface Type.\n"
        },
        "securityZoneSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInterfaceSecurityZoneSettings:ManagementInterfaceSecurityZoneSettings",
          "description": "Security Zone Settings.security_zone_settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "Topology configuration.\n"
        },
        "topologyAutomatic": {
          "type": "string",
          "description": "Topology configuration automatically calculated by get-interfaces command.\n"
        },
        "topologyManual": {
          "type": "string",
          "description": "Topology configuration manually defined.\n"
        },
        "topologySettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettings:ManagementInterfaceTopologySettings",
          "description": "Topology Settings.topology_settings blocks are documented below.\n"
        },
        "topologySettingsAutomatics": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettingsAutomatic:ManagementInterfaceTopologySettingsAutomatic"
          },
          "description": "Topology settings automatically calculated by get-interfaces command.\n"
        },
        "topologySettingsManuals": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettingsManual:ManagementInterfaceTopologySettingsManual"
          },
          "description": "Topology settings manually defined.\n"
        }
      },
      "type": "object",
      "required": [
        "gatewayUid",
        "managementInterfaceId",
        "name",
        "topologyAutomatic",
        "topologyManual",
        "topologySettingsAutomatics",
        "topologySettingsManuals"
      ],
      "inputProperties": {
        "antiSpoofing": {
          "type": "boolean",
          "description": "Enable anti-spoofing.\n"
        },
        "antiSpoofingSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInterfaceAntiSpoofingSettings:ManagementInterfaceAntiSpoofingSettings",
          "description": "Anti Spoofing Settings.anti_spoofing_settings blocks are documented below.\n"
        },
        "clusterMembers": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceClusterMember:ManagementInterfaceClusterMember"
          },
          "description": "Network interface settings for cluster members.cluster_members blocks are documented below.\n"
        },
        "clusterNetworkType": {
          "type": "string",
          "description": "Cluster interface type.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dynamicIp": {
          "type": "boolean",
          "description": "Enable dynamic interface.\n"
        },
        "gatewayUid": {
          "type": "string",
          "description": "Gateway or cluster object uid that the interface belongs to. <font color=\"red\">Required only if</font> name was specified.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "ipv4MaskLength": {
          "type": "number",
          "description": "IPv4 mask length.\n"
        },
        "ipv4NetworkMask": {
          "type": "string",
          "description": "IPv4 network mask.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskLength": {
          "type": "number",
          "description": "IPv6 mask length.\n"
        },
        "ipv6NetworkMask": {
          "type": "string",
          "description": "IPv6 network mask.\n"
        },
        "managementInterfaceId": {
          "type": "string"
        },
        "monitoredByCluster": {
          "type": "boolean",
          "description": "When Private is selected as the Cluster interface type, cluster can monitor or not monitor the interface.\n"
        },
        "name": {
          "type": "string",
          "description": "Network interface name.\n"
        },
        "networkInterfaceType": {
          "type": "string",
          "description": "Network Interface Type.\n"
        },
        "securityZoneSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInterfaceSecurityZoneSettings:ManagementInterfaceSecurityZoneSettings",
          "description": "Security Zone Settings.security_zone_settings blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "type": "string",
          "description": "Topology configuration.\n"
        },
        "topologySettings": {
          "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettings:ManagementInterfaceTopologySettings",
          "description": "Topology Settings.topology_settings blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "gatewayUid"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInterface resources.\n",
        "properties": {
          "antiSpoofing": {
            "type": "boolean",
            "description": "Enable anti-spoofing.\n"
          },
          "antiSpoofingSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceAntiSpoofingSettings:ManagementInterfaceAntiSpoofingSettings",
            "description": "Anti Spoofing Settings.anti_spoofing_settings blocks are documented below.\n"
          },
          "clusterMembers": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementInterfaceClusterMember:ManagementInterfaceClusterMember"
            },
            "description": "Network interface settings for cluster members.cluster_members blocks are documented below.\n"
          },
          "clusterNetworkType": {
            "type": "string",
            "description": "Cluster interface type.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dynamicIp": {
            "type": "boolean",
            "description": "Enable dynamic interface.\n"
          },
          "gatewayUid": {
            "type": "string",
            "description": "Gateway or cluster object uid that the interface belongs to. <font color=\"red\">Required only if</font> name was specified.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 network address.\n"
          },
          "ipv4MaskLength": {
            "type": "number",
            "description": "IPv4 mask length.\n"
          },
          "ipv4NetworkMask": {
            "type": "string",
            "description": "IPv4 network mask.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "ipv6MaskLength": {
            "type": "number",
            "description": "IPv6 mask length.\n"
          },
          "ipv6NetworkMask": {
            "type": "string",
            "description": "IPv6 network mask.\n"
          },
          "managementInterfaceId": {
            "type": "string"
          },
          "monitoredByCluster": {
            "type": "boolean",
            "description": "When Private is selected as the Cluster interface type, cluster can monitor or not monitor the interface.\n"
          },
          "name": {
            "type": "string",
            "description": "Network interface name.\n"
          },
          "networkInterfaceType": {
            "type": "string",
            "description": "Network Interface Type.\n"
          },
          "securityZoneSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceSecurityZoneSettings:ManagementInterfaceSecurityZoneSettings",
            "description": "Security Zone Settings.security_zone_settings blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "topology": {
            "type": "string",
            "description": "Topology configuration.\n"
          },
          "topologyAutomatic": {
            "type": "string",
            "description": "Topology configuration automatically calculated by get-interfaces command.\n"
          },
          "topologyManual": {
            "type": "string",
            "description": "Topology configuration manually defined.\n"
          },
          "topologySettings": {
            "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettings:ManagementInterfaceTopologySettings",
            "description": "Topology Settings.topology_settings blocks are documented below.\n"
          },
          "topologySettingsAutomatics": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettingsAutomatic:ManagementInterfaceTopologySettingsAutomatic"
            },
            "description": "Topology settings automatically calculated by get-interfaces command.\n"
          },
          "topologySettingsManuals": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementInterfaceTopologySettingsManual:ManagementInterfaceTopologySettingsManual"
            },
            "description": "Topology settings manually defined.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementInteroperableDevice:ManagementInteroperableDevice": {
      "description": "This resource allows you to execute Check Point Interoperable Device.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementInteroperableDevice(\"example\", {\n    name: \"NewInteroperableDevice\",\n    ipv4Address: \"192.168.1.6\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementInteroperableDevice(\"example\",\n    name=\"NewInteroperableDevice\",\n    ipv4_address=\"192.168.1.6\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementInteroperableDevice(\"example\", new()\n    {\n        Name = \"NewInteroperableDevice\",\n        Ipv4Address = \"192.168.1.6\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementInteroperableDevice(ctx, \"example\", &checkpoint.ManagementInteroperableDeviceArgs{\n\t\t\tName:        pulumi.String(\"NewInteroperableDevice\"),\n\t\t\tIpv4Address: pulumi.String(\"192.168.1.6\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementInteroperableDevice;\nimport com.pulumi.checkpoint.ManagementInteroperableDeviceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementInteroperableDevice(\"example\", ManagementInteroperableDeviceArgs.builder()\n            .name(\"NewInteroperableDevice\")\n            .ipv4Address(\"192.168.1.6\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementInteroperableDevice\n    properties:\n      name: NewInteroperableDevice\n      ipv4Address: 192.168.1.6\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInteroperableDeviceGroup:ManagementInteroperableDeviceGroup"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInteroperableDeviceInterface:ManagementInteroperableDeviceInterface"
          },
          "description": "Network interfaces.interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address of the Interoperable Device.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address of the Interoperable Device.\n"
        },
        "managementInteroperableDeviceId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "vpnSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "VPN domain properties for the Interoperable Device.vpn_settings blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "groups",
        "managementInteroperableDeviceId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementInteroperableDeviceInterface:ManagementInteroperableDeviceInterface"
          },
          "description": "Network interfaces.interfaces blocks are documented below.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address of the Interoperable Device.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address of the Interoperable Device.\n"
        },
        "managementInteroperableDeviceId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "vpnSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "VPN domain properties for the Interoperable Device.vpn_settings blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementInteroperableDevice resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
          },
          "groups": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementInteroperableDeviceGroup:ManagementInteroperableDeviceGroup"
            },
            "description": "Collection of group identifiers.groups blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementInteroperableDeviceInterface:ManagementInteroperableDeviceInterface"
            },
            "description": "Network interfaces.interfaces blocks are documented below.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address of the Interoperable Device.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address of the Interoperable Device.\n"
          },
          "managementInteroperableDeviceId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "vpnSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "VPN domain properties for the Interoperable Device.vpn_settings blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementIseDataCenterServer:ManagementIseDataCenterServer": {
      "description": "This resource allows you to execute Check Point Cisco ISE Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testIse = new checkpoint.ManagementIseDataCenterServer(\"testIse\", {\n    name: \"MyIse\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostnames: [\n        \"host1\",\n        \"host2\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_ise = checkpoint.ManagementIseDataCenterServer(\"testIse\",\n    name=\"MyIse\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostnames=[\n        \"host1\",\n        \"host2\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testIse = new Checkpoint.ManagementIseDataCenterServer(\"testIse\", new()\n    {\n        Name = \"MyIse\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostnames = new[]\n        {\n            \"host1\",\n            \"host2\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementIseDataCenterServer(ctx, \"testIse\", &checkpoint.ManagementIseDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyIse\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tHostnames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"host1\"),\n\t\t\t\tpulumi.String(\"host2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIseDataCenterServer;\nimport com.pulumi.checkpoint.ManagementIseDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testIse = new ManagementIseDataCenterServer(\"testIse\", ManagementIseDataCenterServerArgs.builder()\n            .name(\"MyIse\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostnames(            \n                \"host1\",\n                \"host2\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testIse:\n    type: checkpoint:ManagementIseDataCenterServer\n    properties:\n      name: MyIse\n      username: USERNAME\n      password: PASSWORD\n      hostnames:\n        - host1\n        - host2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostnames": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "IP address or hostname of the Cisco ISE administration Node(s).\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIseDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the ISE administrator.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the ISE administrator encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the ISE administrator.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "hostnames",
        "managementIseDataCenterServerId",
        "name",
        "username"
      ],
      "inputProperties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostnames": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "IP address or hostname of the Cisco ISE administration Node(s).\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementIseDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the ISE administrator.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the ISE administrator encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the ISE administrator.\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "hostnames",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementIseDataCenterServer resources.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string",
            "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hostnames": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "IP address or hostname of the Cisco ISE administration Node(s).\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementIseDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the ISE administrator.\n",
            "secret": true
          },
          "passwordBase64": {
            "type": "string",
            "description": "Password of the ISE administrator encoded in Base64.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          },
          "username": {
            "type": "string",
            "description": "Username of the ISE administrator.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementKeepalive:ManagementKeepalive": {
      "properties": {
        "managementKeepaliveId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementKeepaliveId"
      ],
      "inputProperties": {
        "managementKeepaliveId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementKeepalive resources.\n",
        "properties": {
          "managementKeepaliveId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementKubernetesDataCenterServer:ManagementKubernetesDataCenterServer": {
      "description": "This resource allows you to execute Check Point Kubernetes Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testKubernetes = new checkpoint.ManagementKubernetesDataCenterServer(\"testKubernetes\", {\n    name: \"MyKubernetes\",\n    hostname: \"MY_HOSTNAME\",\n    tokenFile: \"MY_TOKEN\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_kubernetes = checkpoint.ManagementKubernetesDataCenterServer(\"testKubernetes\",\n    name=\"MyKubernetes\",\n    hostname=\"MY_HOSTNAME\",\n    token_file=\"MY_TOKEN\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testKubernetes = new Checkpoint.ManagementKubernetesDataCenterServer(\"testKubernetes\", new()\n    {\n        Name = \"MyKubernetes\",\n        Hostname = \"MY_HOSTNAME\",\n        TokenFile = \"MY_TOKEN\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementKubernetesDataCenterServer(ctx, \"testKubernetes\", &checkpoint.ManagementKubernetesDataCenterServerArgs{\n\t\t\tName:      pulumi.String(\"MyKubernetes\"),\n\t\t\tHostname:  pulumi.String(\"MY_HOSTNAME\"),\n\t\t\tTokenFile: pulumi.String(\"MY_TOKEN\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementKubernetesDataCenterServer;\nimport com.pulumi.checkpoint.ManagementKubernetesDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testKubernetes = new ManagementKubernetesDataCenterServer(\"testKubernetes\", ManagementKubernetesDataCenterServerArgs.builder()\n            .name(\"MyKubernetes\")\n            .hostname(\"MY_HOSTNAME\")\n            .tokenFile(\"MY_TOKEN\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testKubernetes:\n    type: checkpoint:ManagementKubernetesDataCenterServer\n    properties:\n      name: MyKubernetes\n      hostname: MY_HOSTNAME\n      tokenFile: MY_TOKEN\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "caCertificate": {
          "type": "string",
          "description": "The Kubernetes public certificate key encoded in base64.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP address or hostname of the Kubernetes server.\n",
          "secret": true
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementKubernetesDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "tokenFile": {
          "type": "string",
          "description": "Kubernetes access token encoded in base64.\n",
          "secret": true
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        }
      },
      "type": "object",
      "required": [
        "hostname",
        "managementKubernetesDataCenterServerId",
        "name",
        "tokenFile"
      ],
      "inputProperties": {
        "caCertificate": {
          "type": "string",
          "description": "The Kubernetes public certificate key encoded in base64.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP address or hostname of the Kubernetes server.\n",
          "secret": true
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementKubernetesDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "tokenFile": {
          "type": "string",
          "description": "Kubernetes access token encoded in base64.\n",
          "secret": true
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        }
      },
      "requiredInputs": [
        "hostname",
        "tokenFile"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementKubernetesDataCenterServer resources.\n",
        "properties": {
          "caCertificate": {
            "type": "string",
            "description": "The Kubernetes public certificate key encoded in base64.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hostname": {
            "type": "string",
            "description": "IP address or hostname of the Kubernetes server.\n",
            "secret": true
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementKubernetesDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "tokenFile": {
            "type": "string",
            "description": "Kubernetes access token encoded in base64.\n",
            "secret": true
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLdapGroup:ManagementLdapGroup": {
      "description": "This resource allows you to execute Check Point Ldap Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementLdapGroup(\"example\", {\n    name: \"TestLdapGroup\",\n    accountUnit: \"TestLdapAccountUnit\",\n    scope: \"only_sub_tree\",\n    accountUnitBranch: \"OU=Test\",\n    subTreePrefix: \"CA=AC\",\n    groupPrefix: \"N=TestGroup\",\n    applyFilterForDynamicGroup: true,\n    ldapFilter: \"N=AnotherGroup\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementLdapGroup(\"example\",\n    name=\"TestLdapGroup\",\n    account_unit=\"TestLdapAccountUnit\",\n    scope=\"only_sub_tree\",\n    account_unit_branch=\"OU=Test\",\n    sub_tree_prefix=\"CA=AC\",\n    group_prefix=\"N=TestGroup\",\n    apply_filter_for_dynamic_group=True,\n    ldap_filter=\"N=AnotherGroup\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementLdapGroup(\"example\", new()\n    {\n        Name = \"TestLdapGroup\",\n        AccountUnit = \"TestLdapAccountUnit\",\n        Scope = \"only_sub_tree\",\n        AccountUnitBranch = \"OU=Test\",\n        SubTreePrefix = \"CA=AC\",\n        GroupPrefix = \"N=TestGroup\",\n        ApplyFilterForDynamicGroup = true,\n        LdapFilter = \"N=AnotherGroup\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLdapGroup(ctx, \"example\", &checkpoint.ManagementLdapGroupArgs{\n\t\t\tName:                       pulumi.String(\"TestLdapGroup\"),\n\t\t\tAccountUnit:                pulumi.String(\"TestLdapAccountUnit\"),\n\t\t\tScope:                      pulumi.String(\"only_sub_tree\"),\n\t\t\tAccountUnitBranch:          pulumi.String(\"OU=Test\"),\n\t\t\tSubTreePrefix:              pulumi.String(\"CA=AC\"),\n\t\t\tGroupPrefix:                pulumi.String(\"N=TestGroup\"),\n\t\t\tApplyFilterForDynamicGroup: pulumi.Bool(true),\n\t\t\tLdapFilter:                 pulumi.String(\"N=AnotherGroup\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLdapGroup;\nimport com.pulumi.checkpoint.ManagementLdapGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementLdapGroup(\"example\", ManagementLdapGroupArgs.builder()\n            .name(\"TestLdapGroup\")\n            .accountUnit(\"TestLdapAccountUnit\")\n            .scope(\"only_sub_tree\")\n            .accountUnitBranch(\"OU=Test\")\n            .subTreePrefix(\"CA=AC\")\n            .groupPrefix(\"N=TestGroup\")\n            .applyFilterForDynamicGroup(true)\n            .ldapFilter(\"N=AnotherGroup\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementLdapGroup\n    properties:\n      name: TestLdapGroup\n      accountUnit: TestLdapAccountUnit\n      scope: only_sub_tree\n      accountUnitBranch: OU=Test\n      subTreePrefix: CA=AC\n      groupPrefix: N=TestGroup\n      applyFilterForDynamicGroup: true\n      ldapFilter: N=AnotherGroup\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "accountUnit": {
          "type": "string",
          "description": "LDAP account unit of the group. \nIdentified by name or UID.\n"
        },
        "accountUnitBranch": {
          "type": "string",
          "description": "Branch of the selected LDAP Account Unit.\n"
        },
        "applyFilterForDynamicGroup": {
          "type": "boolean",
          "description": "Indicate whether to apply LDAP filter for dynamic group. <font color=\"red\">Relevant only when</font> 'scope' is not set to 'only_group_in_branch'.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "groupPrefix": {
          "type": "string",
          "description": "Group name in the selected branch. <font color=\"red\">Required only when</font> 'scope' is set to 'only_group_in_branch'. Must be in DN syntax.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ldapFilter": {
          "type": "string",
          "description": "LDAP filter for the dynamic group. <font color=\"red\">Relevant only when</font> 'apply-filter-for-dynamic-group' is set to 'true'.\n"
        },
        "managementLdapGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "scope": {
          "type": "string",
          "description": "Group's scope. There are three possible ways of defining a group, based on the users defined on the Account Unit.\n"
        },
        "subTreePrefix": {
          "type": "string",
          "description": "Sub tree prefix of the selected branch. <font color=\"red\">Relevant only when</font> 'scope' is set to 'only_sub_prefix'. Must be in DN syntax.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "accountUnit",
        "managementLdapGroupId",
        "name"
      ],
      "inputProperties": {
        "accountUnit": {
          "type": "string",
          "description": "LDAP account unit of the group. \nIdentified by name or UID.\n"
        },
        "accountUnitBranch": {
          "type": "string",
          "description": "Branch of the selected LDAP Account Unit.\n"
        },
        "applyFilterForDynamicGroup": {
          "type": "boolean",
          "description": "Indicate whether to apply LDAP filter for dynamic group. <font color=\"red\">Relevant only when</font> 'scope' is not set to 'only_group_in_branch'.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "groupPrefix": {
          "type": "string",
          "description": "Group name in the selected branch. <font color=\"red\">Required only when</font> 'scope' is set to 'only_group_in_branch'. Must be in DN syntax.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ldapFilter": {
          "type": "string",
          "description": "LDAP filter for the dynamic group. <font color=\"red\">Relevant only when</font> 'apply-filter-for-dynamic-group' is set to 'true'.\n"
        },
        "managementLdapGroupId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "scope": {
          "type": "string",
          "description": "Group's scope. There are three possible ways of defining a group, based on the users defined on the Account Unit.\n"
        },
        "subTreePrefix": {
          "type": "string",
          "description": "Sub tree prefix of the selected branch. <font color=\"red\">Relevant only when</font> 'scope' is set to 'only_sub_prefix'. Must be in DN syntax.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "accountUnit"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLdapGroup resources.\n",
        "properties": {
          "accountUnit": {
            "type": "string",
            "description": "LDAP account unit of the group. \nIdentified by name or UID.\n"
          },
          "accountUnitBranch": {
            "type": "string",
            "description": "Branch of the selected LDAP Account Unit.\n"
          },
          "applyFilterForDynamicGroup": {
            "type": "boolean",
            "description": "Indicate whether to apply LDAP filter for dynamic group. <font color=\"red\">Relevant only when</font> 'scope' is not set to 'only_group_in_branch'.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "groupPrefix": {
            "type": "string",
            "description": "Group name in the selected branch. <font color=\"red\">Required only when</font> 'scope' is set to 'only_group_in_branch'. Must be in DN syntax.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ldapFilter": {
            "type": "string",
            "description": "LDAP filter for the dynamic group. <font color=\"red\">Relevant only when</font> 'apply-filter-for-dynamic-group' is set to 'true'.\n"
          },
          "managementLdapGroupId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "scope": {
            "type": "string",
            "description": "Group's scope. There are three possible ways of defining a group, based on the users defined on the Account Unit.\n"
          },
          "subTreePrefix": {
            "type": "string",
            "description": "Sub tree prefix of the selected branch. <font color=\"red\">Relevant only when</font> 'scope' is set to 'only_sub_prefix'. Must be in DN syntax.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLimit:ManagementLimit": {
      "description": "This resource allows you to execute Check Point Limit.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementLimit(\"example\", {\n    name: \"limit_obj\",\n    enableDownload: true,\n    downloadUnit: \"Gbps\",\n    downloadRate: 3,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementLimit(\"example\",\n    name=\"limit_obj\",\n    enable_download=True,\n    download_unit=\"Gbps\",\n    download_rate=3)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementLimit(\"example\", new()\n    {\n        Name = \"limit_obj\",\n        EnableDownload = true,\n        DownloadUnit = \"Gbps\",\n        DownloadRate = 3,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLimit(ctx, \"example\", &checkpoint.ManagementLimitArgs{\n\t\t\tName:           pulumi.String(\"limit_obj\"),\n\t\t\tEnableDownload: pulumi.Bool(true),\n\t\t\tDownloadUnit:   pulumi.String(\"Gbps\"),\n\t\t\tDownloadRate:   pulumi.Float64(3),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLimit;\nimport com.pulumi.checkpoint.ManagementLimitArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementLimit(\"example\", ManagementLimitArgs.builder()\n            .name(\"limit_obj\")\n            .enableDownload(true)\n            .downloadUnit(\"Gbps\")\n            .downloadRate(3.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementLimit\n    properties:\n      name: limit_obj\n      enableDownload: true\n      downloadUnit: Gbps\n      downloadRate: 3\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "downloadRate": {
          "type": "number",
          "description": "The Rate for the maximum permitted bandwidth.\n"
        },
        "downloadUnit": {
          "type": "string",
          "description": "The Unit for the maximum permitted bandwidth.\n"
        },
        "enableDownload": {
          "type": "boolean",
          "description": "Enable throughput limit for downloads from the internet to the organization.\n"
        },
        "enableUpload": {
          "type": "boolean",
          "description": "Enable throughput limit for uploads from the organization to the internet.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLimitId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uploadRate": {
          "type": "number",
          "description": "The Rate for the maximum permitted bandwidth.\n"
        },
        "uploadUnit": {
          "type": "string",
          "description": "The Unit for the maximum permitted bandwidth.\n"
        }
      },
      "type": "object",
      "required": [
        "managementLimitId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "downloadRate": {
          "type": "number",
          "description": "The Rate for the maximum permitted bandwidth.\n"
        },
        "downloadUnit": {
          "type": "string",
          "description": "The Unit for the maximum permitted bandwidth.\n"
        },
        "enableDownload": {
          "type": "boolean",
          "description": "Enable throughput limit for downloads from the internet to the organization.\n"
        },
        "enableUpload": {
          "type": "boolean",
          "description": "Enable throughput limit for uploads from the organization to the internet.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLimitId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uploadRate": {
          "type": "number",
          "description": "The Rate for the maximum permitted bandwidth.\n"
        },
        "uploadUnit": {
          "type": "string",
          "description": "The Unit for the maximum permitted bandwidth.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLimit resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "downloadRate": {
            "type": "number",
            "description": "The Rate for the maximum permitted bandwidth.\n"
          },
          "downloadUnit": {
            "type": "string",
            "description": "The Unit for the maximum permitted bandwidth.\n"
          },
          "enableDownload": {
            "type": "boolean",
            "description": "Enable throughput limit for downloads from the internet to the organization.\n"
          },
          "enableUpload": {
            "type": "boolean",
            "description": "Enable throughput limit for uploads from the organization to the internet.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementLimitId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "uploadRate": {
            "type": "number",
            "description": "The Rate for the maximum permitted bandwidth.\n"
          },
          "uploadUnit": {
            "type": "string",
            "description": "The Unit for the maximum permitted bandwidth.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLogExporter:ManagementLogExporter": {
      "description": "This resource allows you to execute Check Point Log Exporter.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementLogExporter(\"example\", {\n    name: \"newLogExporter\",\n    targetServer: \"1.2.3.4\",\n    targetPort: 1234,\n    protocol: \"tcp\",\n    attachments: {\n        addLinkToLogAttachment: true,\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementLogExporter(\"example\",\n    name=\"newLogExporter\",\n    target_server=\"1.2.3.4\",\n    target_port=1234,\n    protocol=\"tcp\",\n    attachments={\n        \"add_link_to_log_attachment\": True,\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementLogExporter(\"example\", new()\n    {\n        Name = \"newLogExporter\",\n        TargetServer = \"1.2.3.4\",\n        TargetPort = 1234,\n        Protocol = \"tcp\",\n        Attachments = new Checkpoint.Inputs.ManagementLogExporterAttachmentsArgs\n        {\n            AddLinkToLogAttachment = true,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLogExporter(ctx, \"example\", &checkpoint.ManagementLogExporterArgs{\n\t\t\tName:         pulumi.String(\"newLogExporter\"),\n\t\t\tTargetServer: pulumi.String(\"1.2.3.4\"),\n\t\t\tTargetPort:   pulumi.Float64(1234),\n\t\t\tProtocol:     pulumi.String(\"tcp\"),\n\t\t\tAttachments: &checkpoint.ManagementLogExporterAttachmentsArgs{\n\t\t\t\tAddLinkToLogAttachment: pulumi.Bool(true),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLogExporter;\nimport com.pulumi.checkpoint.ManagementLogExporterArgs;\nimport com.pulumi.checkpoint.inputs.ManagementLogExporterAttachmentsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementLogExporter(\"example\", ManagementLogExporterArgs.builder()\n            .name(\"newLogExporter\")\n            .targetServer(\"1.2.3.4\")\n            .targetPort(1234.0)\n            .protocol(\"tcp\")\n            .attachments(ManagementLogExporterAttachmentsArgs.builder()\n                .addLinkToLogAttachment(true)\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementLogExporter\n    properties:\n      name: newLogExporter\n      targetServer: 1.2.3.4\n      targetPort: 1234\n      protocol: tcp\n      attachments:\n        addLinkToLogAttachment: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "attachments": {
          "$ref": "#/types/checkpoint:index%2FManagementLogExporterAttachments:ManagementLogExporterAttachments",
          "description": "Log exporter attachments. attachments blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataManipulation": {
          "$ref": "#/types/checkpoint:index%2FManagementLogExporterDataManipulation:ManagementLogExporterDataManipulation",
          "description": "Log exporter data manipulation.<span pulumi-lang-nodejs=\" dataManipulation \" pulumi-lang-dotnet=\" DataManipulation \" pulumi-lang-go=\" dataManipulation \" pulumi-lang-python=\" data_manipulation \" pulumi-lang-yaml=\" dataManipulation \" pulumi-lang-java=\" dataManipulation \"> data_manipulation </span>blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to enable export.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLogExporterId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Protocol used to send logs to the target server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "targetPort": {
          "type": "number",
          "description": "Port number of the target server.\n"
        },
        "targetServer": {
          "type": "string",
          "description": "Target server port to which logs are exported.\n"
        }
      },
      "type": "object",
      "required": [
        "managementLogExporterId",
        "name",
        "targetPort",
        "targetServer"
      ],
      "inputProperties": {
        "attachments": {
          "$ref": "#/types/checkpoint:index%2FManagementLogExporterAttachments:ManagementLogExporterAttachments",
          "description": "Log exporter attachments. attachments blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataManipulation": {
          "$ref": "#/types/checkpoint:index%2FManagementLogExporterDataManipulation:ManagementLogExporterDataManipulation",
          "description": "Log exporter data manipulation.<span pulumi-lang-nodejs=\" dataManipulation \" pulumi-lang-dotnet=\" DataManipulation \" pulumi-lang-go=\" dataManipulation \" pulumi-lang-python=\" data_manipulation \" pulumi-lang-yaml=\" dataManipulation \" pulumi-lang-java=\" dataManipulation \"> data_manipulation </span>blocks are documented below.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to enable export.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLogExporterId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Protocol used to send logs to the target server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "targetPort": {
          "type": "number",
          "description": "Port number of the target server.\n"
        },
        "targetServer": {
          "type": "string",
          "description": "Target server port to which logs are exported.\n"
        }
      },
      "requiredInputs": [
        "targetPort",
        "targetServer"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLogExporter resources.\n",
        "properties": {
          "attachments": {
            "$ref": "#/types/checkpoint:index%2FManagementLogExporterAttachments:ManagementLogExporterAttachments",
            "description": "Log exporter attachments. attachments blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataManipulation": {
            "$ref": "#/types/checkpoint:index%2FManagementLogExporterDataManipulation:ManagementLogExporterDataManipulation",
            "description": "Log exporter data manipulation.<span pulumi-lang-nodejs=\" dataManipulation \" pulumi-lang-dotnet=\" DataManipulation \" pulumi-lang-go=\" dataManipulation \" pulumi-lang-python=\" data_manipulation \" pulumi-lang-yaml=\" dataManipulation \" pulumi-lang-java=\" dataManipulation \"> data_manipulation </span>blocks are documented below.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Indicates whether to enable export.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementLogExporterId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "protocol": {
            "type": "string",
            "description": "Protocol used to send logs to the target server.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "targetPort": {
            "type": "number",
            "description": "Port number of the target server.\n"
          },
          "targetServer": {
            "type": "string",
            "description": "Target server port to which logs are exported.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLogicalServer:ManagementLogicalServer": {
      "description": "This resource allows you to execute Check Point Logical Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementLogicalServer(\"example\", {\n    name: \"logicalServer1\",\n    serverGroup: \"testGroup\",\n    serverType: \"other\",\n    persistenceMode: true,\n    persistencyType: \"by_server\",\n    balanceMethod: \"domain\",\n    ipv4Address: \"1.1.1.1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementLogicalServer(\"example\",\n    name=\"logicalServer1\",\n    server_group=\"testGroup\",\n    server_type=\"other\",\n    persistence_mode=True,\n    persistency_type=\"by_server\",\n    balance_method=\"domain\",\n    ipv4_address=\"1.1.1.1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementLogicalServer(\"example\", new()\n    {\n        Name = \"logicalServer1\",\n        ServerGroup = \"testGroup\",\n        ServerType = \"other\",\n        PersistenceMode = true,\n        PersistencyType = \"by_server\",\n        BalanceMethod = \"domain\",\n        Ipv4Address = \"1.1.1.1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLogicalServer(ctx, \"example\", &checkpoint.ManagementLogicalServerArgs{\n\t\t\tName:            pulumi.String(\"logicalServer1\"),\n\t\t\tServerGroup:     pulumi.String(\"testGroup\"),\n\t\t\tServerType:      pulumi.String(\"other\"),\n\t\t\tPersistenceMode: pulumi.Bool(true),\n\t\t\tPersistencyType: pulumi.String(\"by_server\"),\n\t\t\tBalanceMethod:   pulumi.String(\"domain\"),\n\t\t\tIpv4Address:     pulumi.String(\"1.1.1.1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLogicalServer;\nimport com.pulumi.checkpoint.ManagementLogicalServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementLogicalServer(\"example\", ManagementLogicalServerArgs.builder()\n            .name(\"logicalServer1\")\n            .serverGroup(\"testGroup\")\n            .serverType(\"other\")\n            .persistenceMode(true)\n            .persistencyType(\"by_server\")\n            .balanceMethod(\"domain\")\n            .ipv4Address(\"1.1.1.1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementLogicalServer\n    properties:\n      name: logicalServer1\n      serverGroup: testGroup\n      serverType: other\n      persistenceMode: true\n      persistencyType: by_server\n      balanceMethod: domain\n      ipv4Address: 1.1.1.1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "balanceMethod": {
          "type": "string",
          "description": "Load balancing method for the logical server.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementLogicalServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "persistenceMode": {
          "type": "boolean",
          "description": "Indicates if persistence mode is enabled for the logical server.\n"
        },
        "persistencyType": {
          "type": "string",
          "description": "Persistency type for the logical server.\n"
        },
        "serverGroup": {
          "type": "string",
          "description": "Server group associated with the logical server. \nIdentified by name or UID.\n"
        },
        "serverType": {
          "type": "string",
          "description": "Type of server for the logical server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementLogicalServerId",
        "name"
      ],
      "inputProperties": {
        "balanceMethod": {
          "type": "string",
          "description": "Load balancing method for the logical server.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementLogicalServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "persistenceMode": {
          "type": "boolean",
          "description": "Indicates if persistence mode is enabled for the logical server.\n"
        },
        "persistencyType": {
          "type": "string",
          "description": "Persistency type for the logical server.\n"
        },
        "serverGroup": {
          "type": "string",
          "description": "Server group associated with the logical server. \nIdentified by name or UID.\n"
        },
        "serverType": {
          "type": "string",
          "description": "Type of server for the logical server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLogicalServer resources.\n",
        "properties": {
          "balanceMethod": {
            "type": "string",
            "description": "Load balancing method for the logical server.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "managementLogicalServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "persistenceMode": {
            "type": "boolean",
            "description": "Indicates if persistence mode is enabled for the logical server.\n"
          },
          "persistencyType": {
            "type": "string",
            "description": "Persistency type for the logical server.\n"
          },
          "serverGroup": {
            "type": "string",
            "description": "Server group associated with the logical server. \nIdentified by name or UID.\n"
          },
          "serverType": {
            "type": "string",
            "description": "Type of server for the logical server.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLogin:ManagementLogin": {
      "properties": {
        "continueLastSession": {
          "type": "boolean",
          "description": "When 'continue-last-session' is set to 'True', the new session would continue where the last session was stopped. This option is available when the administrator has only one session that can be continued. If there is more than one session, see 'switch-session' API.\n"
        },
        "domain": {
          "type": "string",
          "description": "Use domain to login to specific domain. Domain can be identified by name or UID.\n"
        },
        "enterLastPublishedSession": {
          "type": "boolean",
          "description": "Login to the last published session. Such login is done with the Read Only permissions.\n"
        },
        "managementLoginId": {
          "type": "string"
        },
        "password": {
          "type": "string",
          "description": "Administrator password.\n",
          "secret": true
        },
        "readOnly": {
          "type": "boolean",
          "description": "Login with Read Only permissions. This parameter is not considered in case continue-last-session is true.\n"
        },
        "sessionComments": {
          "type": "string",
          "description": "Session comments.\n"
        },
        "sessionDescription": {
          "type": "string",
          "description": "Session description.\n"
        },
        "sessionName": {
          "type": "string",
          "description": "Session unique name.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Session expiration timeout in seconds. Default 600 seconds.\n"
        },
        "user": {
          "type": "string",
          "description": "Session unique identifier. Specify it to publish a different session than the one you currently use.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "managementLoginId",
        "password",
        "user"
      ],
      "inputProperties": {
        "continueLastSession": {
          "type": "boolean",
          "description": "When 'continue-last-session' is set to 'True', the new session would continue where the last session was stopped. This option is available when the administrator has only one session that can be continued. If there is more than one session, see 'switch-session' API.\n"
        },
        "domain": {
          "type": "string",
          "description": "Use domain to login to specific domain. Domain can be identified by name or UID.\n"
        },
        "enterLastPublishedSession": {
          "type": "boolean",
          "description": "Login to the last published session. Such login is done with the Read Only permissions.\n"
        },
        "managementLoginId": {
          "type": "string"
        },
        "password": {
          "type": "string",
          "description": "Administrator password.\n",
          "secret": true
        },
        "readOnly": {
          "type": "boolean",
          "description": "Login with Read Only permissions. This parameter is not considered in case continue-last-session is true.\n"
        },
        "sessionComments": {
          "type": "string",
          "description": "Session comments.\n"
        },
        "sessionDescription": {
          "type": "string",
          "description": "Session description.\n"
        },
        "sessionName": {
          "type": "string",
          "description": "Session unique name.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Session expiration timeout in seconds. Default 600 seconds.\n"
        },
        "user": {
          "type": "string",
          "description": "Session unique identifier. Specify it to publish a different session than the one you currently use.\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "password",
        "user"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLogin resources.\n",
        "properties": {
          "continueLastSession": {
            "type": "boolean",
            "description": "When 'continue-last-session' is set to 'True', the new session would continue where the last session was stopped. This option is available when the administrator has only one session that can be continued. If there is more than one session, see 'switch-session' API.\n"
          },
          "domain": {
            "type": "string",
            "description": "Use domain to login to specific domain. Domain can be identified by name or UID.\n"
          },
          "enterLastPublishedSession": {
            "type": "boolean",
            "description": "Login to the last published session. Such login is done with the Read Only permissions.\n"
          },
          "managementLoginId": {
            "type": "string"
          },
          "password": {
            "type": "string",
            "description": "Administrator password.\n",
            "secret": true
          },
          "readOnly": {
            "type": "boolean",
            "description": "Login with Read Only permissions. This parameter is not considered in case continue-last-session is true.\n"
          },
          "sessionComments": {
            "type": "string",
            "description": "Session comments.\n"
          },
          "sessionDescription": {
            "type": "string",
            "description": "Session description.\n"
          },
          "sessionName": {
            "type": "string",
            "description": "Session unique name.\n"
          },
          "sessionTimeout": {
            "type": "number",
            "description": "Session expiration timeout in seconds. Default 600 seconds.\n"
          },
          "user": {
            "type": "string",
            "description": "Session unique identifier. Specify it to publish a different session than the one you currently use.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLogout:ManagementLogout": {
      "properties": {
        "managementLogoutId": {
          "type": "string"
        },
        "triggers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Triggers a logout if there are any changes to objects in this list.\n"
        }
      },
      "type": "object",
      "required": [
        "managementLogoutId"
      ],
      "inputProperties": {
        "managementLogoutId": {
          "type": "string"
        },
        "triggers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Triggers a logout if there are any changes to objects in this list.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLogout resources.\n",
        "properties": {
          "managementLogoutId": {
            "type": "string"
          },
          "triggers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Triggers a logout if there are any changes to objects in this list.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLsmCluster:ManagementLsmCluster": {
      "description": "This resource allows you to execute Check Point Lsm Cluster.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst cluster = new checkpoint.ManagementLsmCluster(\"cluster\", {\n    name: \"Gaia_\",\n    mainIpAddress: \"192.168.8.0\",\n    securityProfile: \"my_security_profile\",\n    interfaces: [{\n        name: \"et0\",\n        ipAddressOverride: \"170.150.0.1\",\n        memberNetworkOverride: \"192.168.8.0\",\n    }],\n    members: [{\n        name: \"Gaia_mem1\",\n        provisioningState: \"off\",\n        provisioningSettings: {\n            provisioningProfile: \"No Provisioning Profile\",\n        },\n    }],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ncluster = checkpoint.ManagementLsmCluster(\"cluster\",\n    name=\"Gaia_\",\n    main_ip_address=\"192.168.8.0\",\n    security_profile=\"my_security_profile\",\n    interfaces=[{\n        \"name\": \"et0\",\n        \"ip_address_override\": \"170.150.0.1\",\n        \"member_network_override\": \"192.168.8.0\",\n    }],\n    members=[{\n        \"name\": \"Gaia_mem1\",\n        \"provisioning_state\": \"off\",\n        \"provisioning_settings\": {\n            \"provisioning_profile\": \"No Provisioning Profile\",\n        },\n    }])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var cluster = new Checkpoint.ManagementLsmCluster(\"cluster\", new()\n    {\n        Name = \"Gaia_\",\n        MainIpAddress = \"192.168.8.0\",\n        SecurityProfile = \"my_security_profile\",\n        Interfaces = new[]\n        {\n            new Checkpoint.Inputs.ManagementLsmClusterInterfaceArgs\n            {\n                Name = \"et0\",\n                IpAddressOverride = \"170.150.0.1\",\n                MemberNetworkOverride = \"192.168.8.0\",\n            },\n        },\n        Members = new[]\n        {\n            new Checkpoint.Inputs.ManagementLsmClusterMemberArgs\n            {\n                Name = \"Gaia_mem1\",\n                ProvisioningState = \"off\",\n                ProvisioningSettings = new Checkpoint.Inputs.ManagementLsmClusterMemberProvisioningSettingsArgs\n                {\n                    ProvisioningProfile = \"No Provisioning Profile\",\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLsmCluster(ctx, \"cluster\", &checkpoint.ManagementLsmClusterArgs{\n\t\t\tName:            pulumi.String(\"Gaia_\"),\n\t\t\tMainIpAddress:   pulumi.String(\"192.168.8.0\"),\n\t\t\tSecurityProfile: pulumi.String(\"my_security_profile\"),\n\t\t\tInterfaces: checkpoint.ManagementLsmClusterInterfaceArray{\n\t\t\t\t&checkpoint.ManagementLsmClusterInterfaceArgs{\n\t\t\t\t\tName:                  pulumi.String(\"et0\"),\n\t\t\t\t\tIpAddressOverride:     pulumi.String(\"170.150.0.1\"),\n\t\t\t\t\tMemberNetworkOverride: pulumi.String(\"192.168.8.0\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tMembers: checkpoint.ManagementLsmClusterMemberArray{\n\t\t\t\t&checkpoint.ManagementLsmClusterMemberArgs{\n\t\t\t\t\tName:              pulumi.String(\"Gaia_mem1\"),\n\t\t\t\t\tProvisioningState: pulumi.String(\"off\"),\n\t\t\t\t\tProvisioningSettings: &checkpoint.ManagementLsmClusterMemberProvisioningSettingsArgs{\n\t\t\t\t\t\tProvisioningProfile: pulumi.String(\"No Provisioning Profile\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLsmCluster;\nimport com.pulumi.checkpoint.ManagementLsmClusterArgs;\nimport com.pulumi.checkpoint.inputs.ManagementLsmClusterInterfaceArgs;\nimport com.pulumi.checkpoint.inputs.ManagementLsmClusterMemberArgs;\nimport com.pulumi.checkpoint.inputs.ManagementLsmClusterMemberProvisioningSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var cluster = new ManagementLsmCluster(\"cluster\", ManagementLsmClusterArgs.builder()\n            .name(\"Gaia_\")\n            .mainIpAddress(\"192.168.8.0\")\n            .securityProfile(\"my_security_profile\")\n            .interfaces(ManagementLsmClusterInterfaceArgs.builder()\n                .name(\"et0\")\n                .ipAddressOverride(\"170.150.0.1\")\n                .memberNetworkOverride(\"192.168.8.0\")\n                .build())\n            .members(ManagementLsmClusterMemberArgs.builder()\n                .name(\"Gaia_mem1\")\n                .provisioningState(\"off\")\n                .provisioningSettings(ManagementLsmClusterMemberProvisioningSettingsArgs.builder()\n                    .provisioningProfile(\"No Provisioning Profile\")\n                    .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  cluster:\n    type: checkpoint:ManagementLsmCluster\n    properties:\n      name: Gaia_\n      mainIpAddress: 192.168.8.0\n      securityProfile: my_security_profile\n      interfaces:\n        - name: et0\n          ipAddressOverride: 170.150.0.1\n          memberNetworkOverride: 192.168.8.0\n      members:\n        - name: Gaia_mem1\n          provisioningState: off\n          provisioningSettings:\n            provisioningProfile: No Provisioning Profile\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dynamicObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterDynamicObject:ManagementLsmClusterDynamicObject"
          },
          "description": "Dynamic Objects.dynamic_objects blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterInterface:ManagementLsmClusterInterface"
          },
          "description": "Interfaces.interfaces blocks are documented below.\n"
        },
        "mainIpAddress": {
          "type": "string",
          "description": "Main IP address.\n"
        },
        "managementLsmClusterId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterMember:ManagementLsmClusterMember"
          },
          "description": "Cluster members.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "osName": {
          "type": "string",
          "description": "Device platform operating system."
        },
        "securityProfile": {
          "type": "string",
          "description": "LSM profile.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmClusterTopology:ManagementLsmClusterTopology",
          "description": "Topology.topology blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Device platform version."
        }
      },
      "type": "object",
      "required": [
        "mainIpAddress",
        "managementLsmClusterId",
        "name",
        "osName",
        "securityProfile",
        "version"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dynamicObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterDynamicObject:ManagementLsmClusterDynamicObject"
          },
          "description": "Dynamic Objects.dynamic_objects blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterInterface:ManagementLsmClusterInterface"
          },
          "description": "Interfaces.interfaces blocks are documented below.\n"
        },
        "mainIpAddress": {
          "type": "string",
          "description": "Main IP address.\n"
        },
        "managementLsmClusterId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterMember:ManagementLsmClusterMember"
          },
          "description": "Cluster members.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "securityProfile": {
          "type": "string",
          "description": "LSM profile.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmClusterTopology:ManagementLsmClusterTopology",
          "description": "Topology.topology blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "mainIpAddress",
        "securityProfile"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLsmCluster resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dynamicObjects": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementLsmClusterDynamicObject:ManagementLsmClusterDynamicObject"
            },
            "description": "Dynamic Objects.dynamic_objects blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementLsmClusterInterface:ManagementLsmClusterInterface"
            },
            "description": "Interfaces.interfaces blocks are documented below.\n"
          },
          "mainIpAddress": {
            "type": "string",
            "description": "Main IP address.\n"
          },
          "managementLsmClusterId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementLsmClusterMember:ManagementLsmClusterMember"
            },
            "description": "Cluster members.members blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "osName": {
            "type": "string",
            "description": "Device platform operating system."
          },
          "securityProfile": {
            "type": "string",
            "description": "LSM profile.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "topology": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmClusterTopology:ManagementLsmClusterTopology",
            "description": "Topology.topology blocks are documented below.\n"
          },
          "version": {
            "type": "string",
            "description": "Device platform version."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLsmGateway:ManagementLsmGateway": {
      "description": "This resource allows you to execute Check Point Lsm Gateway.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst lsmGw = new checkpoint.ManagementLsmGateway(\"lsm_gw\", {\n    name: \"lsm_gateway\",\n    securityProfile: \"lsm_profile\",\n    provisioningState: \"using-profile\",\n    provisioningSettings: {\n        provisioning_profile: \"my_proviosioning_profile\",\n    },\n    topology: {\n        vpnDomain: \"manual\",\n        manualVpnDomains: [{\n            comments: \"domain1\",\n            fromIpv4Address: \"192.168.10.0\",\n            toIpv4Address: \"192.168.10.255\",\n        }],\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nlsm_gw = checkpoint.ManagementLsmGateway(\"lsm_gw\",\n    name=\"lsm_gateway\",\n    security_profile=\"lsm_profile\",\n    provisioning_state=\"using-profile\",\n    provisioning_settings={\n        \"provisioning_profile\": \"my_proviosioning_profile\",\n    },\n    topology={\n        \"vpn_domain\": \"manual\",\n        \"manual_vpn_domains\": [{\n            \"comments\": \"domain1\",\n            \"from_ipv4_address\": \"192.168.10.0\",\n            \"to_ipv4_address\": \"192.168.10.255\",\n        }],\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var lsmGw = new Checkpoint.ManagementLsmGateway(\"lsm_gw\", new()\n    {\n        Name = \"lsm_gateway\",\n        SecurityProfile = \"lsm_profile\",\n        ProvisioningState = \"using-profile\",\n        ProvisioningSettings = \n        {\n            { \"provisioning_profile\", \"my_proviosioning_profile\" },\n        },\n        Topology = new Checkpoint.Inputs.ManagementLsmGatewayTopologyArgs\n        {\n            VpnDomain = \"manual\",\n            ManualVpnDomains = new[]\n            {\n                new Checkpoint.Inputs.ManagementLsmGatewayTopologyManualVpnDomainArgs\n                {\n                    Comments = \"domain1\",\n                    FromIpv4Address = \"192.168.10.0\",\n                    ToIpv4Address = \"192.168.10.255\",\n                },\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLsmGateway(ctx, \"lsm_gw\", &checkpoint.ManagementLsmGatewayArgs{\n\t\t\tName:              pulumi.String(\"lsm_gateway\"),\n\t\t\tSecurityProfile:   pulumi.String(\"lsm_profile\"),\n\t\t\tProvisioningState: pulumi.String(\"using-profile\"),\n\t\t\tProvisioningSettings: pulumi.StringMap{\n\t\t\t\t\"provisioning_profile\": pulumi.String(\"my_proviosioning_profile\"),\n\t\t\t},\n\t\t\tTopology: &checkpoint.ManagementLsmGatewayTopologyArgs{\n\t\t\t\tVpnDomain: pulumi.String(\"manual\"),\n\t\t\t\tManualVpnDomains: checkpoint.ManagementLsmGatewayTopologyManualVpnDomainArray{\n\t\t\t\t\t&checkpoint.ManagementLsmGatewayTopologyManualVpnDomainArgs{\n\t\t\t\t\t\tComments:        pulumi.String(\"domain1\"),\n\t\t\t\t\t\tFromIpv4Address: pulumi.String(\"192.168.10.0\"),\n\t\t\t\t\t\tToIpv4Address:   pulumi.String(\"192.168.10.255\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLsmGateway;\nimport com.pulumi.checkpoint.ManagementLsmGatewayArgs;\nimport com.pulumi.checkpoint.inputs.ManagementLsmGatewayTopologyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var lsmGw = new ManagementLsmGateway(\"lsmGw\", ManagementLsmGatewayArgs.builder()\n            .name(\"lsm_gateway\")\n            .securityProfile(\"lsm_profile\")\n            .provisioningState(\"using-profile\")\n            .provisioningSettings(Map.of(\"provisioning_profile\", \"my_proviosioning_profile\"))\n            .topology(ManagementLsmGatewayTopologyArgs.builder()\n                .vpnDomain(\"manual\")\n                .manualVpnDomains(ManagementLsmGatewayTopologyManualVpnDomainArgs.builder()\n                    .comments(\"domain1\")\n                    .fromIpv4Address(\"192.168.10.0\")\n                    .toIpv4Address(\"192.168.10.255\")\n                    .build())\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  lsmGw:\n    type: checkpoint:ManagementLsmGateway\n    name: lsm_gw\n    properties:\n      name: lsm_gateway\n      securityProfile: lsm_profile\n      provisioningState: using-profile\n      provisioningSettings:\n        provisioning_profile: my_proviosioning_profile\n      topology:\n        vpnDomain: manual\n        manualVpnDomains:\n          - comments: domain1\n            fromIpv4Address: 192.168.10.0\n            toIpv4Address: 192.168.10.255\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "deviceId": {
          "type": "string",
          "description": "Device ID.\n"
        },
        "dynamicObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayDynamicObject:ManagementLsmGatewayDynamicObject"
          },
          "description": "Dynamic Objects.dynamic_objects blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipAddress": {
          "type": "string",
          "description": "IP address"
        },
        "managementLsmGatewayId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "osName": {
          "type": "string",
          "description": "Device platform operating system."
        },
        "provisioningSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Provisioning settings.provisioning_settings blocks are documented below.\n"
        },
        "provisioningState": {
          "type": "string",
          "description": "Provisioning state. By default the state is 'manual'- enable provisioning but not attach to profile.\nIf 'using-profile' state is provided a provisioning profile must be provided in provisioning-settings.\n"
        },
        "securityProfile": {
          "type": "string",
          "description": "LSM profile.\n"
        },
        "sic": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Secure Internal Communication.sic blocks are documented below.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Secure Internal Communication name."
        },
        "sicState": {
          "type": "string",
          "description": "Secure Internal Communication state."
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayTopology:ManagementLsmGatewayTopology",
          "description": "Topology.topology blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Device platform version.\n"
        }
      },
      "type": "object",
      "required": [
        "ipAddress",
        "managementLsmGatewayId",
        "name",
        "osName",
        "securityProfile",
        "sicName",
        "sicState"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "deviceId": {
          "type": "string",
          "description": "Device ID.\n"
        },
        "dynamicObjects": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayDynamicObject:ManagementLsmGatewayDynamicObject"
          },
          "description": "Dynamic Objects.dynamic_objects blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLsmGatewayId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "provisioningSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Provisioning settings.provisioning_settings blocks are documented below.\n"
        },
        "provisioningState": {
          "type": "string",
          "description": "Provisioning state. By default the state is 'manual'- enable provisioning but not attach to profile.\nIf 'using-profile' state is provided a provisioning profile must be provided in provisioning-settings.\n"
        },
        "securityProfile": {
          "type": "string",
          "description": "LSM profile.\n"
        },
        "sic": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Secure Internal Communication.sic blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "topology": {
          "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayTopology:ManagementLsmGatewayTopology",
          "description": "Topology.topology blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Device platform version.\n"
        }
      },
      "requiredInputs": [
        "securityProfile"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLsmGateway resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "deviceId": {
            "type": "string",
            "description": "Device ID.\n"
          },
          "dynamicObjects": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayDynamicObject:ManagementLsmGatewayDynamicObject"
            },
            "description": "Dynamic Objects.dynamic_objects blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipAddress": {
            "type": "string",
            "description": "IP address"
          },
          "managementLsmGatewayId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "osName": {
            "type": "string",
            "description": "Device platform operating system."
          },
          "provisioningSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Provisioning settings.provisioning_settings blocks are documented below.\n"
          },
          "provisioningState": {
            "type": "string",
            "description": "Provisioning state. By default the state is 'manual'- enable provisioning but not attach to profile.\nIf 'using-profile' state is provided a provisioning profile must be provided in provisioning-settings.\n"
          },
          "securityProfile": {
            "type": "string",
            "description": "LSM profile.\n"
          },
          "sic": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Secure Internal Communication.sic blocks are documented below.\n"
          },
          "sicName": {
            "type": "string",
            "description": "Secure Internal Communication name."
          },
          "sicState": {
            "type": "string",
            "description": "Secure Internal Communication state."
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "topology": {
            "$ref": "#/types/checkpoint:index%2FManagementLsmGatewayTopology:ManagementLsmGatewayTopology",
            "description": "Topology.topology blocks are documented below.\n"
          },
          "version": {
            "type": "string",
            "description": "Device platform version.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLsmRunScript:ManagementLsmRunScript": {
      "properties": {
        "managementLsmRunScriptId": {
          "type": "string"
        },
        "script": {
          "type": "string",
          "description": "The entire content of the script.\n"
        },
        "scriptBase64": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementLsmRunScriptId",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "managementLsmRunScriptId": {
          "type": "string"
        },
        "script": {
          "type": "string",
          "description": "The entire content of the script.\n"
        },
        "scriptBase64": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLsmRunScript resources.\n",
        "properties": {
          "managementLsmRunScriptId": {
            "type": "string"
          },
          "script": {
            "type": "string",
            "description": "The entire content of the script.\n"
          },
          "scriptBase64": {
            "type": "string",
            "description": "The entire content of the script encoded in Base64.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementLsvProfile:ManagementLsvProfile": {
      "description": "This resource allows you to add/update/delete Check Point Lsv Profile.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementLsvProfile(\"example\", {\n    name: \"Lsv profile\",\n    certificateAuthority: \"internal_ca\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementLsvProfile(\"example\",\n    name=\"Lsv profile\",\n    certificate_authority=\"internal_ca\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementLsvProfile(\"example\", new()\n    {\n        Name = \"Lsv profile\",\n        CertificateAuthority = \"internal_ca\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementLsvProfile(ctx, \"example\", &checkpoint.ManagementLsvProfileArgs{\n\t\t\tName:                 pulumi.String(\"Lsv profile\"),\n\t\t\tCertificateAuthority: pulumi.String(\"internal_ca\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLsvProfile;\nimport com.pulumi.checkpoint.ManagementLsvProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementLsvProfile(\"example\", ManagementLsvProfileArgs.builder()\n            .name(\"Lsv profile\")\n            .certificateAuthority(\"internal_ca\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementLsvProfile\n    properties:\n      name: Lsv profile\n      certificateAuthority: internal_ca\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowedIpAddresses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of network objects identified by name or UID that represent IP addresses allowed in profile's VPN domain.\n"
        },
        "certificateAuthority": {
          "type": "string",
          "description": "Trusted Certificate authority for establishing trust between VPN peers, identified by name or UID.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLsvProfileId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "restrictAllowedAddresses": {
          "type": "boolean",
          "description": "Indicate whether the IP addresses allowed in the VPN Domain will be restricted or not, according to allowed-ip-addresses field.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "vpnDomain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "peers' VPN Domain properties.<span pulumi-lang-nodejs=\" vpnDomain \" pulumi-lang-dotnet=\" VpnDomain \" pulumi-lang-go=\" vpnDomain \" pulumi-lang-python=\" vpn_domain \" pulumi-lang-yaml=\" vpnDomain \" pulumi-lang-java=\" vpnDomain \"> vpn_domain </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "certificateAuthority",
        "managementLsvProfileId",
        "name"
      ],
      "inputProperties": {
        "allowedIpAddresses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of network objects identified by name or UID that represent IP addresses allowed in profile's VPN domain.\n"
        },
        "certificateAuthority": {
          "type": "string",
          "description": "Trusted Certificate authority for establishing trust between VPN peers, identified by name or UID.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementLsvProfileId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "restrictAllowedAddresses": {
          "type": "boolean",
          "description": "Indicate whether the IP addresses allowed in the VPN Domain will be restricted or not, according to allowed-ip-addresses field.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "vpnDomain": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "peers' VPN Domain properties.<span pulumi-lang-nodejs=\" vpnDomain \" pulumi-lang-dotnet=\" VpnDomain \" pulumi-lang-go=\" vpnDomain \" pulumi-lang-python=\" vpn_domain \" pulumi-lang-yaml=\" vpnDomain \" pulumi-lang-java=\" vpnDomain \"> vpn_domain </span>blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "certificateAuthority"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementLsvProfile resources.\n",
        "properties": {
          "allowedIpAddresses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of network objects identified by name or UID that represent IP addresses allowed in profile's VPN domain.\n"
          },
          "certificateAuthority": {
            "type": "string",
            "description": "Trusted Certificate authority for establishing trust between VPN peers, identified by name or UID.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementLsvProfileId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "restrictAllowedAddresses": {
            "type": "boolean",
            "description": "Indicate whether the IP addresses allowed in the VPN Domain will be restricted or not, according to allowed-ip-addresses field.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "vpnDomain": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "peers' VPN Domain properties.<span pulumi-lang-nodejs=\" vpnDomain \" pulumi-lang-dotnet=\" VpnDomain \" pulumi-lang-go=\" vpnDomain \" pulumi-lang-python=\" vpn_domain \" pulumi-lang-yaml=\" vpnDomain \" pulumi-lang-java=\" vpnDomain \"> vpn_domain </span>blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMdPermissionsProfile:ManagementMdPermissionsProfile": {
      "description": "This resource allows you to execute Check Point Md Permissions Profile.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMdPermissionsProfile(\"example\", {name: \"manager profile\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMdPermissionsProfile(\"example\", name=\"manager profile\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMdPermissionsProfile(\"example\", new()\n    {\n        Name = \"manager profile\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMdPermissionsProfile(ctx, \"example\", &checkpoint.ManagementMdPermissionsProfileArgs{\n\t\t\tName: pulumi.String(\"manager profile\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMdPermissionsProfile;\nimport com.pulumi.checkpoint.ManagementMdPermissionsProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMdPermissionsProfile(\"example\", ManagementMdPermissionsProfileArgs.builder()\n            .name(\"manager profile\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMdPermissionsProfile\n    properties:\n      name: manager profile\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "cmeOperations": {
          "type": "string",
          "description": "Permission to read / edit the Cloud Management Extension (CME) configuration.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "defaultProfileGlobalDomains": {
          "type": "string",
          "description": "Name or UID of the required default profile for all global domains.\n"
        },
        "defaultProfileLocalDomains": {
          "type": "string",
          "description": "Name or UID of the required default profile for all local domains.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "enableDefaultProfileForGlobalDomains": {
          "type": "boolean",
          "description": "Enable the option to specify a default profile for all global domains.\n"
        },
        "enableDefaultProfileForLocalDomains": {
          "type": "boolean",
          "description": "Enable the option to specify a default profile for all local domains.\n"
        },
        "globalVpnManagement": {
          "type": "boolean",
          "description": "Lets the administrator select Enable global use for a Security Gateway shown in the MDS Gateways & Servers view.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "manageAdmins": {
          "type": "boolean",
          "description": "Create and manage Multi-Domain Security Management administrators with the same or lower permission level. For example, a Domain manager cannot create Superusers or global managers.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
        },
        "manageGlobalAssignments": {
          "type": "boolean",
          "description": "Controls the ability to create, edit and delete global assignment and not the ability to reassign, which is set according to the specific Domain's permission profile.\n"
        },
        "manageSessions": {
          "type": "boolean",
          "description": "Connect/disconnect Domain sessions, publish changes, and delete other administrator sessions.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
        },
        "managementApiLogin": {
          "type": "boolean",
          "description": "Permission to log in to the Security Management Server and run API commands using these tools:<span pulumi-lang-nodejs=\" mgmtCli \" pulumi-lang-dotnet=\" MgmtCli \" pulumi-lang-go=\" mgmtCli \" pulumi-lang-python=\" mgmt_cli \" pulumi-lang-yaml=\" mgmtCli \" pulumi-lang-java=\" mgmtCli \"> mgmt_cli </span>(Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.<br>Note: This permission is not required to run commands from within the API terminal in SmartConsole.\n"
        },
        "managementMdPermissionsProfileId": {
          "type": "string"
        },
        "mdsProvisioning": {
          "type": "boolean",
          "description": "Create and manage Multi-Domain Servers and Multi-Domain Log Servers.<br>Only a \"Super User\" permission-level profile can select this option.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "permissionLevel": {
          "type": "string",
          "description": "The level of the Multi Domain Permissions Profile.<br>The level cannot be changed after creation.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "viewGlobalObjectsInDomain": {
          "type": "boolean",
          "description": "Lets an administrator with no global objects permissions view the global objects in the domain. This option is required for valid domain management.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMdPermissionsProfileId",
        "name"
      ],
      "inputProperties": {
        "cmeOperations": {
          "type": "string",
          "description": "Permission to read / edit the Cloud Management Extension (CME) configuration.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "defaultProfileGlobalDomains": {
          "type": "string",
          "description": "Name or UID of the required default profile for all global domains.\n"
        },
        "defaultProfileLocalDomains": {
          "type": "string",
          "description": "Name or UID of the required default profile for all local domains.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "enableDefaultProfileForGlobalDomains": {
          "type": "boolean",
          "description": "Enable the option to specify a default profile for all global domains.\n"
        },
        "enableDefaultProfileForLocalDomains": {
          "type": "boolean",
          "description": "Enable the option to specify a default profile for all local domains.\n"
        },
        "globalVpnManagement": {
          "type": "boolean",
          "description": "Lets the administrator select Enable global use for a Security Gateway shown in the MDS Gateways & Servers view.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "manageAdmins": {
          "type": "boolean",
          "description": "Create and manage Multi-Domain Security Management administrators with the same or lower permission level. For example, a Domain manager cannot create Superusers or global managers.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
        },
        "manageGlobalAssignments": {
          "type": "boolean",
          "description": "Controls the ability to create, edit and delete global assignment and not the ability to reassign, which is set according to the specific Domain's permission profile.\n"
        },
        "manageSessions": {
          "type": "boolean",
          "description": "Connect/disconnect Domain sessions, publish changes, and delete other administrator sessions.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
        },
        "managementApiLogin": {
          "type": "boolean",
          "description": "Permission to log in to the Security Management Server and run API commands using these tools:<span pulumi-lang-nodejs=\" mgmtCli \" pulumi-lang-dotnet=\" MgmtCli \" pulumi-lang-go=\" mgmtCli \" pulumi-lang-python=\" mgmt_cli \" pulumi-lang-yaml=\" mgmtCli \" pulumi-lang-java=\" mgmtCli \"> mgmt_cli </span>(Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.<br>Note: This permission is not required to run commands from within the API terminal in SmartConsole.\n"
        },
        "managementMdPermissionsProfileId": {
          "type": "string"
        },
        "mdsProvisioning": {
          "type": "boolean",
          "description": "Create and manage Multi-Domain Servers and Multi-Domain Log Servers.<br>Only a \"Super User\" permission-level profile can select this option.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "permissionLevel": {
          "type": "string",
          "description": "The level of the Multi Domain Permissions Profile.<br>The level cannot be changed after creation.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "viewGlobalObjectsInDomain": {
          "type": "boolean",
          "description": "Lets an administrator with no global objects permissions view the global objects in the domain. This option is required for valid domain management.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMdPermissionsProfile resources.\n",
        "properties": {
          "cmeOperations": {
            "type": "string",
            "description": "Permission to read / edit the Cloud Management Extension (CME) configuration.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "defaultProfileGlobalDomains": {
            "type": "string",
            "description": "Name or UID of the required default profile for all global domains.\n"
          },
          "defaultProfileLocalDomains": {
            "type": "string",
            "description": "Name or UID of the required default profile for all local domains.\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
          },
          "enableDefaultProfileForGlobalDomains": {
            "type": "boolean",
            "description": "Enable the option to specify a default profile for all global domains.\n"
          },
          "enableDefaultProfileForLocalDomains": {
            "type": "boolean",
            "description": "Enable the option to specify a default profile for all local domains.\n"
          },
          "globalVpnManagement": {
            "type": "boolean",
            "description": "Lets the administrator select Enable global use for a Security Gateway shown in the MDS Gateways & Servers view.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "manageAdmins": {
            "type": "boolean",
            "description": "Create and manage Multi-Domain Security Management administrators with the same or lower permission level. For example, a Domain manager cannot create Superusers or global managers.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
          },
          "manageGlobalAssignments": {
            "type": "boolean",
            "description": "Controls the ability to create, edit and delete global assignment and not the ability to reassign, which is set according to the specific Domain's permission profile.\n"
          },
          "manageSessions": {
            "type": "boolean",
            "description": "Connect/disconnect Domain sessions, publish changes, and delete other administrator sessions.<br>Only a 'Manager' permission-level profile can edit this permission.\n"
          },
          "managementApiLogin": {
            "type": "boolean",
            "description": "Permission to log in to the Security Management Server and run API commands using these tools:<span pulumi-lang-nodejs=\" mgmtCli \" pulumi-lang-dotnet=\" MgmtCli \" pulumi-lang-go=\" mgmtCli \" pulumi-lang-python=\" mgmt_cli \" pulumi-lang-yaml=\" mgmtCli \" pulumi-lang-java=\" mgmtCli \"> mgmt_cli </span>(Linux and Windows binaries), Gaia CLI (clish) and Web Services (REST). Useful if you want to prevent administrators from running automatic scripts on the Management.<br>Note: This permission is not required to run commands from within the API terminal in SmartConsole.\n"
          },
          "managementMdPermissionsProfileId": {
            "type": "string"
          },
          "mdsProvisioning": {
            "type": "boolean",
            "description": "Create and manage Multi-Domain Servers and Multi-Domain Log Servers.<br>Only a \"Super User\" permission-level profile can select this option.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "permissionLevel": {
            "type": "string",
            "description": "The level of the Multi Domain Permissions Profile.<br>The level cannot be changed after creation.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "viewGlobalObjectsInDomain": {
            "type": "boolean",
            "description": "Lets an administrator with no global objects permissions view the global objects in the domain. This option is required for valid domain management.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMds:ManagementMds": {
      "description": "This resource allows you to execute Check Point MDS.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMds(\"example\", {\n    name: \"mymds\",\n    serverType: \"multi-domain server\",\n    os: \"Gaia\",\n    hardware: \"Open server\",\n    ipv4Address: \"1.1.1.1\",\n    ipPoolFirst: \"2.2.2.2\",\n    ipPoolLast: \"3.3.3.3\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMds(\"example\",\n    name=\"mymds\",\n    server_type=\"multi-domain server\",\n    os=\"Gaia\",\n    hardware=\"Open server\",\n    ipv4_address=\"1.1.1.1\",\n    ip_pool_first=\"2.2.2.2\",\n    ip_pool_last=\"3.3.3.3\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMds(\"example\", new()\n    {\n        Name = \"mymds\",\n        ServerType = \"multi-domain server\",\n        Os = \"Gaia\",\n        Hardware = \"Open server\",\n        Ipv4Address = \"1.1.1.1\",\n        IpPoolFirst = \"2.2.2.2\",\n        IpPoolLast = \"3.3.3.3\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMds(ctx, \"example\", &checkpoint.ManagementMdsArgs{\n\t\t\tName:        pulumi.String(\"mymds\"),\n\t\t\tServerType:  pulumi.String(\"multi-domain server\"),\n\t\t\tOs:          pulumi.String(\"Gaia\"),\n\t\t\tHardware:    pulumi.String(\"Open server\"),\n\t\t\tIpv4Address: pulumi.String(\"1.1.1.1\"),\n\t\t\tIpPoolFirst: pulumi.String(\"2.2.2.2\"),\n\t\t\tIpPoolLast:  pulumi.String(\"3.3.3.3\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMds;\nimport com.pulumi.checkpoint.ManagementMdsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMds(\"example\", ManagementMdsArgs.builder()\n            .name(\"mymds\")\n            .serverType(\"multi-domain server\")\n            .os(\"Gaia\")\n            .hardware(\"Open server\")\n            .ipv4Address(\"1.1.1.1\")\n            .ipPoolFirst(\"2.2.2.2\")\n            .ipPoolLast(\"3.3.3.3\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMds\n    properties:\n      name: mymds\n      serverType: multi-domain server\n      os: Gaia\n      hardware: Open server\n      ipv4Address: 1.1.1.1\n      ipPoolFirst: 2.2.2.2\n      ipPoolLast: 3.3.3.3\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domains": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Domain objects identified by the name or UID.\n"
        },
        "globalDomains": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Global domain objects identified by the name or UID.\n"
        },
        "hardware": {
          "type": "string",
          "description": "Hardware name. For example: Open server, Smart-1, Other.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipPoolFirst": {
          "type": "string",
          "description": "First IP address in the range.\n"
        },
        "ipPoolLast": {
          "type": "string",
          "description": "Last IP address in the range.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementMdsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "Secure internal connection one time password.\n",
          "secret": true
        },
        "os": {
          "type": "string",
          "description": "Operating system name. For example: Gaia, Linux, SecurePlatform.\n"
        },
        "serverType": {
          "type": "string",
          "description": "Type of the management server.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Name of the Secure Internal Connection Trust.\n"
        },
        "sicState": {
          "type": "string",
          "description": "State the Secure Internal Connection Trust.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "version": {
          "type": "string",
          "description": "System version.\n"
        }
      },
      "type": "object",
      "required": [
        "domains",
        "globalDomains",
        "managementMdsId",
        "name",
        "sicName",
        "sicState"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hardware": {
          "type": "string",
          "description": "Hardware name. For example: Open server, Smart-1, Other.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipPoolFirst": {
          "type": "string",
          "description": "First IP address in the range.\n"
        },
        "ipPoolLast": {
          "type": "string",
          "description": "Last IP address in the range.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementMdsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "Secure internal connection one time password.\n",
          "secret": true
        },
        "os": {
          "type": "string",
          "description": "Operating system name. For example: Gaia, Linux, SecurePlatform.\n"
        },
        "serverType": {
          "type": "string",
          "description": "Type of the management server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "version": {
          "type": "string",
          "description": "System version.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMds resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "domains": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Domain objects identified by the name or UID.\n"
          },
          "globalDomains": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Global domain objects identified by the name or UID.\n"
          },
          "hardware": {
            "type": "string",
            "description": "Hardware name. For example: Open server, Smart-1, Other.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipPoolFirst": {
            "type": "string",
            "description": "First IP address in the range.\n"
          },
          "ipPoolLast": {
            "type": "string",
            "description": "Last IP address in the range.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "managementMdsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "oneTimePassword": {
            "type": "string",
            "description": "Secure internal connection one time password.\n",
            "secret": true
          },
          "os": {
            "type": "string",
            "description": "Operating system name. For example: Gaia, Linux, SecurePlatform.\n"
          },
          "serverType": {
            "type": "string",
            "description": "Type of the management server.\n"
          },
          "sicName": {
            "type": "string",
            "description": "Name of the Secure Internal Connection Trust.\n"
          },
          "sicState": {
            "type": "string",
            "description": "State the Secure Internal Connection Trust.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "version": {
            "type": "string",
            "description": "System version.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMigrateExportDomain:ManagementMigrateExportDomain": {
      "properties": {
        "domain": {
          "type": "string",
          "description": "Domain can be identified by name or UID.<br><font color=\"red\">Required only for</font> exporting domain from Multi-Domain Server.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path in which the exported domain data will be saved. <br>Should be the directory path or the full file path with \".tgz\" <br>If no path was inserted the default will be: \"/var/log/&lt;domain name&gt;_&lt;date&gt;.tgz\".\n"
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Export logs.\n"
        },
        "managementMigrateExportDomainId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "domain",
        "managementMigrateExportDomainId",
        "taskId"
      ],
      "inputProperties": {
        "domain": {
          "type": "string",
          "description": "Domain can be identified by name or UID.<br><font color=\"red\">Required only for</font> exporting domain from Multi-Domain Server.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path in which the exported domain data will be saved. <br>Should be the directory path or the full file path with \".tgz\" <br>If no path was inserted the default will be: \"/var/log/&lt;domain name&gt;_&lt;date&gt;.tgz\".\n"
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Export logs.\n"
        },
        "managementMigrateExportDomainId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "domain"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMigrateExportDomain resources.\n",
        "properties": {
          "domain": {
            "type": "string",
            "description": "Domain can be identified by name or UID.<br><font color=\"red\">Required only for</font> exporting domain from Multi-Domain Server.\n"
          },
          "filePath": {
            "type": "string",
            "description": "Path in which the exported domain data will be saved. <br>Should be the directory path or the full file path with \".tgz\" <br>If no path was inserted the default will be: \"/var/log/&lt;domain name&gt;_&lt;date&gt;.tgz\".\n"
          },
          "includeLogs": {
            "type": "boolean",
            "description": "Export logs.\n"
          },
          "managementMigrateExportDomainId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMigrateImportDomain:ManagementMigrateImportDomain": {
      "properties": {
        "domainIpAddress": {
          "type": "string",
          "description": "IPv4 address.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainName": {
          "type": "string",
          "description": "Domain name. Should be unique in the MDS.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainServerName": {
          "type": "string",
          "description": "Multi Domain server name.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path to the exported file to be imported. <br>Should be the full file path (example, \"/var/log/domain1_exported.tgz\").\n"
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Import logs from the input package.\n"
        },
        "managementMigrateImportDomainId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "domainIpAddress",
        "domainName",
        "domainServerName",
        "filePath",
        "managementMigrateImportDomainId",
        "taskId"
      ],
      "inputProperties": {
        "domainIpAddress": {
          "type": "string",
          "description": "IPv4 address.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainName": {
          "type": "string",
          "description": "Domain name. Should be unique in the MDS.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainServerName": {
          "type": "string",
          "description": "Multi Domain server name.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path to the exported file to be imported. <br>Should be the full file path (example, \"/var/log/domain1_exported.tgz\").\n"
        },
        "includeLogs": {
          "type": "boolean",
          "description": "Import logs from the input package.\n"
        },
        "managementMigrateImportDomainId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "domainIpAddress",
        "domainName",
        "domainServerName",
        "filePath"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMigrateImportDomain resources.\n",
        "properties": {
          "domainIpAddress": {
            "type": "string",
            "description": "IPv4 address.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
          },
          "domainName": {
            "type": "string",
            "description": "Domain name. Should be unique in the MDS.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
          },
          "domainServerName": {
            "type": "string",
            "description": "Multi Domain server name.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
          },
          "filePath": {
            "type": "string",
            "description": "Path to the exported file to be imported. <br>Should be the full file path (example, \"/var/log/domain1_exported.tgz\").\n"
          },
          "includeLogs": {
            "type": "boolean",
            "description": "Import logs from the input package.\n"
          },
          "managementMigrateImportDomainId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMobileAccessProfileRule:ManagementMobileAccessProfileRule": {
      "description": "This resource allows you to execute Check Point Mobile Access Profile Rule.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessProfileRule(\"example\", {\n    name: \"Rule 1\",\n    mobileProfile: \"Default_Profile\",\n    userGroups: [\"my_group\"],\n    position: {\n        top: \"top\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessProfileRule(\"example\",\n    name=\"Rule 1\",\n    mobile_profile=\"Default_Profile\",\n    user_groups=[\"my_group\"],\n    position={\n        \"top\": \"top\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMobileAccessProfileRule(\"example\", new()\n    {\n        Name = \"Rule 1\",\n        MobileProfile = \"Default_Profile\",\n        UserGroups = new[]\n        {\n            \"my_group\",\n        },\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMobileAccessProfileRule(ctx, \"example\", &checkpoint.ManagementMobileAccessProfileRuleArgs{\n\t\t\tName:          pulumi.String(\"Rule 1\"),\n\t\t\tMobileProfile: pulumi.String(\"Default_Profile\"),\n\t\t\tUserGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"my_group\"),\n\t\t\t},\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileRule;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessProfileRule(\"example\", ManagementMobileAccessProfileRuleArgs.builder()\n            .name(\"Rule 1\")\n            .mobileProfile(\"Default_Profile\")\n            .userGroups(\"my_group\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessProfileRule\n    properties:\n      name: Rule 1\n      mobileProfile: Default_Profile\n      userGroups:\n        - my_group\n      position:\n        top: top\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileAccessProfileRuleId": {
          "type": "string"
        },
        "mobileProfile": {
          "type": "string",
          "description": "Profile configuration for User groups - identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "userGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "User groups that will be configured with the profile object - identified by the name or UID.user_groups blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMobileAccessProfileRuleId",
        "name",
        "position"
      ],
      "inputProperties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileAccessProfileRuleId": {
          "type": "string"
        },
        "mobileProfile": {
          "type": "string",
          "description": "Profile configuration for User groups - identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "userGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "User groups that will be configured with the profile object - identified by the name or UID.user_groups blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMobileAccessProfileRule resources.\n",
        "properties": {
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementMobileAccessProfileRuleId": {
            "type": "string"
          },
          "mobileProfile": {
            "type": "string",
            "description": "Profile configuration for User groups - identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "userGroups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "User groups that will be configured with the profile object - identified by the name or UID.user_groups blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMobileAccessProfileSection:ManagementMobileAccessProfileSection": {
      "description": "This resource allows you to execute Check Point Mobile Access Profile Section.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessProfileSection(\"example\", {\n    name: \"New Section 1\",\n    position: {\n        top: \"top\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessProfileSection(\"example\",\n    name=\"New Section 1\",\n    position={\n        \"top\": \"top\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMobileAccessProfileSection(\"example\", new()\n    {\n        Name = \"New Section 1\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMobileAccessProfileSection(ctx, \"example\", &checkpoint.ManagementMobileAccessProfileSectionArgs{\n\t\t\tName: pulumi.String(\"New Section 1\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileSection;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessProfileSection(\"example\", ManagementMobileAccessProfileSectionArgs.builder()\n            .name(\"New Section 1\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessProfileSection\n    properties:\n      name: New Section 1\n      position:\n        top: top\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileAccessProfileSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMobileAccessProfileSectionId",
        "name",
        "position"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileAccessProfileSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMobileAccessProfileSection resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementMobileAccessProfileSectionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMobileAccessRule:ManagementMobileAccessRule": {
      "description": "This resource allows you to execute Check Point Mobile Access Rule.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessRule(\"example\", {\n    name: \"Rule 1\",\n    applications: [\n        \"N\",\n        \"e\",\n        \"w\",\n        \" \",\n        \"A\",\n        \"p\",\n        \"p\",\n        \"l\",\n        \"i\",\n        \"c\",\n        \"a\",\n        \"t\",\n        \"i\",\n        \"o\",\n        \"n\",\n    ],\n    userGroups: [\"my_group\"],\n    position: {\n        top: \"top\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessRule(\"example\",\n    name=\"Rule 1\",\n    applications=[\n        \"N\",\n        \"e\",\n        \"w\",\n        \" \",\n        \"A\",\n        \"p\",\n        \"p\",\n        \"l\",\n        \"i\",\n        \"c\",\n        \"a\",\n        \"t\",\n        \"i\",\n        \"o\",\n        \"n\",\n    ],\n    user_groups=[\"my_group\"],\n    position={\n        \"top\": \"top\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMobileAccessRule(\"example\", new()\n    {\n        Name = \"Rule 1\",\n        Applications = new[]\n        {\n            \"N\",\n            \"e\",\n            \"w\",\n            \" \",\n            \"A\",\n            \"p\",\n            \"p\",\n            \"l\",\n            \"i\",\n            \"c\",\n            \"a\",\n            \"t\",\n            \"i\",\n            \"o\",\n            \"n\",\n        },\n        UserGroups = new[]\n        {\n            \"my_group\",\n        },\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMobileAccessRule(ctx, \"example\", &checkpoint.ManagementMobileAccessRuleArgs{\n\t\t\tName: pulumi.String(\"Rule 1\"),\n\t\t\tApplications: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"N\"),\n\t\t\t\tpulumi.String(\"e\"),\n\t\t\t\tpulumi.String(\"w\"),\n\t\t\t\tpulumi.String(\" \"),\n\t\t\t\tpulumi.String(\"A\"),\n\t\t\t\tpulumi.String(\"p\"),\n\t\t\t\tpulumi.String(\"p\"),\n\t\t\t\tpulumi.String(\"l\"),\n\t\t\t\tpulumi.String(\"i\"),\n\t\t\t\tpulumi.String(\"c\"),\n\t\t\t\tpulumi.String(\"a\"),\n\t\t\t\tpulumi.String(\"t\"),\n\t\t\t\tpulumi.String(\"i\"),\n\t\t\t\tpulumi.String(\"o\"),\n\t\t\t\tpulumi.String(\"n\"),\n\t\t\t},\n\t\t\tUserGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"my_group\"),\n\t\t\t},\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessRule;\nimport com.pulumi.checkpoint.ManagementMobileAccessRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessRule(\"example\", ManagementMobileAccessRuleArgs.builder()\n            .name(\"Rule 1\")\n            .applications(            \n                \"N\",\n                \"e\",\n                \"w\",\n                \" \",\n                \"A\",\n                \"p\",\n                \"p\",\n                \"l\",\n                \"i\",\n                \"c\",\n                \"a\",\n                \"t\",\n                \"i\",\n                \"o\",\n                \"n\")\n            .userGroups(\"my_group\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessRule\n    properties:\n      name: Rule 1\n      applications:\n        - N\n        - e\n        - w\n        - ' '\n        - A\n        - p\n        - p\n        - l\n        - i\n        - c\n        - a\n        - t\n        - i\n        - o\n        - n\n      userGroups:\n        - my_group\n      position:\n        top: top\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "applications": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Available apps that will be associated with the user groups - identified by the name or UID.applications blocks are documented below.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.\n"
        },
        "managementMobileAccessRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "userGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "User groups that will be associated with the apps - identified by the name or UID.user_groups blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMobileAccessRuleId",
        "name",
        "position"
      ],
      "inputProperties": {
        "applications": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Available apps that will be associated with the user groups - identified by the name or UID.applications blocks are documented below.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.\n"
        },
        "managementMobileAccessRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "userGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "User groups that will be associated with the apps - identified by the name or UID.user_groups blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMobileAccessRule resources.\n",
        "properties": {
          "applications": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Available apps that will be associated with the user groups - identified by the name or UID.applications blocks are documented below.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on.install_on blocks are documented below.\n"
          },
          "managementMobileAccessRuleId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "userGroups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "User groups that will be associated with the apps - identified by the name or UID.user_groups blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMobileAccessSection:ManagementMobileAccessSection": {
      "description": "This resource allows you to execute Check Point Mobile Access Section.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessSection(\"example\", {\n    name: \"New Section 1\",\n    position: {\n        top: \"top\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessSection(\"example\",\n    name=\"New Section 1\",\n    position={\n        \"top\": \"top\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMobileAccessSection(\"example\", new()\n    {\n        Name = \"New Section 1\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMobileAccessSection(ctx, \"example\", &checkpoint.ManagementMobileAccessSectionArgs{\n\t\t\tName: pulumi.String(\"New Section 1\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessSection;\nimport com.pulumi.checkpoint.ManagementMobileAccessSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessSection(\"example\", ManagementMobileAccessSectionArgs.builder()\n            .name(\"New Section 1\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessSection\n    properties:\n      name: New Section 1\n      position:\n        top: top\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileAccessSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMobileAccessSectionId",
        "name",
        "position"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileAccessSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMobileAccessSection resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementMobileAccessSectionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMobileProfile:ManagementMobileProfile": {
      "description": "This resource allows you to execute Check Point Mobile Profile.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst mobileProfile = new checkpoint.ManagementMobileProfile(\"mobile_profile\", {\n    name: \"My Mobile Profile\",\n    applications: {\n        enablePrintMails: true,\n        calendarFromTheLastUnit: \"weeks\",\n    },\n    harmonyMobile: {\n        enableHarmonyMobileSdk: true,\n        osIntegrityCompromised: \"ignore\",\n    },\n    security: {\n        sessionTimeout: 2,\n        sessionTimeoutUnit: \"weeks\",\n        activatePasscodeLock: false,\n        allowStoreCredentials: true,\n        hideSslConnectAnywayButton: true,\n        blockJailbroken: \"block\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmobile_profile = checkpoint.ManagementMobileProfile(\"mobile_profile\",\n    name=\"My Mobile Profile\",\n    applications={\n        \"enable_print_mails\": True,\n        \"calendar_from_the_last_unit\": \"weeks\",\n    },\n    harmony_mobile={\n        \"enable_harmony_mobile_sdk\": True,\n        \"os_integrity_compromised\": \"ignore\",\n    },\n    security={\n        \"session_timeout\": 2,\n        \"session_timeout_unit\": \"weeks\",\n        \"activate_passcode_lock\": False,\n        \"allow_store_credentials\": True,\n        \"hide_ssl_connect_anyway_button\": True,\n        \"block_jailbroken\": \"block\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var mobileProfile = new Checkpoint.ManagementMobileProfile(\"mobile_profile\", new()\n    {\n        Name = \"My Mobile Profile\",\n        Applications = new Checkpoint.Inputs.ManagementMobileProfileApplicationsArgs\n        {\n            EnablePrintMails = true,\n            CalendarFromTheLastUnit = \"weeks\",\n        },\n        HarmonyMobile = new Checkpoint.Inputs.ManagementMobileProfileHarmonyMobileArgs\n        {\n            EnableHarmonyMobileSdk = true,\n            OsIntegrityCompromised = \"ignore\",\n        },\n        Security = new Checkpoint.Inputs.ManagementMobileProfileSecurityArgs\n        {\n            SessionTimeout = 2,\n            SessionTimeoutUnit = \"weeks\",\n            ActivatePasscodeLock = false,\n            AllowStoreCredentials = true,\n            HideSslConnectAnywayButton = true,\n            BlockJailbroken = \"block\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMobileProfile(ctx, \"mobile_profile\", &checkpoint.ManagementMobileProfileArgs{\n\t\t\tName: pulumi.String(\"My Mobile Profile\"),\n\t\t\tApplications: &checkpoint.ManagementMobileProfileApplicationsArgs{\n\t\t\t\tEnablePrintMails:        pulumi.Bool(true),\n\t\t\t\tCalendarFromTheLastUnit: pulumi.String(\"weeks\"),\n\t\t\t},\n\t\t\tHarmonyMobile: &checkpoint.ManagementMobileProfileHarmonyMobileArgs{\n\t\t\t\tEnableHarmonyMobileSdk: pulumi.Bool(true),\n\t\t\t\tOsIntegrityCompromised: pulumi.String(\"ignore\"),\n\t\t\t},\n\t\t\tSecurity: &checkpoint.ManagementMobileProfileSecurityArgs{\n\t\t\t\tSessionTimeout:             pulumi.Float64(2),\n\t\t\t\tSessionTimeoutUnit:         pulumi.String(\"weeks\"),\n\t\t\t\tActivatePasscodeLock:       pulumi.Bool(false),\n\t\t\t\tAllowStoreCredentials:      pulumi.Bool(true),\n\t\t\t\tHideSslConnectAnywayButton: pulumi.Bool(true),\n\t\t\t\tBlockJailbroken:            pulumi.String(\"block\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileProfile;\nimport com.pulumi.checkpoint.ManagementMobileProfileArgs;\nimport com.pulumi.checkpoint.inputs.ManagementMobileProfileApplicationsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementMobileProfileHarmonyMobileArgs;\nimport com.pulumi.checkpoint.inputs.ManagementMobileProfileSecurityArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var mobileProfile = new ManagementMobileProfile(\"mobileProfile\", ManagementMobileProfileArgs.builder()\n            .name(\"My Mobile Profile\")\n            .applications(ManagementMobileProfileApplicationsArgs.builder()\n                .enablePrintMails(true)\n                .calendarFromTheLastUnit(\"weeks\")\n                .build())\n            .harmonyMobile(ManagementMobileProfileHarmonyMobileArgs.builder()\n                .enableHarmonyMobileSdk(true)\n                .osIntegrityCompromised(\"ignore\")\n                .build())\n            .security(ManagementMobileProfileSecurityArgs.builder()\n                .sessionTimeout(2.0)\n                .sessionTimeoutUnit(\"weeks\")\n                .activatePasscodeLock(false)\n                .allowStoreCredentials(true)\n                .hideSslConnectAnywayButton(true)\n                .blockJailbroken(\"block\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  mobileProfile:\n    type: checkpoint:ManagementMobileProfile\n    name: mobile_profile\n    properties:\n      name: My Mobile Profile\n      applications:\n        enablePrintMails: true\n        calendarFromTheLastUnit: weeks\n      harmonyMobile:\n        enableHarmonyMobileSdk: true\n        osIntegrityCompromised: ignore\n      security:\n        sessionTimeout: 2\n        sessionTimeoutUnit: weeks\n        activatePasscodeLock: false\n        allowStoreCredentials: true\n        hideSslConnectAnywayButton: true\n        blockJailbroken: block\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "applications": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileApplications:ManagementMobileProfileApplications",
          "description": "Applications settings.applications blocks are documented below.\n"
        },
        "clientCustomization": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileClientCustomization:ManagementMobileProfileClientCustomization",
          "description": "Client customization settings.client_customization blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataLeakPrevention": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileDataLeakPrevention:ManagementMobileProfileDataLeakPrevention",
          "description": "Data leak prevention settings.data_leak_prevention blocks are documented below.\n"
        },
        "harmonyMobile": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileHarmonyMobile:ManagementMobileProfileHarmonyMobile",
          "description": "Integrations settings.harmony_mobile blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileProfileId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "security": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileSecurity:ManagementMobileProfileSecurity",
          "description": "Security settings.security blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMobileProfileId",
        "name"
      ],
      "inputProperties": {
        "applications": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileApplications:ManagementMobileProfileApplications",
          "description": "Applications settings.applications blocks are documented below.\n"
        },
        "clientCustomization": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileClientCustomization:ManagementMobileProfileClientCustomization",
          "description": "Client customization settings.client_customization blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataLeakPrevention": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileDataLeakPrevention:ManagementMobileProfileDataLeakPrevention",
          "description": "Data leak prevention settings.data_leak_prevention blocks are documented below.\n"
        },
        "harmonyMobile": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileHarmonyMobile:ManagementMobileProfileHarmonyMobile",
          "description": "Integrations settings.harmony_mobile blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementMobileProfileId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "security": {
          "$ref": "#/types/checkpoint:index%2FManagementMobileProfileSecurity:ManagementMobileProfileSecurity",
          "description": "Security settings.security blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMobileProfile resources.\n",
        "properties": {
          "applications": {
            "$ref": "#/types/checkpoint:index%2FManagementMobileProfileApplications:ManagementMobileProfileApplications",
            "description": "Applications settings.applications blocks are documented below.\n"
          },
          "clientCustomization": {
            "$ref": "#/types/checkpoint:index%2FManagementMobileProfileClientCustomization:ManagementMobileProfileClientCustomization",
            "description": "Client customization settings.client_customization blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataLeakPrevention": {
            "$ref": "#/types/checkpoint:index%2FManagementMobileProfileDataLeakPrevention:ManagementMobileProfileDataLeakPrevention",
            "description": "Data leak prevention settings.data_leak_prevention blocks are documented below.\n"
          },
          "harmonyMobile": {
            "$ref": "#/types/checkpoint:index%2FManagementMobileProfileHarmonyMobile:ManagementMobileProfileHarmonyMobile",
            "description": "Integrations settings.harmony_mobile blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementMobileProfileId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "security": {
            "$ref": "#/types/checkpoint:index%2FManagementMobileProfileSecurity:ManagementMobileProfileSecurity",
            "description": "Security settings.security blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMulticastAddressRange:ManagementMulticastAddressRange": {
      "description": "This resource allows you to execute Check Point Multicast Address Range.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMulticastAddressRange(\"example\", {\n    name: \"New Multicast Address Range\",\n    ipv4AddressFirst: \"224.0.0.1\",\n    ipv4AddressLast: \"224.0.0.4\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMulticastAddressRange(\"example\",\n    name=\"New Multicast Address Range\",\n    ipv4_address_first=\"224.0.0.1\",\n    ipv4_address_last=\"224.0.0.4\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMulticastAddressRange(\"example\", new()\n    {\n        Name = \"New Multicast Address Range\",\n        Ipv4AddressFirst = \"224.0.0.1\",\n        Ipv4AddressLast = \"224.0.0.4\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMulticastAddressRange(ctx, \"example\", &checkpoint.ManagementMulticastAddressRangeArgs{\n\t\t\tName:             pulumi.String(\"New Multicast Address Range\"),\n\t\t\tIpv4AddressFirst: pulumi.String(\"224.0.0.1\"),\n\t\t\tIpv4AddressLast:  pulumi.String(\"224.0.0.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMulticastAddressRange;\nimport com.pulumi.checkpoint.ManagementMulticastAddressRangeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMulticastAddressRange(\"example\", ManagementMulticastAddressRangeArgs.builder()\n            .name(\"New Multicast Address Range\")\n            .ipv4AddressFirst(\"224.0.0.1\")\n            .ipv4AddressLast(\"224.0.0.4\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMulticastAddressRange\n    properties:\n      name: New Multicast Address Range\n      ipv4AddressFirst: 224.0.0.1\n      ipv4AddressLast: 224.0.0.4\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4AddressFirst": {
          "type": "string",
          "description": "First IPv4 address in the range.\n"
        },
        "ipv4AddressLast": {
          "type": "string",
          "description": "Last IPv4 address in the range.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6AddressFirst": {
          "type": "string",
          "description": "First IPv6 address in the range.\n"
        },
        "ipv6AddressLast": {
          "type": "string",
          "description": "Last IPv6 address in the range.\n"
        },
        "managementMulticastAddressRangeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementMulticastAddressRangeId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4AddressFirst": {
          "type": "string",
          "description": "First IPv4 address in the range.\n"
        },
        "ipv4AddressLast": {
          "type": "string",
          "description": "Last IPv4 address in the range.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6AddressFirst": {
          "type": "string",
          "description": "First IPv6 address in the range.\n"
        },
        "ipv6AddressLast": {
          "type": "string",
          "description": "Last IPv6 address in the range.\n"
        },
        "managementMulticastAddressRangeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMulticastAddressRange resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv4AddressFirst": {
            "type": "string",
            "description": "First IPv4 address in the range.\n"
          },
          "ipv4AddressLast": {
            "type": "string",
            "description": "Last IPv4 address in the range.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "ipv6AddressFirst": {
            "type": "string",
            "description": "First IPv6 address in the range.\n"
          },
          "ipv6AddressLast": {
            "type": "string",
            "description": "Last IPv6 address in the range.\n"
          },
          "managementMulticastAddressRangeId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementMultipleKeyExchanges:ManagementMultipleKeyExchanges": {
      "description": "This resource allows you to execute Check Point Multiple Key Exchanges.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMultipleKeyExchanges(\"example\", {\n    name: \"Multiple Key Exchanges\",\n    keyExchangeMethods: [\"group-2\"],\n    additionalKeyExchange1Methods: [\"kyber-1024\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMultipleKeyExchanges(\"example\",\n    name=\"Multiple Key Exchanges\",\n    key_exchange_methods=[\"group-2\"],\n    additional_key_exchange1_methods=[\"kyber-1024\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementMultipleKeyExchanges(\"example\", new()\n    {\n        Name = \"Multiple Key Exchanges\",\n        KeyExchangeMethods = new[]\n        {\n            \"group-2\",\n        },\n        AdditionalKeyExchange1Methods = new[]\n        {\n            \"kyber-1024\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMultipleKeyExchanges(ctx, \"example\", &checkpoint.ManagementMultipleKeyExchangesArgs{\n\t\t\tName: pulumi.String(\"Multiple Key Exchanges\"),\n\t\t\tKeyExchangeMethods: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"group-2\"),\n\t\t\t},\n\t\t\tAdditionalKeyExchange1Methods: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kyber-1024\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMultipleKeyExchanges;\nimport com.pulumi.checkpoint.ManagementMultipleKeyExchangesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMultipleKeyExchanges(\"example\", ManagementMultipleKeyExchangesArgs.builder()\n            .name(\"Multiple Key Exchanges\")\n            .keyExchangeMethods(\"group-2\")\n            .additionalKeyExchange1Methods(\"kyber-1024\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMultipleKeyExchanges\n    properties:\n      name: Multiple Key Exchanges\n      keyExchangeMethods:\n        - group-2\n      additionalKeyExchange1Methods:\n        - kyber-1024\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "additionalKeyExchange1Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 1 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange2Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 2 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange3Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 3 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange4Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 4 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange5Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 5 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange6Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 6 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange7Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 7 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keyExchangeMethods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Key-Exchange methods to use. Can contain only Diffie-Hellman groups. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24\n"
        },
        "managementMultipleKeyExchangesId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "keyExchangeMethods",
        "managementMultipleKeyExchangesId",
        "name"
      ],
      "inputProperties": {
        "additionalKeyExchange1Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 1 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange2Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 2 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange3Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 3 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange4Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 4 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange5Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 5 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange6Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 6 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "additionalKeyExchange7Methods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Additional Key-Exchange 7 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keyExchangeMethods": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Key-Exchange methods to use. Can contain only Diffie-Hellman groups. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24\n"
        },
        "managementMultipleKeyExchangesId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "keyExchangeMethods"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementMultipleKeyExchanges resources.\n",
        "properties": {
          "additionalKeyExchange1Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 1 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "additionalKeyExchange2Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 2 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "additionalKeyExchange3Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 3 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "additionalKeyExchange4Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 4 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "additionalKeyExchange5Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 5 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "additionalKeyExchange6Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 6 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "additionalKeyExchange7Methods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Additional Key-Exchange 7 methods to use. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24, kyber-512, kyber-768, kyber-1024, none\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keyExchangeMethods": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Key-Exchange methods to use. Can contain only Diffie-Hellman groups. Valid values: group-1, group-2, group-5, group-14, group-15, group-16, group-17, group-18, group-19, group-20, group-24\n"
          },
          "managementMultipleKeyExchangesId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNatRule:ManagementNatRule": {
      "description": "This resource allows you to add/update/delete Check Point NAT Rule.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst rule1 = new checkpoint.ManagementNatRule(\"rule1\", {\n    \"package\": \"Standard\",\n    position: {\n        top: \"top\",\n    },\n    name: \"rule1\",\n});\nconst rule2 = new checkpoint.ManagementNatRule(\"rule2\", {\n    \"package\": \"Standard\",\n    position: {\n        below: rule1CheckpointManagementAccessRule.name,\n    },\n    name: \"rule2\",\n});\nconst rule3 = new checkpoint.ManagementNatRule(\"rule3\", {\n    \"package\": \"Standard\",\n    position: {\n        below: rule2CheckpointManagementAccessRule.name,\n    },\n    name: \"rule3\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nrule1 = checkpoint.ManagementNatRule(\"rule1\",\n    package=\"Standard\",\n    position={\n        \"top\": \"top\",\n    },\n    name=\"rule1\")\nrule2 = checkpoint.ManagementNatRule(\"rule2\",\n    package=\"Standard\",\n    position={\n        \"below\": rule1_checkpoint_management_access_rule[\"name\"],\n    },\n    name=\"rule2\")\nrule3 = checkpoint.ManagementNatRule(\"rule3\",\n    package=\"Standard\",\n    position={\n        \"below\": rule2_checkpoint_management_access_rule[\"name\"],\n    },\n    name=\"rule3\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var rule1 = new Checkpoint.ManagementNatRule(\"rule1\", new()\n    {\n        Package = \"Standard\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Name = \"rule1\",\n    });\n\n    var rule2 = new Checkpoint.ManagementNatRule(\"rule2\", new()\n    {\n        Package = \"Standard\",\n        Position = \n        {\n            { \"below\", rule1CheckpointManagementAccessRule.Name },\n        },\n        Name = \"rule2\",\n    });\n\n    var rule3 = new Checkpoint.ManagementNatRule(\"rule3\", new()\n    {\n        Package = \"Standard\",\n        Position = \n        {\n            { \"below\", rule2CheckpointManagementAccessRule.Name },\n        },\n        Name = \"rule3\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNatRule(ctx, \"rule1\", &checkpoint.ManagementNatRuleArgs{\n\t\t\tPackage: pulumi.String(\"Standard\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tName: pulumi.String(\"rule1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementNatRule(ctx, \"rule2\", &checkpoint.ManagementNatRuleArgs{\n\t\t\tPackage: pulumi.String(\"Standard\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"below\": pulumi.Any(rule1CheckpointManagementAccessRule.Name),\n\t\t\t},\n\t\t\tName: pulumi.String(\"rule2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementNatRule(ctx, \"rule3\", &checkpoint.ManagementNatRuleArgs{\n\t\t\tPackage: pulumi.String(\"Standard\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"below\": pulumi.Any(rule2CheckpointManagementAccessRule.Name),\n\t\t\t},\n\t\t\tName: pulumi.String(\"rule3\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNatRule;\nimport com.pulumi.checkpoint.ManagementNatRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var rule1 = new ManagementNatRule(\"rule1\", ManagementNatRuleArgs.builder()\n            .package_(\"Standard\")\n            .position(Map.of(\"top\", \"top\"))\n            .name(\"rule1\")\n            .build());\n\n        var rule2 = new ManagementNatRule(\"rule2\", ManagementNatRuleArgs.builder()\n            .package_(\"Standard\")\n            .position(Map.of(\"below\", rule1CheckpointManagementAccessRule.name()))\n            .name(\"rule2\")\n            .build());\n\n        var rule3 = new ManagementNatRule(\"rule3\", ManagementNatRuleArgs.builder()\n            .package_(\"Standard\")\n            .position(Map.of(\"below\", rule2CheckpointManagementAccessRule.name()))\n            .name(\"rule3\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  rule1:\n    type: checkpoint:ManagementNatRule\n    properties:\n      package: Standard\n      position:\n        top: top\n      name: rule1\n  rule2:\n    type: checkpoint:ManagementNatRule\n    properties:\n      package: Standard\n      position:\n        below: ${rule1CheckpointManagementAccessRule.name}\n      name: rule2\n  rule3:\n    type: checkpoint:ManagementNatRule\n    properties:\n      package: Standard\n      position:\n        below: ${rule2CheckpointManagementAccessRule.name}\n      name: rule3\n```\n<!--End PulumiCodeChooser -->\n\n## Import\n\n`checkpoint_management_nat_rule` can be imported by using the following format: PACKAGE_NAME;RULE_UID\n\n```sh\n$ pulumi import checkpoint:index/managementNatRule:ManagementNatRule example \"Standard;9423d36f-2d66-4754-b9e2-e9f4493751d3\"\n```\n",
      "properties": {
        "autoGenerated": {
          "type": "boolean",
          "description": "Auto generated.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "managementNatRuleId": {
          "type": "string"
        },
        "method": {
          "type": "string",
          "description": "Nat method.\n"
        },
        "name": {
          "type": "string",
          "description": "Rule name.\n"
        },
        "originalDestination": {
          "type": "string",
          "description": "Original destination.\n"
        },
        "originalService": {
          "type": "string",
          "description": "Original service.\n"
        },
        "originalSource": {
          "type": "string",
          "description": "Original source.\n"
        },
        "package": {
          "type": "string",
          "description": "Name of the package.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "translatedDestination": {
          "type": "string",
          "description": "Translated destination.\n"
        },
        "translatedService": {
          "type": "string",
          "description": "Translated service.\n"
        },
        "translatedSource": {
          "type": "string",
          "description": "Translated source.\n"
        }
      },
      "type": "object",
      "required": [
        "autoGenerated",
        "managementNatRuleId",
        "name",
        "package",
        "position"
      ],
      "inputProperties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "managementNatRuleId": {
          "type": "string"
        },
        "method": {
          "type": "string",
          "description": "Nat method.\n"
        },
        "name": {
          "type": "string",
          "description": "Rule name.\n"
        },
        "originalDestination": {
          "type": "string",
          "description": "Original destination.\n"
        },
        "originalService": {
          "type": "string",
          "description": "Original service.\n"
        },
        "originalSource": {
          "type": "string",
          "description": "Original source.\n"
        },
        "package": {
          "type": "string",
          "description": "Name of the package.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "translatedDestination": {
          "type": "string",
          "description": "Translated destination.\n"
        },
        "translatedService": {
          "type": "string",
          "description": "Translated service.\n"
        },
        "translatedSource": {
          "type": "string",
          "description": "Translated source.\n"
        }
      },
      "requiredInputs": [
        "package",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNatRule resources.\n",
        "properties": {
          "autoGenerated": {
            "type": "boolean",
            "description": "Auto generated.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on.\n"
          },
          "managementNatRuleId": {
            "type": "string"
          },
          "method": {
            "type": "string",
            "description": "Nat method.\n"
          },
          "name": {
            "type": "string",
            "description": "Rule name.\n"
          },
          "originalDestination": {
            "type": "string",
            "description": "Original destination.\n"
          },
          "originalService": {
            "type": "string",
            "description": "Original service.\n"
          },
          "originalSource": {
            "type": "string",
            "description": "Original source.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "translatedDestination": {
            "type": "string",
            "description": "Translated destination.\n"
          },
          "translatedService": {
            "type": "string",
            "description": "Translated service.\n"
          },
          "translatedSource": {
            "type": "string",
            "description": "Translated source.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNatSection:ManagementNatSection": {
      "description": "This resource allows you to add/update/delete Check Point NAT section.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst natSection = new checkpoint.ManagementNatSection(\"nat_section\", {\n    name: \"nat section\",\n    \"package\": \"Standard\",\n    position: {\n        top: \"top\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nnat_section = checkpoint.ManagementNatSection(\"nat_section\",\n    name=\"nat section\",\n    package=\"Standard\",\n    position={\n        \"top\": \"top\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var natSection = new Checkpoint.ManagementNatSection(\"nat_section\", new()\n    {\n        Name = \"nat section\",\n        Package = \"Standard\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNatSection(ctx, \"nat_section\", &checkpoint.ManagementNatSectionArgs{\n\t\t\tName:    pulumi.String(\"nat section\"),\n\t\t\tPackage: pulumi.String(\"Standard\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNatSection;\nimport com.pulumi.checkpoint.ManagementNatSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var natSection = new ManagementNatSection(\"natSection\", ManagementNatSectionArgs.builder()\n            .name(\"nat section\")\n            .package_(\"Standard\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  natSection:\n    type: checkpoint:ManagementNatSection\n    name: nat_section\n    properties:\n      name: nat section\n      package: Standard\n      position:\n        top: top\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNatSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "package": {
          "type": "string",
          "description": "Name of the package.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementNatSectionId",
        "name",
        "package",
        "position"
      ],
      "inputProperties": {
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNatSectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "package": {
          "type": "string",
          "description": "Name of the package.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "package",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNatSection resources.\n",
        "properties": {
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementNatSectionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNetwork:ManagementNetwork": {
      "description": "This resource allows you to add/update/delete Check Point Network Object.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementNetwork(\"example\", {\n    name: \"New Network 1\",\n    subnet4: \"192.0.2.0\",\n    maskLength4: 32,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementNetwork(\"example\",\n    name=\"New Network 1\",\n    subnet4=\"192.0.2.0\",\n    mask_length4=32)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementNetwork(\"example\", new()\n    {\n        Name = \"New Network 1\",\n        Subnet4 = \"192.0.2.0\",\n        MaskLength4 = 32,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNetwork(ctx, \"example\", &checkpoint.ManagementNetworkArgs{\n\t\t\tName:        pulumi.String(\"New Network 1\"),\n\t\t\tSubnet4:     pulumi.String(\"192.0.2.0\"),\n\t\t\tMaskLength4: pulumi.Float64(32),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNetwork;\nimport com.pulumi.checkpoint.ManagementNetworkArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementNetwork(\"example\", ManagementNetworkArgs.builder()\n            .name(\"New Network 1\")\n            .subnet4(\"192.0.2.0\")\n            .maskLength4(32.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementNetwork\n    properties:\n      name: New Network 1\n      subnet4: 192.0.2.0\n      maskLength4: 32\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "broadcast": {
          "type": "string",
          "description": "\"Allow broadcast address inclusion.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNetworkId": {
          "type": "string"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address..\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementNetworkId",
        "name"
      ],
      "inputProperties": {
        "broadcast": {
          "type": "string",
          "description": "\"Allow broadcast address inclusion.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNetworkId": {
          "type": "string"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 network mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 network mask length.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings. NAT settings blocks are documented below.\n"
        },
        "subnet4": {
          "type": "string",
          "description": "IPv4 network address.\n"
        },
        "subnet6": {
          "type": "string",
          "description": "IPv6 network address..\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNetwork resources.\n",
        "properties": {
          "broadcast": {
            "type": "string",
            "description": "\"Allow broadcast address inclusion.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementNetworkId": {
            "type": "string"
          },
          "maskLength4": {
            "type": "number",
            "description": "IPv4 network mask length.\n"
          },
          "maskLength6": {
            "type": "number",
            "description": "IPv6 network mask length.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "natSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "NAT settings. NAT settings blocks are documented below.\n"
          },
          "subnet4": {
            "type": "string",
            "description": "IPv4 network address.\n"
          },
          "subnet6": {
            "type": "string",
            "description": "IPv6 network address..\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNetworkFeed:ManagementNetworkFeed": {
      "description": "This resource allows you to execute Check Point Network Feed.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementNetworkFeed(\"example\", {\n    name: \"network_feed\",\n    feedUrl: \"https://www.feedsresource.com/resource\",\n    username: \"feed_username\",\n    password: \"feed_password\",\n    feedFormat: \"Flat List\",\n    feedType: \"IP Address\",\n    updateInterval: 60,\n    dataColumn: 1,\n    useGatewayProxy: false,\n    fieldsDelimiter: \"\\x09\",\n    ignoreLinesThatStartWith: \"!\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementNetworkFeed(\"example\",\n    name=\"network_feed\",\n    feed_url=\"https://www.feedsresource.com/resource\",\n    username=\"feed_username\",\n    password=\"feed_password\",\n    feed_format=\"Flat List\",\n    feed_type=\"IP Address\",\n    update_interval=60,\n    data_column=1,\n    use_gateway_proxy=False,\n    fields_delimiter=\"\\x09\",\n    ignore_lines_that_start_with=\"!\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementNetworkFeed(\"example\", new()\n    {\n        Name = \"network_feed\",\n        FeedUrl = \"https://www.feedsresource.com/resource\",\n        Username = \"feed_username\",\n        Password = \"feed_password\",\n        FeedFormat = \"Flat List\",\n        FeedType = \"IP Address\",\n        UpdateInterval = 60,\n        DataColumn = 1,\n        UseGatewayProxy = false,\n        FieldsDelimiter = \"\t\",\n        IgnoreLinesThatStartWith = \"!\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNetworkFeed(ctx, \"example\", &checkpoint.ManagementNetworkFeedArgs{\n\t\t\tName:                     pulumi.String(\"network_feed\"),\n\t\t\tFeedUrl:                  pulumi.String(\"https://www.feedsresource.com/resource\"),\n\t\t\tUsername:                 pulumi.String(\"feed_username\"),\n\t\t\tPassword:                 pulumi.String(\"feed_password\"),\n\t\t\tFeedFormat:               pulumi.String(\"Flat List\"),\n\t\t\tFeedType:                 pulumi.String(\"IP Address\"),\n\t\t\tUpdateInterval:           pulumi.Float64(60),\n\t\t\tDataColumn:               pulumi.Float64(1),\n\t\t\tUseGatewayProxy:          pulumi.Bool(false),\n\t\t\tFieldsDelimiter:          pulumi.String(\"\t\"),\n\t\t\tIgnoreLinesThatStartWith: pulumi.String(\"!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNetworkFeed;\nimport com.pulumi.checkpoint.ManagementNetworkFeedArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementNetworkFeed(\"example\", ManagementNetworkFeedArgs.builder()\n            .name(\"network_feed\")\n            .feedUrl(\"https://www.feedsresource.com/resource\")\n            .username(\"feed_username\")\n            .password(\"feed_password\")\n            .feedFormat(\"Flat List\")\n            .feedType(\"IP Address\")\n            .updateInterval(60.0)\n            .dataColumn(1.0)\n            .useGatewayProxy(false)\n            .fieldsDelimiter(\"\t\")\n            .ignoreLinesThatStartWith(\"!\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementNetworkFeed\n    properties:\n      name: network_feed\n      feedUrl: https://www.feedsresource.com/resource\n      username: feed_username\n      password: feed_password\n      feedFormat: Flat List\n      feedType: IP Address\n      updateInterval: 60\n      dataColumn: 1\n      useGatewayProxy: false\n      fieldsDelimiter: \"\\t\"\n      ignoreLinesThatStartWith: '!'\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "certificateId": {
          "type": "string",
          "description": "Certificate SHA-1 fingerprint to access the feed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customHeaders": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementNetworkFeedCustomHeader:ManagementNetworkFeedCustomHeader"
          },
          "description": "Headers to allow different authentication methods with the URL.custom_header blocks are documented below.\n"
        },
        "dataColumn": {
          "type": "number",
          "description": "Number of the column that contains the feed's data.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "feedFormat": {
          "type": "string",
          "description": "Feed file format.\n"
        },
        "feedType": {
          "type": "string",
          "description": "Feed type to be enforced.\n"
        },
        "feedUrl": {
          "type": "string",
          "description": "URL of the feed.\nURL should be written as http or https.\n"
        },
        "fieldsDelimiter": {
          "type": "string",
          "description": "The delimiter that separates between the columns in the feed. For feed format 'Flat List' default is '\\n'(new line).\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreLinesThatStartWith": {
          "type": "string",
          "description": "A prefix that will determine which lines to ignore.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "jsonQuery": {
          "type": "string",
          "description": "JQ query to be parsed.\n"
        },
        "managementNetworkFeedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "password for authenticating with the URL.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "updateInterval": {
          "type": "number",
          "description": "Interval in minutes for updating the feed on the Security Gateway.\n"
        },
        "useGatewayProxy": {
          "type": "boolean",
          "description": "Use the gateway's proxy for retrieving the feed.\n"
        },
        "username": {
          "type": "string",
          "description": "username for authenticating with the URL.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "managementNetworkFeedId",
        "name"
      ],
      "inputProperties": {
        "certificateId": {
          "type": "string",
          "description": "Certificate SHA-1 fingerprint to access the feed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customHeaders": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementNetworkFeedCustomHeader:ManagementNetworkFeedCustomHeader"
          },
          "description": "Headers to allow different authentication methods with the URL.custom_header blocks are documented below.\n"
        },
        "dataColumn": {
          "type": "number",
          "description": "Number of the column that contains the feed's data.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "feedFormat": {
          "type": "string",
          "description": "Feed file format.\n"
        },
        "feedType": {
          "type": "string",
          "description": "Feed type to be enforced.\n"
        },
        "feedUrl": {
          "type": "string",
          "description": "URL of the feed.\nURL should be written as http or https.\n"
        },
        "fieldsDelimiter": {
          "type": "string",
          "description": "The delimiter that separates between the columns in the feed. For feed format 'Flat List' default is '\\n'(new line).\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreLinesThatStartWith": {
          "type": "string",
          "description": "A prefix that will determine which lines to ignore.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "jsonQuery": {
          "type": "string",
          "description": "JQ query to be parsed.\n"
        },
        "managementNetworkFeedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "password for authenticating with the URL.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "updateInterval": {
          "type": "number",
          "description": "Interval in minutes for updating the feed on the Security Gateway.\n"
        },
        "useGatewayProxy": {
          "type": "boolean",
          "description": "Use the gateway's proxy for retrieving the feed.\n"
        },
        "username": {
          "type": "string",
          "description": "username for authenticating with the URL.\n",
          "secret": true
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNetworkFeed resources.\n",
        "properties": {
          "certificateId": {
            "type": "string",
            "description": "Certificate SHA-1 fingerprint to access the feed.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "customHeaders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementNetworkFeedCustomHeader:ManagementNetworkFeedCustomHeader"
            },
            "description": "Headers to allow different authentication methods with the URL.custom_header blocks are documented below.\n"
          },
          "dataColumn": {
            "type": "number",
            "description": "Number of the column that contains the feed's data.\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
          },
          "feedFormat": {
            "type": "string",
            "description": "Feed file format.\n"
          },
          "feedType": {
            "type": "string",
            "description": "Feed type to be enforced.\n"
          },
          "feedUrl": {
            "type": "string",
            "description": "URL of the feed.\nURL should be written as http or https.\n"
          },
          "fieldsDelimiter": {
            "type": "string",
            "description": "The delimiter that separates between the columns in the feed. For feed format 'Flat List' default is '\\n'(new line).\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreLinesThatStartWith": {
            "type": "string",
            "description": "A prefix that will determine which lines to ignore.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "jsonQuery": {
            "type": "string",
            "description": "JQ query to be parsed.\n"
          },
          "managementNetworkFeedId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "password for authenticating with the URL.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "updateInterval": {
            "type": "number",
            "description": "Interval in minutes for updating the feed on the Security Gateway.\n"
          },
          "useGatewayProxy": {
            "type": "boolean",
            "description": "Use the gateway's proxy for retrieving the feed.\n"
          },
          "username": {
            "type": "string",
            "description": "username for authenticating with the URL.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNetworkProbe:ManagementNetworkProbe": {
      "description": "This resource allows you to execute Check Point Network Probe.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementNetworkProbe(\"example\", {\n    name: \"network1\",\n    icmpOptions: {\n        source: \"host1\",\n        destination: \"host2\",\n    },\n    installOns: [\n        \"gw1\",\n        \"gw2\",\n    ],\n    interval: 20,\n    protocol: \"icmp\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementNetworkProbe(\"example\",\n    name=\"network1\",\n    icmp_options={\n        \"source\": \"host1\",\n        \"destination\": \"host2\",\n    },\n    install_ons=[\n        \"gw1\",\n        \"gw2\",\n    ],\n    interval=20,\n    protocol=\"icmp\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementNetworkProbe(\"example\", new()\n    {\n        Name = \"network1\",\n        IcmpOptions = \n        {\n            { \"source\", \"host1\" },\n            { \"destination\", \"host2\" },\n        },\n        InstallOns = new[]\n        {\n            \"gw1\",\n            \"gw2\",\n        },\n        Interval = 20,\n        Protocol = \"icmp\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNetworkProbe(ctx, \"example\", &checkpoint.ManagementNetworkProbeArgs{\n\t\t\tName: pulumi.String(\"network1\"),\n\t\t\tIcmpOptions: pulumi.StringMap{\n\t\t\t\t\"source\":      pulumi.String(\"host1\"),\n\t\t\t\t\"destination\": pulumi.String(\"host2\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"gw1\"),\n\t\t\t\tpulumi.String(\"gw2\"),\n\t\t\t},\n\t\t\tInterval: pulumi.Float64(20),\n\t\t\tProtocol: pulumi.String(\"icmp\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNetworkProbe;\nimport com.pulumi.checkpoint.ManagementNetworkProbeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementNetworkProbe(\"example\", ManagementNetworkProbeArgs.builder()\n            .name(\"network1\")\n            .icmpOptions(Map.ofEntries(\n                Map.entry(\"source\", \"host1\"),\n                Map.entry(\"destination\", \"host2\")\n            ))\n            .installOns(            \n                \"gw1\",\n                \"gw2\")\n            .interval(20.0)\n            .protocol(\"icmp\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementNetworkProbe\n    properties:\n      name: network1\n      icmpOptions:\n        source: host1\n        destination: host2\n      installOns:\n        - gw1\n        - gw2\n      interval: '20'\n      protocol: icmp\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "httpOptions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional options when [protocol] is set to \"http\".http_options blocks are documented below.\n"
        },
        "icmpOptions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional options when [protocol] is set to \"icmp\".icmp_options blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Check Point Security Gateways that generate the probe, identified by name or UID.install_on blocks are documented below.\n"
        },
        "interval": {
          "type": "number",
          "description": "The time interval (in seconds) between each probe request.<br>Best Practice - The interval value should be lower than the timeout value.\n"
        },
        "managementNetworkProbeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "protocol": {
          "type": "string",
          "description": "The probing protocol to use.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "timeout": {
          "type": "number",
          "description": "The probe expiration timeout (in seconds). If there is not a single reply within this time, the status of the probe changes to \"Down\".\n"
        }
      },
      "type": "object",
      "required": [
        "installOns",
        "managementNetworkProbeId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "httpOptions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional options when [protocol] is set to \"http\".http_options blocks are documented below.\n"
        },
        "icmpOptions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Additional options when [protocol] is set to \"icmp\".icmp_options blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Check Point Security Gateways that generate the probe, identified by name or UID.install_on blocks are documented below.\n"
        },
        "interval": {
          "type": "number",
          "description": "The time interval (in seconds) between each probe request.<br>Best Practice - The interval value should be lower than the timeout value.\n"
        },
        "managementNetworkProbeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "protocol": {
          "type": "string",
          "description": "The probing protocol to use.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "timeout": {
          "type": "number",
          "description": "The probe expiration timeout (in seconds). If there is not a single reply within this time, the status of the probe changes to \"Down\".\n"
        }
      },
      "requiredInputs": [
        "installOns"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNetworkProbe resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "httpOptions": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Additional options when [protocol] is set to \"http\".http_options blocks are documented below.\n"
          },
          "icmpOptions": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Additional options when [protocol] is set to \"icmp\".icmp_options blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Check Point Security Gateways that generate the probe, identified by name or UID.install_on blocks are documented below.\n"
          },
          "interval": {
            "type": "number",
            "description": "The time interval (in seconds) between each probe request.<br>Best Practice - The interval value should be lower than the timeout value.\n"
          },
          "managementNetworkProbeId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "protocol": {
            "type": "string",
            "description": "The probing protocol to use.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "timeout": {
            "type": "number",
            "description": "The probe expiration timeout (in seconds). If there is not a single reply within this time, the status of the probe changes to \"Down\".\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNuageDataCenterServer:ManagementNuageDataCenterServer": {
      "description": "This resource allows you to execute Check Point Nuage Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testNuage = new checkpoint.ManagementNuageDataCenterServer(\"testNuage\", {\n    name: \"MyNuage\",\n    organization: \"MY_ORG\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_nuage = checkpoint.ManagementNuageDataCenterServer(\"testNuage\",\n    name=\"MyNuage\",\n    organization=\"MY_ORG\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testNuage = new Checkpoint.ManagementNuageDataCenterServer(\"testNuage\", new()\n    {\n        Name = \"MyNuage\",\n        Organization = \"MY_ORG\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNuageDataCenterServer(ctx, \"testNuage\", &checkpoint.ManagementNuageDataCenterServerArgs{\n\t\t\tName:         pulumi.String(\"MyNuage\"),\n\t\t\tOrganization: pulumi.String(\"MY_ORG\"),\n\t\t\tUsername:     pulumi.String(\"USERNAME\"),\n\t\t\tPassword:     pulumi.String(\"PASSWORD\"),\n\t\t\tHostname:     pulumi.String(\"HOSTNAME\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNuageDataCenterServer;\nimport com.pulumi.checkpoint.ManagementNuageDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testNuage = new ManagementNuageDataCenterServer(\"testNuage\", ManagementNuageDataCenterServerArgs.builder()\n            .name(\"MyNuage\")\n            .organization(\"MY_ORG\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testNuage:\n    type: checkpoint:ManagementNuageDataCenterServer\n    properties:\n      name: MyNuage\n      organization: MY_ORG\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP address or hostname of the Nuage server.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNuageDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "organization": {
          "type": "string",
          "description": "Organization name or enterprise.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Nuage administrator.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the Nuage administrator encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the Nuage administrator.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "hostname",
        "managementNuageDataCenterServerId",
        "name",
        "organization",
        "username"
      ],
      "inputProperties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP address or hostname of the Nuage server.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNuageDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "organization": {
          "type": "string",
          "description": "Organization name or enterprise.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Nuage administrator.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the Nuage administrator encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the Nuage administrator.\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "hostname",
        "organization",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNuageDataCenterServer resources.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string",
            "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hostname": {
            "type": "string",
            "description": "IP address or hostname of the Nuage server.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementNuageDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "organization": {
            "type": "string",
            "description": "Organization name or enterprise.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the Nuage administrator.\n",
            "secret": true
          },
          "passwordBase64": {
            "type": "string",
            "description": "Password of the Nuage administrator encoded in Base64.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          },
          "username": {
            "type": "string",
            "description": "Username of the Nuage administrator.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementNutanixDataCenterServer:ManagementNutanixDataCenterServer": {
      "description": "This resource allows you to execute Check Point Nutanix Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testNutanix = new checkpoint.ManagementNutanixDataCenterServer(\"testNutanix\", {\n    name: \"MY-NUTANIX\",\n    hostname: \"127.0.0.1\",\n    username: \"admin\",\n    password: \"admin\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_nutanix = checkpoint.ManagementNutanixDataCenterServer(\"testNutanix\",\n    name=\"MY-NUTANIX\",\n    hostname=\"127.0.0.1\",\n    username=\"admin\",\n    password=\"admin\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testNutanix = new Checkpoint.ManagementNutanixDataCenterServer(\"testNutanix\", new()\n    {\n        Name = \"MY-NUTANIX\",\n        Hostname = \"127.0.0.1\",\n        Username = \"admin\",\n        Password = \"admin\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementNutanixDataCenterServer(ctx, \"testNutanix\", &checkpoint.ManagementNutanixDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MY-NUTANIX\"),\n\t\t\tHostname: pulumi.String(\"127.0.0.1\"),\n\t\t\tUsername: pulumi.String(\"admin\"),\n\t\t\tPassword: pulumi.String(\"admin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNutanixDataCenterServer;\nimport com.pulumi.checkpoint.ManagementNutanixDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testNutanix = new ManagementNutanixDataCenterServer(\"testNutanix\", ManagementNutanixDataCenterServerArgs.builder()\n            .name(\"MY-NUTANIX\")\n            .hostname(\"127.0.0.1\")\n            .username(\"admin\")\n            .password(\"admin\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testNutanix:\n    type: checkpoint:ManagementNutanixDataCenterServer\n    properties:\n      name: MY-NUTANIX\n      hostname: 127.0.0.1\n      username: admin\n      password: admin\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "automaticRefresh": {
          "type": "boolean",
          "description": "Indicates whether the data center server's content is automatically updated.\n"
        },
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenterType": {
          "type": "string",
          "description": "Data center type.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP Address or hostname of the Nutanix Prism Central server.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNutanixDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Nutanix Prism Central server.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the Nutanix Prism Central server.\n"
        }
      },
      "type": "object",
      "required": [
        "automaticRefresh",
        "dataCenterType",
        "hostname",
        "managementNutanixDataCenterServerId",
        "name",
        "password",
        "username"
      ],
      "inputProperties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP Address or hostname of the Nutanix Prism Central server.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementNutanixDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the Nutanix Prism Central server.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the Nutanix Prism Central server.\n"
        }
      },
      "requiredInputs": [
        "hostname",
        "password",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementNutanixDataCenterServer resources.\n",
        "properties": {
          "automaticRefresh": {
            "type": "boolean",
            "description": "Indicates whether the data center server's content is automatically updated.\n"
          },
          "certificateFingerprint": {
            "type": "string",
            "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataCenterType": {
            "type": "string",
            "description": "Data center type.\n"
          },
          "hostname": {
            "type": "string",
            "description": "IP Address or hostname of the Nutanix Prism Central server.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementNutanixDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the Nutanix Prism Central server.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          },
          "username": {
            "type": "string",
            "description": "Username of the Nutanix Prism Central server.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementOpenstackDataCenterServer:ManagementOpenstackDataCenterServer": {
      "description": "This resource allows you to execute Check Point OpenStack Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testOpenStack = new checkpoint.ManagementOpenstackDataCenterServer(\"testOpenStack\", {\n    name: \"MyOpenStack\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_open_stack = checkpoint.ManagementOpenstackDataCenterServer(\"testOpenStack\",\n    name=\"MyOpenStack\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testOpenStack = new Checkpoint.ManagementOpenstackDataCenterServer(\"testOpenStack\", new()\n    {\n        Name = \"MyOpenStack\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementOpenstackDataCenterServer(ctx, \"testOpenStack\", &checkpoint.ManagementOpenstackDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyOpenStack\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tHostname: pulumi.String(\"HOSTNAME\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOpenstackDataCenterServer;\nimport com.pulumi.checkpoint.ManagementOpenstackDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testOpenStack = new ManagementOpenstackDataCenterServer(\"testOpenStack\", ManagementOpenstackDataCenterServerArgs.builder()\n            .name(\"MyOpenStack\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testOpenStack:\n    type: checkpoint:ManagementOpenstackDataCenterServer\n    properties:\n      name: MyOpenStack\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "URL of the OpenStack server. <br>Format: http(s):\\//\\<host\\>:\\<port\\>/\\<version\\><br>Example: https://1.2.3.4:5000/v2.0\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementOpenstackDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the OpenStack server.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the OpenStack server encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the OpenStack server. To login to specific domain insert domain name before username. Example: <domain>/<username>\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "hostname",
        "managementOpenstackDataCenterServerId",
        "name",
        "username"
      ],
      "inputProperties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "URL of the OpenStack server. <br>Format: http(s):\\//\\<host\\>:\\<port\\>/\\<version\\><br>Example: https://1.2.3.4:5000/v2.0\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementOpenstackDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the OpenStack server.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the OpenStack server encoded in Base64.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the OpenStack server. To login to specific domain insert domain name before username. Example: <domain>/<username>\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "hostname",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementOpenstackDataCenterServer resources.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string",
            "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hostname": {
            "type": "string",
            "description": "URL of the OpenStack server. <br>Format: http(s):\\//\\<host\\>:\\<port\\>/\\<version\\><br>Example: https://1.2.3.4:5000/v2.0\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementOpenstackDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the OpenStack server.\n",
            "secret": true
          },
          "passwordBase64": {
            "type": "string",
            "description": "Password of the OpenStack server encoded in Base64.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          },
          "username": {
            "type": "string",
            "description": "Username of the OpenStack server. To login to specific domain insert domain name before username. Example: <domain>/<username>\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementOpsecApplication:ManagementOpsecApplication": {
      "description": "This resource allows you to execute Check Point Opsec Application.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOpsecApplication(\"example\", {\n    name: \"MyOpsecApplication\",\n    host: \"SomeHost\",\n    oneTimePassword: \"SomePassword\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOpsecApplication(\"example\",\n    name=\"MyOpsecApplication\",\n    host=\"SomeHost\",\n    one_time_password=\"SomePassword\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementOpsecApplication(\"example\", new()\n    {\n        Name = \"MyOpsecApplication\",\n        Host = \"SomeHost\",\n        OneTimePassword = \"SomePassword\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementOpsecApplication(ctx, \"example\", &checkpoint.ManagementOpsecApplicationArgs{\n\t\t\tName:            pulumi.String(\"MyOpsecApplication\"),\n\t\t\tHost:            pulumi.String(\"SomeHost\"),\n\t\t\tOneTimePassword: pulumi.String(\"SomePassword\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOpsecApplication;\nimport com.pulumi.checkpoint.ManagementOpsecApplicationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOpsecApplication(\"example\", ManagementOpsecApplicationArgs.builder()\n            .name(\"MyOpsecApplication\")\n            .host(\"SomeHost\")\n            .oneTimePassword(\"SomePassword\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOpsecApplication\n    properties:\n      name: MyOpsecApplication\n      host: SomeHost\n      oneTimePassword: SomePassword\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cpmi": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Used to setup the CPMI client entity.cpmi blocks are documented below.\n"
        },
        "host": {
          "type": "string",
          "description": "The host where the server is running. Pre-define the host as a network object.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "lea": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Used to setup the LEA client entity.lea blocks are documented below.\n"
        },
        "managementOpsecApplicationId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "A password required for establishing a Secure Internal Communication (SIC).\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementOpsecApplicationId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cpmi": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Used to setup the CPMI client entity.cpmi blocks are documented below.\n"
        },
        "host": {
          "type": "string",
          "description": "The host where the server is running. Pre-define the host as a network object.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "lea": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Used to setup the LEA client entity.lea blocks are documented below.\n"
        },
        "managementOpsecApplicationId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "A password required for establishing a Secure Internal Communication (SIC).\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementOpsecApplication resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "cpmi": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Used to setup the CPMI client entity.cpmi blocks are documented below.\n"
          },
          "host": {
            "type": "string",
            "description": "The host where the server is running. Pre-define the host as a network object.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "lea": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Used to setup the LEA client entity.lea blocks are documented below.\n"
          },
          "managementOpsecApplicationId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "oneTimePassword": {
            "type": "string",
            "description": "A password required for establishing a Secure Internal Communication (SIC).\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementOpsecTrustedCa:ManagementOpsecTrustedCa": {
      "description": "This resource allows you to execute Check Point Opsec Trusted Ca.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOpsecTrustedCa(\"example\", {\n    name: \"opsec_ca\",\n    base64Certificate: \"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\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOpsecTrustedCa(\"example\",\n    name=\"opsec_ca\",\n    base64_certificate=\"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\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementOpsecTrustedCa(\"example\", new()\n    {\n        Name = \"opsec_ca\",\n        Base64Certificate = \"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\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementOpsecTrustedCa(ctx, \"example\", &checkpoint.ManagementOpsecTrustedCaArgs{\n\t\t\tName:              pulumi.String(\"opsec_ca\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOpsecTrustedCa;\nimport com.pulumi.checkpoint.ManagementOpsecTrustedCaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOpsecTrustedCa(\"example\", ManagementOpsecTrustedCaArgs.builder()\n            .name(\"opsec_ca\")\n            .base64Certificate(\"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\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOpsecTrustedCa\n    properties:\n      name: opsec_ca\n      base64Certificate: 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\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowCertificatesFromBranches": {
          "type": "boolean",
          "description": "Allow only certificates from listed branches.\n"
        },
        "automaticEnrollment": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollment:ManagementOpsecTrustedCaAutomaticEnrollment",
          "description": "Certificate automatic enrollment.automatic_enrollment blocks are documented below.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "branches": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\".branches blocks are documented below.\n"
        },
        "cacheCrl": {
          "type": "boolean",
          "description": "Cache Certificate Revocation List on the Security Gateway.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "crlCacheMethod": {
          "type": "string",
          "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period.\n"
        },
        "crlCacheTimeout": {
          "type": "number",
          "description": "When to fetch new Certificate Revocation List (in minutes).\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementOpsecTrustedCaId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "retrieveCrlFromHttpServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from http servers.\n"
        },
        "retrieveCrlFromLdapServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from ldap servers.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "managementOpsecTrustedCaId",
        "name"
      ],
      "inputProperties": {
        "allowCertificatesFromBranches": {
          "type": "boolean",
          "description": "Allow only certificates from listed branches.\n"
        },
        "automaticEnrollment": {
          "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollment:ManagementOpsecTrustedCaAutomaticEnrollment",
          "description": "Certificate automatic enrollment.automatic_enrollment blocks are documented below.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "branches": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\".branches blocks are documented below.\n"
        },
        "cacheCrl": {
          "type": "boolean",
          "description": "Cache Certificate Revocation List on the Security Gateway.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "crlCacheMethod": {
          "type": "string",
          "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period.\n"
        },
        "crlCacheTimeout": {
          "type": "number",
          "description": "When to fetch new Certificate Revocation List (in minutes).\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementOpsecTrustedCaId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "retrieveCrlFromHttpServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from http servers.\n"
        },
        "retrieveCrlFromLdapServers": {
          "type": "boolean",
          "description": "Whether to retrieve Certificate Revocation List from ldap servers.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "base64Certificate"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementOpsecTrustedCa resources.\n",
        "properties": {
          "allowCertificatesFromBranches": {
            "type": "boolean",
            "description": "Allow only certificates from listed branches.\n"
          },
          "automaticEnrollment": {
            "$ref": "#/types/checkpoint:index%2FManagementOpsecTrustedCaAutomaticEnrollment:ManagementOpsecTrustedCaAutomaticEnrollment",
            "description": "Certificate automatic enrollment.automatic_enrollment blocks are documented below.\n"
          },
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64.\n"
          },
          "branches": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Branches to allow certificates from. Required only if \"allow-certificates-from-branches\" set to \"true\".branches blocks are documented below.\n"
          },
          "cacheCrl": {
            "type": "boolean",
            "description": "Cache Certificate Revocation List on the Security Gateway.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "crlCacheMethod": {
            "type": "string",
            "description": "Weather to retrieve new Certificate Revocation List after the certificate expires or after a fixed period.\n"
          },
          "crlCacheTimeout": {
            "type": "number",
            "description": "When to fetch new Certificate Revocation List (in minutes).\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementOpsecTrustedCaId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "retrieveCrlFromHttpServers": {
            "type": "boolean",
            "description": "Whether to retrieve Certificate Revocation List from http servers.\n"
          },
          "retrieveCrlFromLdapServers": {
            "type": "boolean",
            "description": "Whether to retrieve Certificate Revocation List from ldap servers.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementOracleCloudDataCenterServer:ManagementOracleCloudDataCenterServer": {
      "description": "This resource allows you to execute Check Point Oracle Cloud Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testOracleCloud = new checkpoint.ManagementOracleCloudDataCenterServer(\"testOracleCloud\", {\n    name: \"MY-ORACLE-CLOUD\",\n    authenticationMethod: \"key-authentication\",\n    privateKey: \"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\",\n    keyUser: \"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\",\n    keyTenant: \"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\",\n    keyRegion: \"eu-frankfurt-1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_oracle_cloud = checkpoint.ManagementOracleCloudDataCenterServer(\"testOracleCloud\",\n    name=\"MY-ORACLE-CLOUD\",\n    authentication_method=\"key-authentication\",\n    private_key=\"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\",\n    key_user=\"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\",\n    key_tenant=\"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\",\n    key_region=\"eu-frankfurt-1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testOracleCloud = new Checkpoint.ManagementOracleCloudDataCenterServer(\"testOracleCloud\", new()\n    {\n        Name = \"MY-ORACLE-CLOUD\",\n        AuthenticationMethod = \"key-authentication\",\n        PrivateKey = \"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\",\n        KeyUser = \"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\",\n        KeyTenant = \"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\",\n        KeyRegion = \"eu-frankfurt-1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementOracleCloudDataCenterServer(ctx, \"testOracleCloud\", &checkpoint.ManagementOracleCloudDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"MY-ORACLE-CLOUD\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"key-authentication\"),\n\t\t\tPrivateKey:           pulumi.String(\"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\"),\n\t\t\tKeyUser:              pulumi.String(\"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\"),\n\t\t\tKeyTenant:            pulumi.String(\"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\"),\n\t\t\tKeyRegion:            pulumi.String(\"eu-frankfurt-1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOracleCloudDataCenterServer;\nimport com.pulumi.checkpoint.ManagementOracleCloudDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testOracleCloud = new ManagementOracleCloudDataCenterServer(\"testOracleCloud\", ManagementOracleCloudDataCenterServerArgs.builder()\n            .name(\"MY-ORACLE-CLOUD\")\n            .authenticationMethod(\"key-authentication\")\n            .privateKey(\"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\")\n            .keyUser(\"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\")\n            .keyTenant(\"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\")\n            .keyRegion(\"eu-frankfurt-1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testOracleCloud:\n    type: checkpoint:ManagementOracleCloudDataCenterServer\n    properties:\n      name: MY-ORACLE-CLOUD\n      authenticationMethod: key-authentication\n      privateKey: 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\n      keyUser: ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\n      keyTenant: ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\n      keyRegion: eu-frankfurt-1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "key-authentication uses the Service Account private key file to authenticate. vm-instance-authentication uses VM Instance to authenticate. This option requires the Security Management Server deployed in Oracle Cloud, and running in a dynamic group with the required permissions.\n"
        },
        "automaticRefresh": {
          "type": "boolean",
          "description": "Indicates whether the data center server's content is automatically updated.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "dataCenterType": {
          "type": "string",
          "description": "Data center type.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keyRegion": {
          "type": "string",
          "description": "An Oracle Cloud region for where to create scanner. Required for authentication-method: key-authentication.\n"
        },
        "keyTenant": {
          "type": "string",
          "description": "An Oracle Cloud tenancy id where the key was created. Required for authentication-method: key-authentication.\n"
        },
        "keyUser": {
          "type": "string",
          "description": "An Oracle Cloud user id associated with key. Required for authentication-method: key-authentication.\n"
        },
        "managementOracleCloudDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "privateKey": {
          "type": "string",
          "description": "An Oracle Cloud API key PEM file, encoded in base64. Required for authentication-method: key-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "authenticationMethod",
        "automaticRefresh",
        "dataCenterType",
        "keyRegion",
        "keyTenant",
        "keyUser",
        "managementOracleCloudDataCenterServerId",
        "name",
        "privateKey"
      ],
      "inputProperties": {
        "authenticationMethod": {
          "type": "string",
          "description": "key-authentication uses the Service Account private key file to authenticate. vm-instance-authentication uses VM Instance to authenticate. This option requires the Security Management Server deployed in Oracle Cloud, and running in a dynamic group with the required permissions.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keyRegion": {
          "type": "string",
          "description": "An Oracle Cloud region for where to create scanner. Required for authentication-method: key-authentication.\n"
        },
        "keyTenant": {
          "type": "string",
          "description": "An Oracle Cloud tenancy id where the key was created. Required for authentication-method: key-authentication.\n"
        },
        "keyUser": {
          "type": "string",
          "description": "An Oracle Cloud user id associated with key. Required for authentication-method: key-authentication.\n"
        },
        "managementOracleCloudDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "privateKey": {
          "type": "string",
          "description": "An Oracle Cloud API key PEM file, encoded in base64. Required for authentication-method: key-authentication.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "requiredInputs": [
        "authenticationMethod",
        "keyRegion",
        "keyTenant",
        "keyUser",
        "privateKey"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementOracleCloudDataCenterServer resources.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string",
            "description": "key-authentication uses the Service Account private key file to authenticate. vm-instance-authentication uses VM Instance to authenticate. This option requires the Security Management Server deployed in Oracle Cloud, and running in a dynamic group with the required permissions.\n"
          },
          "automaticRefresh": {
            "type": "boolean",
            "description": "Indicates whether the data center server's content is automatically updated.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "dataCenterType": {
            "type": "string",
            "description": "Data center type.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keyRegion": {
            "type": "string",
            "description": "An Oracle Cloud region for where to create scanner. Required for authentication-method: key-authentication.\n"
          },
          "keyTenant": {
            "type": "string",
            "description": "An Oracle Cloud tenancy id where the key was created. Required for authentication-method: key-authentication.\n"
          },
          "keyUser": {
            "type": "string",
            "description": "An Oracle Cloud user id associated with key. Required for authentication-method: key-authentication.\n"
          },
          "managementOracleCloudDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "privateKey": {
            "type": "string",
            "description": "An Oracle Cloud API key PEM file, encoded in base64. Required for authentication-method: key-authentication.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementOutboundInspectionCertificate:ManagementOutboundInspectionCertificate": {
      "description": "This resource allows you to execute Check Point Outbound Inspection Certificate.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOutboundInspectionCertificate(\"example\", {\n    name: \"cert2\",\n    issuedBy: \"www.checkpoint.com\",\n    base64Password: \"bXlfcGFzc3dvcmQ=\",\n    validFrom: \"2021-04-17\",\n    validTo: \"2028-04-17\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOutboundInspectionCertificate(\"example\",\n    name=\"cert2\",\n    issued_by=\"www.checkpoint.com\",\n    base64_password=\"bXlfcGFzc3dvcmQ=\",\n    valid_from=\"2021-04-17\",\n    valid_to=\"2028-04-17\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementOutboundInspectionCertificate(\"example\", new()\n    {\n        Name = \"cert2\",\n        IssuedBy = \"www.checkpoint.com\",\n        Base64Password = \"bXlfcGFzc3dvcmQ=\",\n        ValidFrom = \"2021-04-17\",\n        ValidTo = \"2028-04-17\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementOutboundInspectionCertificate(ctx, \"example\", &checkpoint.ManagementOutboundInspectionCertificateArgs{\n\t\t\tName:           pulumi.String(\"cert2\"),\n\t\t\tIssuedBy:       pulumi.String(\"www.checkpoint.com\"),\n\t\t\tBase64Password: pulumi.String(\"bXlfcGFzc3dvcmQ=\"),\n\t\t\tValidFrom:      pulumi.String(\"2021-04-17\"),\n\t\t\tValidTo:        pulumi.String(\"2028-04-17\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOutboundInspectionCertificate;\nimport com.pulumi.checkpoint.ManagementOutboundInspectionCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOutboundInspectionCertificate(\"example\", ManagementOutboundInspectionCertificateArgs.builder()\n            .name(\"cert2\")\n            .issuedBy(\"www.checkpoint.com\")\n            .base64Password(\"bXlfcGFzc3dvcmQ=\")\n            .validFrom(\"2021-04-17\")\n            .validTo(\"2028-04-17\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOutboundInspectionCertificate\n    properties:\n      name: cert2\n      issuedBy: www.checkpoint.com\n      base64Password: bXlfcGFzc3dvcmQ=\n      validFrom: 2021-04-17\n      validTo: 2028-04-17\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        },
        "base64PublicCertificate": {
          "type": "string",
          "description": "Public Certificate file encoded in base64 (pem format).\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "isDefault": {
          "type": "boolean",
          "description": "Is the certificate the default certificate.\n"
        },
        "issuedBy": {
          "type": "string",
          "description": "The DN (Distinguished Name) of the certificate.\n"
        },
        "managementOutboundInspectionCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "validFrom": {
          "type": "string",
          "description": "The date, from which the certificate is valid. Format: YYYY-MM-DD.\n"
        },
        "validTo": {
          "type": "string",
          "description": "The certificate expiration date. Format: YYYY-MM-DD.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "base64Password",
        "base64PublicCertificate",
        "issuedBy",
        "managementOutboundInspectionCertificateId",
        "name",
        "validFrom",
        "validTo"
      ],
      "inputProperties": {
        "base64Password": {
          "type": "string",
          "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "isDefault": {
          "type": "boolean",
          "description": "Is the certificate the default certificate.\n"
        },
        "issuedBy": {
          "type": "string",
          "description": "The DN (Distinguished Name) of the certificate.\n"
        },
        "managementOutboundInspectionCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "validFrom": {
          "type": "string",
          "description": "The date, from which the certificate is valid. Format: YYYY-MM-DD.\n"
        },
        "validTo": {
          "type": "string",
          "description": "The certificate expiration date. Format: YYYY-MM-DD.\n"
        }
      },
      "requiredInputs": [
        "base64Password",
        "issuedBy",
        "validFrom",
        "validTo"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementOutboundInspectionCertificate resources.\n",
        "properties": {
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64.\n"
          },
          "base64Password": {
            "type": "string",
            "description": "Password (encoded in Base64 with padding) for the certificate file.\n"
          },
          "base64PublicCertificate": {
            "type": "string",
            "description": "Public Certificate file encoded in base64 (pem format).\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "isDefault": {
            "type": "boolean",
            "description": "Is the certificate the default certificate.\n"
          },
          "issuedBy": {
            "type": "string",
            "description": "The DN (Distinguished Name) of the certificate.\n"
          },
          "managementOutboundInspectionCertificateId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "validFrom": {
            "type": "string",
            "description": "The date, from which the certificate is valid. Format: YYYY-MM-DD.\n"
          },
          "validTo": {
            "type": "string",
            "description": "The certificate expiration date. Format: YYYY-MM-DD.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementOverrideCategorization:ManagementOverrideCategorization": {
      "description": "This resource allows you to execute Check Point Override Categorization.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOverrideCategorization(\"example\", {\n    url: \"newOverride\",\n    newPrimaryCategory: \"Botnets\",\n    risk: \"low\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOverrideCategorization(\"example\",\n    url=\"newOverride\",\n    new_primary_category=\"Botnets\",\n    risk=\"low\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementOverrideCategorization(\"example\", new()\n    {\n        Url = \"newOverride\",\n        NewPrimaryCategory = \"Botnets\",\n        Risk = \"low\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementOverrideCategorization(ctx, \"example\", &checkpoint.ManagementOverrideCategorizationArgs{\n\t\t\tUrl:                pulumi.String(\"newOverride\"),\n\t\t\tNewPrimaryCategory: pulumi.String(\"Botnets\"),\n\t\t\tRisk:               pulumi.String(\"low\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOverrideCategorization;\nimport com.pulumi.checkpoint.ManagementOverrideCategorizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOverrideCategorization(\"example\", ManagementOverrideCategorizationArgs.builder()\n            .url(\"newOverride\")\n            .newPrimaryCategory(\"Botnets\")\n            .risk(\"low\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOverrideCategorization\n    properties:\n      url: newOverride\n      newPrimaryCategory: Botnets\n      risk: low\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "additionalCategories": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Uid or name of the categories to override in the Application and URL Filtering or Threat Prevention.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementOverrideCategorizationId": {
          "type": "string"
        },
        "newPrimaryCategory": {
          "type": "string",
          "description": "Uid or name of the primary category based on its most defining aspect.\n"
        },
        "risk": {
          "type": "string",
          "description": "States the override categorization risk.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "url": {
          "type": "string",
          "description": "The URL for which we want to update the category and risk definitions, the URL and the object name are the same for Override Categorization.\n"
        },
        "urlDefinedAsRegularExpression": {
          "type": "boolean",
          "description": "States whether the URL is defined as a Regular Expression or not.\n"
        }
      },
      "type": "object",
      "required": [
        "managementOverrideCategorizationId",
        "url"
      ],
      "inputProperties": {
        "additionalCategories": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Uid or name of the categories to override in the Application and URL Filtering or Threat Prevention.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementOverrideCategorizationId": {
          "type": "string"
        },
        "newPrimaryCategory": {
          "type": "string",
          "description": "Uid or name of the primary category based on its most defining aspect.\n"
        },
        "risk": {
          "type": "string",
          "description": "States the override categorization risk.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "url": {
          "type": "string",
          "description": "The URL for which we want to update the category and risk definitions, the URL and the object name are the same for Override Categorization.\n"
        },
        "urlDefinedAsRegularExpression": {
          "type": "boolean",
          "description": "States whether the URL is defined as a Regular Expression or not.\n"
        }
      },
      "requiredInputs": [
        "url"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementOverrideCategorization resources.\n",
        "properties": {
          "additionalCategories": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Uid or name of the categories to override in the Application and URL Filtering or Threat Prevention.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementOverrideCategorizationId": {
            "type": "string"
          },
          "newPrimaryCategory": {
            "type": "string",
            "description": "Uid or name of the primary category based on its most defining aspect.\n"
          },
          "risk": {
            "type": "string",
            "description": "States the override categorization risk.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "url": {
            "type": "string",
            "description": "The URL for which we want to update the category and risk definitions, the URL and the object name are the same for Override Categorization.\n"
          },
          "urlDefinedAsRegularExpression": {
            "type": "boolean",
            "description": "States whether the URL is defined as a Regular Expression or not.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementPackage:ManagementPackage": {
      "description": "This resource allows you to add/update/delete Check Point Package Object.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementPackage(\"example\", {\n    name: \"New_Standard_Package_1\",\n    comments: \"My Comments\",\n    color: \"green\",\n    threatPrevention: false,\n    access: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementPackage(\"example\",\n    name=\"New_Standard_Package_1\",\n    comments=\"My Comments\",\n    color=\"green\",\n    threat_prevention=False,\n    access=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementPackage(\"example\", new()\n    {\n        Name = \"New_Standard_Package_1\",\n        Comments = \"My Comments\",\n        Color = \"green\",\n        ThreatPrevention = false,\n        Access = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementPackage(ctx, \"example\", &checkpoint.ManagementPackageArgs{\n\t\t\tName:             pulumi.String(\"New_Standard_Package_1\"),\n\t\t\tComments:         pulumi.String(\"My Comments\"),\n\t\t\tColor:            pulumi.String(\"green\"),\n\t\t\tThreatPrevention: pulumi.Bool(false),\n\t\t\tAccess:           pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementPackage;\nimport com.pulumi.checkpoint.ManagementPackageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementPackage(\"example\", ManagementPackageArgs.builder()\n            .name(\"New_Standard_Package_1\")\n            .comments(\"My Comments\")\n            .color(\"green\")\n            .threatPrevention(false)\n            .access(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementPackage\n    properties:\n      name: New_Standard_Package_1\n      comments: My Comments\n      color: green\n      threatPrevention: false\n      access: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "access": {
          "type": "boolean",
          "description": "True - enables, False - disables access & NAT policies, empty - nothing is changed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "desktopSecurity": {
          "type": "boolean",
          "description": "True - enables, False - disables Desktop security policy, empty - nothing is changed.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installationTargets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on."
        },
        "managementPackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "True - enables, False - disables QoS policy, empty - nothing is changed.\n"
        },
        "qosPolicyType": {
          "type": "string",
          "description": "QoS policy type.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "threatPrevention": {
          "type": "boolean",
          "description": "True - enables, False - disables Threat policy, empty - nothing is changed.\n"
        },
        "vpnTraditionalMode": {
          "type": "boolean",
          "description": "True - enables, False - disables VPN traditional mode, empty - nothing is changed.\n"
        }
      },
      "type": "object",
      "required": [
        "managementPackageId",
        "name"
      ],
      "inputProperties": {
        "access": {
          "type": "boolean",
          "description": "True - enables, False - disables access & NAT policies, empty - nothing is changed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "desktopSecurity": {
          "type": "boolean",
          "description": "True - enables, False - disables Desktop security policy, empty - nothing is changed.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installationTargets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on."
        },
        "managementPackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "True - enables, False - disables QoS policy, empty - nothing is changed.\n"
        },
        "qosPolicyType": {
          "type": "string",
          "description": "QoS policy type.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "threatPrevention": {
          "type": "boolean",
          "description": "True - enables, False - disables Threat policy, empty - nothing is changed.\n"
        },
        "vpnTraditionalMode": {
          "type": "boolean",
          "description": "True - enables, False - disables VPN traditional mode, empty - nothing is changed.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementPackage resources.\n",
        "properties": {
          "access": {
            "type": "boolean",
            "description": "True - enables, False - disables access & NAT policies, empty - nothing is changed.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "desktopSecurity": {
            "type": "boolean",
            "description": "True - enables, False - disables Desktop security policy, empty - nothing is changed.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installationTargets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on."
          },
          "managementPackageId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "qos": {
            "type": "boolean",
            "description": "True - enables, False - disables QoS policy, empty - nothing is changed.\n"
          },
          "qosPolicyType": {
            "type": "string",
            "description": "QoS policy type.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "threatPrevention": {
            "type": "boolean",
            "description": "True - enables, False - disables Threat policy, empty - nothing is changed.\n"
          },
          "vpnTraditionalMode": {
            "type": "boolean",
            "description": "True - enables, False - disables VPN traditional mode, empty - nothing is changed.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementPasscodeProfile:ManagementPasscodeProfile": {
      "description": "This resource allows you to execute Check Point Passcode Profile.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementPasscodeProfile(\"example\", {\n    name: \"New App Passcode Policy\",\n    allowSimplePasscode: false,\n    minPasscodeLength: 10,\n    requireAlphanumericPasscode: true,\n    minPasscodeComplexCharacters: 3,\n    forcePasscodeExpiration: false,\n    passcodeExpirationPeriod: 190,\n    enableInactivityTimeLock: true,\n    maxInactivityTimeLock: 10,\n    enablePasscodeFailedAttempts: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementPasscodeProfile(\"example\",\n    name=\"New App Passcode Policy\",\n    allow_simple_passcode=False,\n    min_passcode_length=10,\n    require_alphanumeric_passcode=True,\n    min_passcode_complex_characters=3,\n    force_passcode_expiration=False,\n    passcode_expiration_period=190,\n    enable_inactivity_time_lock=True,\n    max_inactivity_time_lock=10,\n    enable_passcode_failed_attempts=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementPasscodeProfile(\"example\", new()\n    {\n        Name = \"New App Passcode Policy\",\n        AllowSimplePasscode = false,\n        MinPasscodeLength = 10,\n        RequireAlphanumericPasscode = true,\n        MinPasscodeComplexCharacters = 3,\n        ForcePasscodeExpiration = false,\n        PasscodeExpirationPeriod = 190,\n        EnableInactivityTimeLock = true,\n        MaxInactivityTimeLock = 10,\n        EnablePasscodeFailedAttempts = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementPasscodeProfile(ctx, \"example\", &checkpoint.ManagementPasscodeProfileArgs{\n\t\t\tName:                         pulumi.String(\"New App Passcode Policy\"),\n\t\t\tAllowSimplePasscode:          pulumi.Bool(false),\n\t\t\tMinPasscodeLength:            pulumi.Float64(10),\n\t\t\tRequireAlphanumericPasscode:  pulumi.Bool(true),\n\t\t\tMinPasscodeComplexCharacters: pulumi.Float64(3),\n\t\t\tForcePasscodeExpiration:      pulumi.Bool(false),\n\t\t\tPasscodeExpirationPeriod:     pulumi.Float64(190),\n\t\t\tEnableInactivityTimeLock:     pulumi.Bool(true),\n\t\t\tMaxInactivityTimeLock:        pulumi.Float64(10),\n\t\t\tEnablePasscodeFailedAttempts: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementPasscodeProfile;\nimport com.pulumi.checkpoint.ManagementPasscodeProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementPasscodeProfile(\"example\", ManagementPasscodeProfileArgs.builder()\n            .name(\"New App Passcode Policy\")\n            .allowSimplePasscode(false)\n            .minPasscodeLength(10.0)\n            .requireAlphanumericPasscode(true)\n            .minPasscodeComplexCharacters(3.0)\n            .forcePasscodeExpiration(false)\n            .passcodeExpirationPeriod(190.0)\n            .enableInactivityTimeLock(true)\n            .maxInactivityTimeLock(10.0)\n            .enablePasscodeFailedAttempts(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementPasscodeProfile\n    properties:\n      name: New App Passcode Policy\n      allowSimplePasscode: false\n      minPasscodeLength: 10\n      requireAlphanumericPasscode: true\n      minPasscodeComplexCharacters: 3\n      forcePasscodeExpiration: false\n      passcodeExpirationPeriod: 190\n      enableInactivityTimeLock: true\n      maxInactivityTimeLock: 10\n      enablePasscodeFailedAttempts: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowSimplePasscode": {
          "type": "boolean",
          "description": "The passcode length is 4 and only numeric values allowed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enableInactivityTimeLock": {
          "type": "boolean",
          "description": "Lock the device if app is inactive.\n"
        },
        "enablePasscodeFailedAttempts": {
          "type": "boolean",
          "description": "Exit after few failures in passcode verification.\n"
        },
        "enablePasscodeHistory": {
          "type": "boolean",
          "description": "Check passcode history for reparations.\n"
        },
        "forcePasscodeExpiration": {
          "type": "boolean",
          "description": "Enable/disable expiration date to the passcode.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementPasscodeProfileId": {
          "type": "string"
        },
        "maxInactivityTimeLock": {
          "type": "number",
          "description": "Time without user input before passcode must be re-entered (in minutes).\n"
        },
        "maxPasscodeFailedAttempts": {
          "type": "number",
          "description": "Number of failed attempts allowed.\n"
        },
        "minPasscodeComplexCharacters": {
          "type": "number",
          "description": "Minimum number of complex characters (if \"require-alphanumeric-passcode\" is enabled). The number of the complex characters cannot be greater than number of the passcode length.\n"
        },
        "minPasscodeLength": {
          "type": "number",
          "description": "Minimum passcode length - relevant if \"allow-simple-passcode\" is disable.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "passcodeExpirationPeriod": {
          "type": "number",
          "description": "The period in days after which the passcode will expire.\n"
        },
        "passcodeHistory": {
          "type": "number",
          "description": "Number of passcodes that will be kept in history.\n"
        },
        "requireAlphanumericPasscode": {
          "type": "boolean",
          "description": "Require alphanumeric characters in the passcode - relevant if \"allow-simple-passcode\" is disable.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementPasscodeProfileId",
        "name"
      ],
      "inputProperties": {
        "allowSimplePasscode": {
          "type": "boolean",
          "description": "The passcode length is 4 and only numeric values allowed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "enableInactivityTimeLock": {
          "type": "boolean",
          "description": "Lock the device if app is inactive.\n"
        },
        "enablePasscodeFailedAttempts": {
          "type": "boolean",
          "description": "Exit after few failures in passcode verification.\n"
        },
        "enablePasscodeHistory": {
          "type": "boolean",
          "description": "Check passcode history for reparations.\n"
        },
        "forcePasscodeExpiration": {
          "type": "boolean",
          "description": "Enable/disable expiration date to the passcode.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementPasscodeProfileId": {
          "type": "string"
        },
        "maxInactivityTimeLock": {
          "type": "number",
          "description": "Time without user input before passcode must be re-entered (in minutes).\n"
        },
        "maxPasscodeFailedAttempts": {
          "type": "number",
          "description": "Number of failed attempts allowed.\n"
        },
        "minPasscodeComplexCharacters": {
          "type": "number",
          "description": "Minimum number of complex characters (if \"require-alphanumeric-passcode\" is enabled). The number of the complex characters cannot be greater than number of the passcode length.\n"
        },
        "minPasscodeLength": {
          "type": "number",
          "description": "Minimum passcode length - relevant if \"allow-simple-passcode\" is disable.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "passcodeExpirationPeriod": {
          "type": "number",
          "description": "The period in days after which the passcode will expire.\n"
        },
        "passcodeHistory": {
          "type": "number",
          "description": "Number of passcodes that will be kept in history.\n"
        },
        "requireAlphanumericPasscode": {
          "type": "boolean",
          "description": "Require alphanumeric characters in the passcode - relevant if \"allow-simple-passcode\" is disable.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementPasscodeProfile resources.\n",
        "properties": {
          "allowSimplePasscode": {
            "type": "boolean",
            "description": "The passcode length is 4 and only numeric values allowed.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "enableInactivityTimeLock": {
            "type": "boolean",
            "description": "Lock the device if app is inactive.\n"
          },
          "enablePasscodeFailedAttempts": {
            "type": "boolean",
            "description": "Exit after few failures in passcode verification.\n"
          },
          "enablePasscodeHistory": {
            "type": "boolean",
            "description": "Check passcode history for reparations.\n"
          },
          "forcePasscodeExpiration": {
            "type": "boolean",
            "description": "Enable/disable expiration date to the passcode.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementPasscodeProfileId": {
            "type": "string"
          },
          "maxInactivityTimeLock": {
            "type": "number",
            "description": "Time without user input before passcode must be re-entered (in minutes).\n"
          },
          "maxPasscodeFailedAttempts": {
            "type": "number",
            "description": "Number of failed attempts allowed.\n"
          },
          "minPasscodeComplexCharacters": {
            "type": "number",
            "description": "Minimum number of complex characters (if \"require-alphanumeric-passcode\" is enabled). The number of the complex characters cannot be greater than number of the passcode length.\n"
          },
          "minPasscodeLength": {
            "type": "number",
            "description": "Minimum passcode length - relevant if \"allow-simple-passcode\" is disable.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "passcodeExpirationPeriod": {
            "type": "number",
            "description": "The period in days after which the passcode will expire.\n"
          },
          "passcodeHistory": {
            "type": "number",
            "description": "Number of passcodes that will be kept in history.\n"
          },
          "requireAlphanumericPasscode": {
            "type": "boolean",
            "description": "Require alphanumeric characters in the passcode - relevant if \"allow-simple-passcode\" is disable.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementPublish:ManagementPublish": {
      "properties": {
        "managementPublishId": {
          "type": "string"
        },
        "runPublishOnDestroy": {
          "type": "boolean",
          "description": "Destroy publish resource will run publish when flag set to true.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "triggers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Triggers a publish if there are any changes to objects in this list.\n"
        },
        "uid": {
          "type": "string",
          "description": "Session unique identifier. Specify it to publish a different session than the one you currently use.\n"
        }
      },
      "type": "object",
      "required": [
        "managementPublishId",
        "taskId"
      ],
      "inputProperties": {
        "managementPublishId": {
          "type": "string"
        },
        "runPublishOnDestroy": {
          "type": "boolean",
          "description": "Destroy publish resource will run publish when flag set to true.\n"
        },
        "triggers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Triggers a publish if there are any changes to objects in this list.\n"
        },
        "uid": {
          "type": "string",
          "description": "Session unique identifier. Specify it to publish a different session than the one you currently use.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementPublish resources.\n",
        "properties": {
          "managementPublishId": {
            "type": "string"
          },
          "runPublishOnDestroy": {
            "type": "boolean",
            "description": "Destroy publish resource will run publish when flag set to true.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "triggers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Triggers a publish if there are any changes to objects in this list.\n"
          },
          "uid": {
            "type": "string",
            "description": "Session unique identifier. Specify it to publish a different session than the one you currently use.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementPutFile:ManagementPutFile": {
      "description": "This command resource allows you to execute Check Point Put File.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst putFile = new checkpoint.ManagementPutFile(\"put_file\", {\n    filePath: \"/home/admin/\",\n    fileName: \"myfile.txt\",\n    fileContent: `first line\n second line`,\n    targets: [\"corporate-gateway\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nput_file = checkpoint.ManagementPutFile(\"put_file\",\n    file_path=\"/home/admin/\",\n    file_name=\"myfile.txt\",\n    file_content=\"\"\"first line\n second line\"\"\",\n    targets=[\"corporate-gateway\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var putFile = new Checkpoint.ManagementPutFile(\"put_file\", new()\n    {\n        FilePath = \"/home/admin/\",\n        FileName = \"myfile.txt\",\n        FileContent = @\"first line\n second line\",\n        Targets = new[]\n        {\n            \"corporate-gateway\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementPutFile(ctx, \"put_file\", &checkpoint.ManagementPutFileArgs{\n\t\t\tFilePath:    pulumi.String(\"/home/admin/\"),\n\t\t\tFileName:    pulumi.String(\"myfile.txt\"),\n\t\t\tFileContent: pulumi.String(\"first line\\n second line\"),\n\t\t\tTargets: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"corporate-gateway\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementPutFile;\nimport com.pulumi.checkpoint.ManagementPutFileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var putFile = new ManagementPutFile(\"putFile\", ManagementPutFileArgs.builder()\n            .filePath(\"/home/admin/\")\n            .fileName(\"myfile.txt\")\n            .fileContent(\"\"\"\nfirst line\n second line            \"\"\")\n            .targets(\"corporate-gateway\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  putFile:\n    type: checkpoint:ManagementPutFile\n    name: put_file\n    properties:\n      filePath: /home/admin/\n      fileName: myfile.txt\n      fileContent: |-\n        first line\n         second line\n      targets:\n        - corporate-gateway\n```\n<!--End PulumiCodeChooser -->\n\n## How To Use\n\nMake sure this command will be executed in the right execution order.\n",
      "properties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "fileContent": {
          "type": "string",
          "description": "Text file content.\n"
        },
        "fileName": {
          "type": "string",
          "description": "Text file name.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Text file target path.\n"
        },
        "managementPutFileId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "tasks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of asynchronous task unique identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementPutFileId",
        "targets",
        "tasks"
      ],
      "inputProperties": {
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "fileContent": {
          "type": "string",
          "description": "Text file content.\n"
        },
        "fileName": {
          "type": "string",
          "description": "Text file name.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Text file target path.\n"
        },
        "managementPutFileId": {
          "type": "string"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementPutFile resources.\n",
        "properties": {
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "fileContent": {
            "type": "string",
            "description": "Text file content.\n"
          },
          "fileName": {
            "type": "string",
            "description": "Text file name.\n"
          },
          "filePath": {
            "type": "string",
            "description": "Text file target path.\n"
          },
          "managementPutFileId": {
            "type": "string"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "tasks": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of asynchronous task unique identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRadiusGroup:ManagementRadiusGroup": {
      "description": "This resource allows you to add/update/delete Check Point Radius Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst host = new checkpoint.ManagementHost(\"host\", {\n    name: \"My Host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst radiusServer = new checkpoint.ManagementRadiusServer(\"radius_server\", {\n    name: \"New Radius Server\",\n    server: host.name,\n    sharedSecret: \"123\",\n});\nconst radiusGroup = new checkpoint.ManagementRadiusGroup(\"radius_group\", {\n    name: \"New Radius Group\",\n    members: [radiusServer.name],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhost = checkpoint.ManagementHost(\"host\",\n    name=\"My Host\",\n    ipv4_address=\"1.2.3.4\")\nradius_server = checkpoint.ManagementRadiusServer(\"radius_server\",\n    name=\"New Radius Server\",\n    server=host.name,\n    shared_secret=\"123\")\nradius_group = checkpoint.ManagementRadiusGroup(\"radius_group\",\n    name=\"New Radius Group\",\n    members=[radius_server.name])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var host = new Checkpoint.ManagementHost(\"host\", new()\n    {\n        Name = \"My Host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var radiusServer = new Checkpoint.ManagementRadiusServer(\"radius_server\", new()\n    {\n        Name = \"New Radius Server\",\n        Server = host.Name,\n        SharedSecret = \"123\",\n    });\n\n    var radiusGroup = new Checkpoint.ManagementRadiusGroup(\"radius_group\", new()\n    {\n        Name = \"New Radius Group\",\n        Members = new[]\n        {\n            radiusServer.Name,\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thost, err := checkpoint.NewManagementHost(ctx, \"host\", &checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"My Host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tradiusServer, err := checkpoint.NewManagementRadiusServer(ctx, \"radius_server\", &checkpoint.ManagementRadiusServerArgs{\n\t\t\tName:         pulumi.String(\"New Radius Server\"),\n\t\t\tServer:       host.Name,\n\t\t\tSharedSecret: pulumi.String(\"123\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementRadiusGroup(ctx, \"radius_group\", &checkpoint.ManagementRadiusGroupArgs{\n\t\t\tName: pulumi.String(\"New Radius Group\"),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tradiusServer.Name,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.ManagementRadiusServer;\nimport com.pulumi.checkpoint.ManagementRadiusServerArgs;\nimport com.pulumi.checkpoint.ManagementRadiusGroup;\nimport com.pulumi.checkpoint.ManagementRadiusGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var host = new ManagementHost(\"host\", ManagementHostArgs.builder()\n            .name(\"My Host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        var radiusServer = new ManagementRadiusServer(\"radiusServer\", ManagementRadiusServerArgs.builder()\n            .name(\"New Radius Server\")\n            .server(host.name())\n            .sharedSecret(\"123\")\n            .build());\n\n        var radiusGroup = new ManagementRadiusGroup(\"radiusGroup\", ManagementRadiusGroupArgs.builder()\n            .name(\"New Radius Group\")\n            .members(radiusServer.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  host:\n    type: checkpoint:ManagementHost\n    properties:\n      name: My Host\n      ipv4Address: 1.2.3.4\n  radiusServer:\n    type: checkpoint:ManagementRadiusServer\n    name: radius_server\n    properties:\n      name: New Radius Server\n      server: ${host.name}\n      sharedSecret: '123'\n  radiusGroup:\n    type: checkpoint:ManagementRadiusGroup\n    name: radius_group\n    properties:\n      name: New Radius Group\n      members:\n        - ${radiusServer.name}\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementRadiusGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of radius servers identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRadiusGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementRadiusGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of radius servers identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Must be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRadiusGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementRadiusGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of radius servers identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRadiusServer:ManagementRadiusServer": {
      "description": "This resource allows you to add/update/delete Check Point Radius Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst host = new checkpoint.ManagementHost(\"host\", {\n    name: \"My Host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst example = new checkpoint.ManagementRadiusServer(\"example\", {\n    name: \"New Radius Server\",\n    server: host.name,\n    sharedSecret: \"123\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhost = checkpoint.ManagementHost(\"host\",\n    name=\"My Host\",\n    ipv4_address=\"1.2.3.4\")\nexample = checkpoint.ManagementRadiusServer(\"example\",\n    name=\"New Radius Server\",\n    server=host.name,\n    shared_secret=\"123\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var host = new Checkpoint.ManagementHost(\"host\", new()\n    {\n        Name = \"My Host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var example = new Checkpoint.ManagementRadiusServer(\"example\", new()\n    {\n        Name = \"New Radius Server\",\n        Server = host.Name,\n        SharedSecret = \"123\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thost, err := checkpoint.NewManagementHost(ctx, \"host\", &checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"My Host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementRadiusServer(ctx, \"example\", &checkpoint.ManagementRadiusServerArgs{\n\t\t\tName:         pulumi.String(\"New Radius Server\"),\n\t\t\tServer:       host.Name,\n\t\t\tSharedSecret: pulumi.String(\"123\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.ManagementRadiusServer;\nimport com.pulumi.checkpoint.ManagementRadiusServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var host = new ManagementHost(\"host\", ManagementHostArgs.builder()\n            .name(\"My Host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        var example = new ManagementRadiusServer(\"example\", ManagementRadiusServerArgs.builder()\n            .name(\"New Radius Server\")\n            .server(host.name())\n            .sharedSecret(\"123\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  host:\n    type: checkpoint:ManagementHost\n    properties:\n      name: My Host\n      ipv4Address: 1.2.3.4\n  example:\n    type: checkpoint:ManagementRadiusServer\n    properties:\n      name: New Radius Server\n      server: ${host.name}\n      sharedSecret: '123'\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "accounting": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Accounting settings. accounting blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementRadiusServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "priority": {
          "type": "number",
          "description": "The priority of the RADIUS Server in case it is a member of a RADIUS Group.\n"
        },
        "protocol": {
          "type": "string",
          "description": "The type of authentication protocol that will be used when authenticating the user to the RADIUS server.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the host that is the RADIUS Server.\n"
        },
        "service": {
          "type": "string",
          "description": "The UID or Name of the Service to which the RADIUS server listens.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "The secret between the RADIUS server and the Security Gateway.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "version": {
          "type": "string",
          "description": "The version can be either RADIUS Version 1.0, which is RFC 2138 compliant, and RADIUS Version 2.0 which is RFC 2865 compliant.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRadiusServerId",
        "name",
        "server",
        "sharedSecret"
      ],
      "inputProperties": {
        "accounting": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Accounting settings. accounting blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementRadiusServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "priority": {
          "type": "number",
          "description": "The priority of the RADIUS Server in case it is a member of a RADIUS Group.\n"
        },
        "protocol": {
          "type": "string",
          "description": "The type of authentication protocol that will be used when authenticating the user to the RADIUS server.\n"
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the host that is the RADIUS Server.\n"
        },
        "service": {
          "type": "string",
          "description": "The UID or Name of the Service to which the RADIUS server listens.\n"
        },
        "sharedSecret": {
          "type": "string",
          "description": "The secret between the RADIUS server and the Security Gateway.\n",
          "secret": true
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "version": {
          "type": "string",
          "description": "The version can be either RADIUS Version 1.0, which is RFC 2138 compliant, and RADIUS Version 2.0 which is RFC 2865 compliant.\n"
        }
      },
      "requiredInputs": [
        "server",
        "sharedSecret"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRadiusServer resources.\n",
        "properties": {
          "accounting": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Accounting settings. accounting blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementRadiusServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "priority": {
            "type": "number",
            "description": "The priority of the RADIUS Server in case it is a member of a RADIUS Group.\n"
          },
          "protocol": {
            "type": "string",
            "description": "The type of authentication protocol that will be used when authenticating the user to the RADIUS server.\n"
          },
          "server": {
            "type": "string",
            "description": "The UID or Name of the host that is the RADIUS Server.\n"
          },
          "service": {
            "type": "string",
            "description": "The UID or Name of the Service to which the RADIUS server listens.\n"
          },
          "sharedSecret": {
            "type": "string",
            "description": "The secret between the RADIUS server and the Security Gateway.\n",
            "secret": true
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "version": {
            "type": "string",
            "description": "The version can be either RADIUS Version 1.0, which is RFC 2138 compliant, and RADIUS Version 2.0 which is RFC 2865 compliant.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRenewScaledSharingServerCertificate:ManagementRenewScaledSharingServerCertificate": {
      "properties": {
        "managementRenewScaledSharingServerCertificateId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Operation status.\n"
        },
        "name": {
          "type": "string",
          "description": "Gateway or cluster name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Gateway or cluster unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRenewScaledSharingServerCertificateId",
        "message",
        "name"
      ],
      "inputProperties": {
        "managementRenewScaledSharingServerCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Gateway or cluster name.\n"
        },
        "uid": {
          "type": "string",
          "description": "Gateway or cluster unique identifier.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRenewScaledSharingServerCertificate resources.\n",
        "properties": {
          "managementRenewScaledSharingServerCertificateId": {
            "type": "string"
          },
          "message": {
            "type": "string",
            "description": "Operation status.\n"
          },
          "name": {
            "type": "string",
            "description": "Gateway or cluster name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Gateway or cluster unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRepositoryScript:ManagementRepositoryScript": {
      "description": "This resource allows you to execute Check Point Repository Script.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementRepositoryScript(\"example\", {\n    name: \"New Script 1\",\n    scriptBody: \"ls -l /\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementRepositoryScript(\"example\",\n    name=\"New Script 1\",\n    script_body=\"ls -l /\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementRepositoryScript(\"example\", new()\n    {\n        Name = \"New Script 1\",\n        ScriptBody = \"ls -l /\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementRepositoryScript(ctx, \"example\", &checkpoint.ManagementRepositoryScriptArgs{\n\t\t\tName:       pulumi.String(\"New Script 1\"),\n\t\t\tScriptBody: pulumi.String(\"ls -l /\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementRepositoryScript;\nimport com.pulumi.checkpoint.ManagementRepositoryScriptArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementRepositoryScript(\"example\", ManagementRepositoryScriptArgs.builder()\n            .name(\"New Script 1\")\n            .scriptBody(\"ls -l /\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementRepositoryScript\n    properties:\n      name: New Script 1\n      scriptBody: ls -l /\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementRepositoryScriptId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "scriptBody": {
          "type": "string",
          "description": "The entire content of the script.\n"
        },
        "scriptBodyBase64": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64.\n"
        },
        "scriptBodyBase64Return": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64."
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRepositoryScriptId",
        "name",
        "scriptBodyBase64Return"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementRepositoryScriptId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "scriptBody": {
          "type": "string",
          "description": "The entire content of the script.\n"
        },
        "scriptBodyBase64": {
          "type": "string",
          "description": "The entire content of the script encoded in Base64.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRepositoryScript resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementRepositoryScriptId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "scriptBody": {
            "type": "string",
            "description": "The entire content of the script.\n"
          },
          "scriptBodyBase64": {
            "type": "string",
            "description": "The entire content of the script encoded in Base64.\n"
          },
          "scriptBodyBase64Return": {
            "type": "string",
            "description": "The entire content of the script encoded in Base64."
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResetSic:ManagementResetSic": {
      "properties": {
        "managementResetSicId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Operation status."
        },
        "name": {
          "type": "string",
          "description": "Gateway, cluster member or Check Point host name.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementResetSicId",
        "message",
        "name",
        "taskId"
      ],
      "inputProperties": {
        "managementResetSicId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Gateway, cluster member or Check Point host name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResetSic resources.\n",
        "properties": {
          "managementResetSicId": {
            "type": "string"
          },
          "message": {
            "type": "string",
            "description": "Operation status."
          },
          "name": {
            "type": "string",
            "description": "Gateway, cluster member or Check Point host name.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceCifs:ManagementResourceCifs": {
      "description": "This resource allows you to execute Check Point Resource Cifs.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst cifs = new checkpoint.ManagementResourceCifs(\"cifs\", {\n    name: \"newCifsResource\",\n    allowedDiskAndPrintShares: [\n        {\n            serverName: \"server1\",\n            shareName: \"share1\",\n        },\n        {\n            serverName: \"server2\",\n            shareName: \"share2\",\n        },\n    ],\n    logMappedShares: true,\n    logAccessViolation: true,\n    blockRemoteRegistryAccess: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ncifs = checkpoint.ManagementResourceCifs(\"cifs\",\n    name=\"newCifsResource\",\n    allowed_disk_and_print_shares=[\n        {\n            \"server_name\": \"server1\",\n            \"share_name\": \"share1\",\n        },\n        {\n            \"server_name\": \"server2\",\n            \"share_name\": \"share2\",\n        },\n    ],\n    log_mapped_shares=True,\n    log_access_violation=True,\n    block_remote_registry_access=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var cifs = new Checkpoint.ManagementResourceCifs(\"cifs\", new()\n    {\n        Name = \"newCifsResource\",\n        AllowedDiskAndPrintShares = new[]\n        {\n            new Checkpoint.Inputs.ManagementResourceCifsAllowedDiskAndPrintShareArgs\n            {\n                ServerName = \"server1\",\n                ShareName = \"share1\",\n            },\n            new Checkpoint.Inputs.ManagementResourceCifsAllowedDiskAndPrintShareArgs\n            {\n                ServerName = \"server2\",\n                ShareName = \"share2\",\n            },\n        },\n        LogMappedShares = true,\n        LogAccessViolation = true,\n        BlockRemoteRegistryAccess = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceCifs(ctx, \"cifs\", &checkpoint.ManagementResourceCifsArgs{\n\t\t\tName: pulumi.String(\"newCifsResource\"),\n\t\t\tAllowedDiskAndPrintShares: checkpoint.ManagementResourceCifsAllowedDiskAndPrintShareArray{\n\t\t\t\t&checkpoint.ManagementResourceCifsAllowedDiskAndPrintShareArgs{\n\t\t\t\t\tServerName: pulumi.String(\"server1\"),\n\t\t\t\t\tShareName:  pulumi.String(\"share1\"),\n\t\t\t\t},\n\t\t\t\t&checkpoint.ManagementResourceCifsAllowedDiskAndPrintShareArgs{\n\t\t\t\t\tServerName: pulumi.String(\"server2\"),\n\t\t\t\t\tShareName:  pulumi.String(\"share2\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLogMappedShares:           pulumi.Bool(true),\n\t\t\tLogAccessViolation:        pulumi.Bool(true),\n\t\t\tBlockRemoteRegistryAccess: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceCifs;\nimport com.pulumi.checkpoint.ManagementResourceCifsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceCifsAllowedDiskAndPrintShareArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var cifs = new ManagementResourceCifs(\"cifs\", ManagementResourceCifsArgs.builder()\n            .name(\"newCifsResource\")\n            .allowedDiskAndPrintShares(            \n                ManagementResourceCifsAllowedDiskAndPrintShareArgs.builder()\n                    .serverName(\"server1\")\n                    .shareName(\"share1\")\n                    .build(),\n                ManagementResourceCifsAllowedDiskAndPrintShareArgs.builder()\n                    .serverName(\"server2\")\n                    .shareName(\"share2\")\n                    .build())\n            .logMappedShares(true)\n            .logAccessViolation(true)\n            .blockRemoteRegistryAccess(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  cifs:\n    type: checkpoint:ManagementResourceCifs\n    properties:\n      name: newCifsResource\n      allowedDiskAndPrintShares:\n        - serverName: server1\n          shareName: share1\n        - serverName: server2\n          shareName: share2\n      logMappedShares: true\n      logAccessViolation: true\n      blockRemoteRegistryAccess: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowedDiskAndPrintShares": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceCifsAllowedDiskAndPrintShare:ManagementResourceCifsAllowedDiskAndPrintShare"
          },
          "description": "The list of Allowed Disk and Print Shares. Must be added in pairs.allowed_disk_and_print_shares blocks are documented below.\n"
        },
        "blockRemoteRegistryAccess": {
          "type": "boolean",
          "description": "Blocks the ability to remotely manipulate a the window's registry.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "logAccessViolation": {
          "type": "boolean",
          "description": "Logs any attempt to violate the restrictions imposed by the Resource.\n"
        },
        "logMappedShares": {
          "type": "boolean",
          "description": "Logs each share map attempt.\n"
        },
        "managementResourceCifsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "allowedDiskAndPrintShares",
        "managementResourceCifsId",
        "name"
      ],
      "inputProperties": {
        "allowedDiskAndPrintShares": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceCifsAllowedDiskAndPrintShare:ManagementResourceCifsAllowedDiskAndPrintShare"
          },
          "description": "The list of Allowed Disk and Print Shares. Must be added in pairs.allowed_disk_and_print_shares blocks are documented below.\n"
        },
        "blockRemoteRegistryAccess": {
          "type": "boolean",
          "description": "Blocks the ability to remotely manipulate a the window's registry.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "logAccessViolation": {
          "type": "boolean",
          "description": "Logs any attempt to violate the restrictions imposed by the Resource.\n"
        },
        "logMappedShares": {
          "type": "boolean",
          "description": "Logs each share map attempt.\n"
        },
        "managementResourceCifsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "allowedDiskAndPrintShares"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceCifs resources.\n",
        "properties": {
          "allowedDiskAndPrintShares": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementResourceCifsAllowedDiskAndPrintShare:ManagementResourceCifsAllowedDiskAndPrintShare"
            },
            "description": "The list of Allowed Disk and Print Shares. Must be added in pairs.allowed_disk_and_print_shares blocks are documented below.\n"
          },
          "blockRemoteRegistryAccess": {
            "type": "boolean",
            "description": "Blocks the ability to remotely manipulate a the window's registry.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "logAccessViolation": {
            "type": "boolean",
            "description": "Logs any attempt to violate the restrictions imposed by the Resource.\n"
          },
          "logMappedShares": {
            "type": "boolean",
            "description": "Logs each share map attempt.\n"
          },
          "managementResourceCifsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceFtp:ManagementResourceFtp": {
      "description": "This resource allows you to execute Check Point Resource Ftp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementResourceFtp(\"example\", {\n    name: \"newFtpResource\",\n    resourceMatchingMethod: \"get_and_put\",\n    exceptionTrack: \"exception log\",\n    resourcesPath: \"path\",\n    cvp: {\n        allowedToModifyContent: true,\n        enableCvp: false,\n        replyOrder: \"return_data_before_content_is_approved\",\n        server: \"serverName\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementResourceFtp(\"example\",\n    name=\"newFtpResource\",\n    resource_matching_method=\"get_and_put\",\n    exception_track=\"exception log\",\n    resources_path=\"path\",\n    cvp={\n        \"allowed_to_modify_content\": True,\n        \"enable_cvp\": False,\n        \"reply_order\": \"return_data_before_content_is_approved\",\n        \"server\": \"serverName\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementResourceFtp(\"example\", new()\n    {\n        Name = \"newFtpResource\",\n        ResourceMatchingMethod = \"get_and_put\",\n        ExceptionTrack = \"exception log\",\n        ResourcesPath = \"path\",\n        Cvp = new Checkpoint.Inputs.ManagementResourceFtpCvpArgs\n        {\n            AllowedToModifyContent = true,\n            EnableCvp = false,\n            ReplyOrder = \"return_data_before_content_is_approved\",\n            Server = \"serverName\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceFtp(ctx, \"example\", &checkpoint.ManagementResourceFtpArgs{\n\t\t\tName:                   pulumi.String(\"newFtpResource\"),\n\t\t\tResourceMatchingMethod: pulumi.String(\"get_and_put\"),\n\t\t\tExceptionTrack:         pulumi.String(\"exception log\"),\n\t\t\tResourcesPath:          pulumi.String(\"path\"),\n\t\t\tCvp: &checkpoint.ManagementResourceFtpCvpArgs{\n\t\t\t\tAllowedToModifyContent: pulumi.Bool(true),\n\t\t\t\tEnableCvp:              pulumi.Bool(false),\n\t\t\t\tReplyOrder:             pulumi.String(\"return_data_before_content_is_approved\"),\n\t\t\t\tServer:                 pulumi.String(\"serverName\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceFtp;\nimport com.pulumi.checkpoint.ManagementResourceFtpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceFtpCvpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementResourceFtp(\"example\", ManagementResourceFtpArgs.builder()\n            .name(\"newFtpResource\")\n            .resourceMatchingMethod(\"get_and_put\")\n            .exceptionTrack(\"exception log\")\n            .resourcesPath(\"path\")\n            .cvp(ManagementResourceFtpCvpArgs.builder()\n                .allowedToModifyContent(true)\n                .enableCvp(false)\n                .replyOrder(\"return_data_before_content_is_approved\")\n                .server(\"serverName\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementResourceFtp\n    properties:\n      name: newFtpResource\n      resourceMatchingMethod: get_and_put\n      exceptionTrack: exception log\n      resourcesPath: path\n      cvp:\n        allowedToModifyContent: true\n        enableCvp: false\n        replyOrder: return_data_before_content_is_approved\n        server: serverName\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cvp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceFtpCvp:ManagementResourceFtpCvp",
          "description": "Configure CVP inspection on mail messages.cvp blocks are documented below.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "The UID or Name of the exception track to be used to log actions taken as a result of a match on the resource.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceFtpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "resourceMatchingMethod": {
          "type": "string",
          "description": "GET allows Downloads from the server to the client. PUT allows Uploads from the client to the server.\n"
        },
        "resourcesPath": {
          "type": "string",
          "description": "Refers to a location on the FTP server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementResourceFtpId",
        "name",
        "resourceMatchingMethod"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cvp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceFtpCvp:ManagementResourceFtpCvp",
          "description": "Configure CVP inspection on mail messages.cvp blocks are documented below.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "The UID or Name of the exception track to be used to log actions taken as a result of a match on the resource.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceFtpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "resourceMatchingMethod": {
          "type": "string",
          "description": "GET allows Downloads from the server to the client. PUT allows Uploads from the client to the server.\n"
        },
        "resourcesPath": {
          "type": "string",
          "description": "Refers to a location on the FTP server.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "resourceMatchingMethod"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceFtp resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "cvp": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceFtpCvp:ManagementResourceFtpCvp",
            "description": "Configure CVP inspection on mail messages.cvp blocks are documented below.\n"
          },
          "exceptionTrack": {
            "type": "string",
            "description": "The UID or Name of the exception track to be used to log actions taken as a result of a match on the resource.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementResourceFtpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "resourceMatchingMethod": {
            "type": "string",
            "description": "GET allows Downloads from the server to the client. PUT allows Uploads from the client to the server.\n"
          },
          "resourcesPath": {
            "type": "string",
            "description": "Refers to a location on the FTP server.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceMms:ManagementResourceMms": {
      "description": "This resource allows you to execute Check Point Resource Mms.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementResourceMms(\"example\", {\n    name: \"newMmsResource\",\n    track: \"log\",\n    action: \"accept\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementResourceMms(\"example\",\n    name=\"newMmsResource\",\n    track=\"log\",\n    action=\"accept\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementResourceMms(\"example\", new()\n    {\n        Name = \"newMmsResource\",\n        Track = \"log\",\n        Action = \"accept\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceMms(ctx, \"example\", &checkpoint.ManagementResourceMmsArgs{\n\t\t\tName:   pulumi.String(\"newMmsResource\"),\n\t\t\tTrack:  pulumi.String(\"log\"),\n\t\t\tAction: pulumi.String(\"accept\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceMms;\nimport com.pulumi.checkpoint.ManagementResourceMmsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementResourceMms(\"example\", ManagementResourceMmsArgs.builder()\n            .name(\"newMmsResource\")\n            .track(\"log\")\n            .action(\"accept\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementResourceMms\n    properties:\n      name: newMmsResource\n      track: log\n      action: accept\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "Accepts or Drops traffic that matches a Firewall Rule using the Resource.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceMmsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "track": {
          "type": "string",
          "description": "Logs the activity when a packet matches on a Firewall Rule with the Resource.\n"
        }
      },
      "type": "object",
      "required": [
        "managementResourceMmsId",
        "name"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "Accepts or Drops traffic that matches a Firewall Rule using the Resource.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceMmsId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "track": {
          "type": "string",
          "description": "Logs the activity when a packet matches on a Firewall Rule with the Resource.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceMms resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "Accepts or Drops traffic that matches a Firewall Rule using the Resource.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementResourceMmsId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "track": {
            "type": "string",
            "description": "Logs the activity when a packet matches on a Firewall Rule with the Resource.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceSmtp:ManagementResourceSmtp": {
      "description": "This resource allows you to execute Check Point Resource Smtp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst smtp = new checkpoint.ManagementResourceSmtp(\"smtp\", {\n    name: \"newSmtpResource\",\n    mailDeliveryServer: \"deliverServer\",\n    exceptionTrack: \"exception log\",\n    match: {\n        sender: \"expr1\",\n        recipient: \"expr2\",\n    },\n    action1: {\n        sender: {\n            original: \"one\",\n            rewritten: \"two\",\n        },\n        recipient: {\n            original: \"three\",\n            rewritten: \"four\",\n        },\n        customField: {\n            field: \"field\",\n            original: \"five\",\n            rewritten: \"six\",\n        },\n    },\n    cvp: {\n        allowedToModifyContent: true,\n        enableCvp: false,\n        replyOrder: \"return_data_after_content_is_approved\",\n        server: \"serverName\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsmtp = checkpoint.ManagementResourceSmtp(\"smtp\",\n    name=\"newSmtpResource\",\n    mail_delivery_server=\"deliverServer\",\n    exception_track=\"exception log\",\n    match={\n        \"sender\": \"expr1\",\n        \"recipient\": \"expr2\",\n    },\n    action1={\n        \"sender\": {\n            \"original\": \"one\",\n            \"rewritten\": \"two\",\n        },\n        \"recipient\": {\n            \"original\": \"three\",\n            \"rewritten\": \"four\",\n        },\n        \"custom_field\": {\n            \"field\": \"field\",\n            \"original\": \"five\",\n            \"rewritten\": \"six\",\n        },\n    },\n    cvp={\n        \"allowed_to_modify_content\": True,\n        \"enable_cvp\": False,\n        \"reply_order\": \"return_data_after_content_is_approved\",\n        \"server\": \"serverName\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var smtp = new Checkpoint.ManagementResourceSmtp(\"smtp\", new()\n    {\n        Name = \"newSmtpResource\",\n        MailDeliveryServer = \"deliverServer\",\n        ExceptionTrack = \"exception log\",\n        Match = \n        {\n            { \"sender\", \"expr1\" },\n            { \"recipient\", \"expr2\" },\n        },\n        Action1 = new Checkpoint.Inputs.ManagementResourceSmtpAction1Args\n        {\n            Sender = new Checkpoint.Inputs.ManagementResourceSmtpAction1SenderArgs\n            {\n                Original = \"one\",\n                Rewritten = \"two\",\n            },\n            Recipient = new Checkpoint.Inputs.ManagementResourceSmtpAction1RecipientArgs\n            {\n                Original = \"three\",\n                Rewritten = \"four\",\n            },\n            CustomField = new Checkpoint.Inputs.ManagementResourceSmtpAction1CustomFieldArgs\n            {\n                Field = \"field\",\n                Original = \"five\",\n                Rewritten = \"six\",\n            },\n        },\n        Cvp = new Checkpoint.Inputs.ManagementResourceSmtpCvpArgs\n        {\n            AllowedToModifyContent = true,\n            EnableCvp = false,\n            ReplyOrder = \"return_data_after_content_is_approved\",\n            Server = \"serverName\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceSmtp(ctx, \"smtp\", &checkpoint.ManagementResourceSmtpArgs{\n\t\t\tName:               pulumi.String(\"newSmtpResource\"),\n\t\t\tMailDeliveryServer: pulumi.String(\"deliverServer\"),\n\t\t\tExceptionTrack:     pulumi.String(\"exception log\"),\n\t\t\tMatch: pulumi.StringMap{\n\t\t\t\t\"sender\":    pulumi.String(\"expr1\"),\n\t\t\t\t\"recipient\": pulumi.String(\"expr2\"),\n\t\t\t},\n\t\t\tAction1: &checkpoint.ManagementResourceSmtpAction1Args{\n\t\t\t\tSender: &checkpoint.ManagementResourceSmtpAction1SenderArgs{\n\t\t\t\t\tOriginal:  pulumi.String(\"one\"),\n\t\t\t\t\tRewritten: pulumi.String(\"two\"),\n\t\t\t\t},\n\t\t\t\tRecipient: &checkpoint.ManagementResourceSmtpAction1RecipientArgs{\n\t\t\t\t\tOriginal:  pulumi.String(\"three\"),\n\t\t\t\t\tRewritten: pulumi.String(\"four\"),\n\t\t\t\t},\n\t\t\t\tCustomField: &checkpoint.ManagementResourceSmtpAction1CustomFieldArgs{\n\t\t\t\t\tField:     pulumi.String(\"field\"),\n\t\t\t\t\tOriginal:  pulumi.String(\"five\"),\n\t\t\t\t\tRewritten: pulumi.String(\"six\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tCvp: &checkpoint.ManagementResourceSmtpCvpArgs{\n\t\t\t\tAllowedToModifyContent: pulumi.Bool(true),\n\t\t\t\tEnableCvp:              pulumi.Bool(false),\n\t\t\t\tReplyOrder:             pulumi.String(\"return_data_after_content_is_approved\"),\n\t\t\t\tServer:                 pulumi.String(\"serverName\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceSmtp;\nimport com.pulumi.checkpoint.ManagementResourceSmtpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1Args;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1SenderArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1RecipientArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1CustomFieldArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpCvpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var smtp = new ManagementResourceSmtp(\"smtp\", ManagementResourceSmtpArgs.builder()\n            .name(\"newSmtpResource\")\n            .mailDeliveryServer(\"deliverServer\")\n            .exceptionTrack(\"exception log\")\n            .match(Map.ofEntries(\n                Map.entry(\"sender\", \"expr1\"),\n                Map.entry(\"recipient\", \"expr2\")\n            ))\n            .action1(ManagementResourceSmtpAction1Args.builder()\n                .sender(ManagementResourceSmtpAction1SenderArgs.builder()\n                    .original(\"one\")\n                    .rewritten(\"two\")\n                    .build())\n                .recipient(ManagementResourceSmtpAction1RecipientArgs.builder()\n                    .original(\"three\")\n                    .rewritten(\"four\")\n                    .build())\n                .customField(ManagementResourceSmtpAction1CustomFieldArgs.builder()\n                    .field(\"field\")\n                    .original(\"five\")\n                    .rewritten(\"six\")\n                    .build())\n                .build())\n            .cvp(ManagementResourceSmtpCvpArgs.builder()\n                .allowedToModifyContent(true)\n                .enableCvp(false)\n                .replyOrder(\"return_data_after_content_is_approved\")\n                .server(\"serverName\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  smtp:\n    type: checkpoint:ManagementResourceSmtp\n    properties:\n      name: newSmtpResource\n      mailDeliveryServer: deliverServer\n      exceptionTrack: exception log\n      match:\n        sender: expr1\n        recipient: expr2\n      action1:\n        sender:\n          original: one\n          rewritten: two\n        recipient:\n          original: three\n          rewritten: four\n        customField:\n          field: field\n          original: five\n          rewritten: six\n      cvp:\n        allowedToModifyContent: true\n        enableCvp: false\n        replyOrder: return_data_after_content_is_approved\n        server: serverName\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action1": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction1:ManagementResourceSmtpAction1",
          "description": "Use the Rewriting Rules to rewrite Sender and Recipient headers in emails, you can also rewrite other email headers by using the custom header field.action_1 blocks are documented below.\n"
        },
        "action2": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction2:ManagementResourceSmtpAction2",
          "description": "Use this window to configure mail inspection for the SMTP Resource.action_2 blocks are documented below.\n"
        },
        "checkRulebaseWithNewDestination": {
          "type": "boolean",
          "description": "The Rule Base will be rechecked with the new resolved IP address for mail delivery.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cvp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpCvp:ManagementResourceSmtpCvp",
          "description": "Configure CVP inspection on mail messages.cvp blocks are documented below.\n"
        },
        "deliverMessagesUsingDnsMxRecords": {
          "type": "boolean",
          "description": "MX record resolving is used to set the destination IP address of the connection.\n"
        },
        "errorCheckRulebaseWithNewDestination": {
          "type": "boolean",
          "description": "The Rule Base will be rechecked with the new resolved IP address for error mail delivery.\n"
        },
        "errorDeliverMessagesUsingDnsMxRecords": {
          "type": "boolean",
          "description": "MX record resolving will be used to set the source IP address of the connection used to send the error message.\n"
        },
        "errorMailDeliveryServer": {
          "type": "string",
          "description": "Error mail delivery happens if the SMTP security server is unable to deliver the message within the abandon time, and Notify Sender on Error is checked.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "Determines if an action specified in the Action 2 and CVP categories taken as a result of a resource definition is logged.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "mailDeliveryServer": {
          "type": "string",
          "description": "Specify the server to which mail is forwarded.\n"
        },
        "managementResourceSmtpId": {
          "type": "string"
        },
        "match": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Set the Match properties for the SMTP resource.match blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "notifySenderOnError": {
          "type": "boolean",
          "description": "Enable error mail delivery.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementResourceSmtpId",
        "name"
      ],
      "inputProperties": {
        "action1": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction1:ManagementResourceSmtpAction1",
          "description": "Use the Rewriting Rules to rewrite Sender and Recipient headers in emails, you can also rewrite other email headers by using the custom header field.action_1 blocks are documented below.\n"
        },
        "action2": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction2:ManagementResourceSmtpAction2",
          "description": "Use this window to configure mail inspection for the SMTP Resource.action_2 blocks are documented below.\n"
        },
        "checkRulebaseWithNewDestination": {
          "type": "boolean",
          "description": "The Rule Base will be rechecked with the new resolved IP address for mail delivery.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cvp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpCvp:ManagementResourceSmtpCvp",
          "description": "Configure CVP inspection on mail messages.cvp blocks are documented below.\n"
        },
        "deliverMessagesUsingDnsMxRecords": {
          "type": "boolean",
          "description": "MX record resolving is used to set the destination IP address of the connection.\n"
        },
        "errorCheckRulebaseWithNewDestination": {
          "type": "boolean",
          "description": "The Rule Base will be rechecked with the new resolved IP address for error mail delivery.\n"
        },
        "errorDeliverMessagesUsingDnsMxRecords": {
          "type": "boolean",
          "description": "MX record resolving will be used to set the source IP address of the connection used to send the error message.\n"
        },
        "errorMailDeliveryServer": {
          "type": "string",
          "description": "Error mail delivery happens if the SMTP security server is unable to deliver the message within the abandon time, and Notify Sender on Error is checked.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "Determines if an action specified in the Action 2 and CVP categories taken as a result of a resource definition is logged.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "mailDeliveryServer": {
          "type": "string",
          "description": "Specify the server to which mail is forwarded.\n"
        },
        "managementResourceSmtpId": {
          "type": "string"
        },
        "match": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Set the Match properties for the SMTP resource.match blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "notifySenderOnError": {
          "type": "boolean",
          "description": "Enable error mail delivery.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceSmtp resources.\n",
        "properties": {
          "action1": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction1:ManagementResourceSmtpAction1",
            "description": "Use the Rewriting Rules to rewrite Sender and Recipient headers in emails, you can also rewrite other email headers by using the custom header field.action_1 blocks are documented below.\n"
          },
          "action2": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpAction2:ManagementResourceSmtpAction2",
            "description": "Use this window to configure mail inspection for the SMTP Resource.action_2 blocks are documented below.\n"
          },
          "checkRulebaseWithNewDestination": {
            "type": "boolean",
            "description": "The Rule Base will be rechecked with the new resolved IP address for mail delivery.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "cvp": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceSmtpCvp:ManagementResourceSmtpCvp",
            "description": "Configure CVP inspection on mail messages.cvp blocks are documented below.\n"
          },
          "deliverMessagesUsingDnsMxRecords": {
            "type": "boolean",
            "description": "MX record resolving is used to set the destination IP address of the connection.\n"
          },
          "errorCheckRulebaseWithNewDestination": {
            "type": "boolean",
            "description": "The Rule Base will be rechecked with the new resolved IP address for error mail delivery.\n"
          },
          "errorDeliverMessagesUsingDnsMxRecords": {
            "type": "boolean",
            "description": "MX record resolving will be used to set the source IP address of the connection used to send the error message.\n"
          },
          "errorMailDeliveryServer": {
            "type": "string",
            "description": "Error mail delivery happens if the SMTP security server is unable to deliver the message within the abandon time, and Notify Sender on Error is checked.\n"
          },
          "exceptionTrack": {
            "type": "string",
            "description": "Determines if an action specified in the Action 2 and CVP categories taken as a result of a resource definition is logged.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "mailDeliveryServer": {
            "type": "string",
            "description": "Specify the server to which mail is forwarded.\n"
          },
          "managementResourceSmtpId": {
            "type": "string"
          },
          "match": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Set the Match properties for the SMTP resource.match blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "notifySenderOnError": {
            "type": "boolean",
            "description": "Enable error mail delivery.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceTcp:ManagementResourceTcp": {
      "description": "This resource allows you to execute Check Point Resource Tcp.\n\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cvpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceTcpCvpSettings:ManagementResourceTcpCvpSettings",
          "description": "CVP settings.<span pulumi-lang-nodejs=\" cvpSettings \" pulumi-lang-dotnet=\" CvpSettings \" pulumi-lang-go=\" cvpSettings \" pulumi-lang-python=\" cvp_settings \" pulumi-lang-yaml=\" cvpSettings \" pulumi-lang-java=\" cvpSettings \"> cvp_settings </span>blocks are documented below.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "Configures how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceTcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "resourceType": {
          "type": "string",
          "description": "The type of the TCP resource.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "ufpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceTcpUfpSettings:ManagementResourceTcpUfpSettings",
          "description": "UFP settings.<span pulumi-lang-nodejs=\" ufpSettings \" pulumi-lang-dotnet=\" UfpSettings \" pulumi-lang-go=\" ufpSettings \" pulumi-lang-python=\" ufp_settings \" pulumi-lang-yaml=\" ufpSettings \" pulumi-lang-java=\" ufpSettings \"> ufp_settings </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementResourceTcpId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "cvpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceTcpCvpSettings:ManagementResourceTcpCvpSettings",
          "description": "CVP settings.<span pulumi-lang-nodejs=\" cvpSettings \" pulumi-lang-dotnet=\" CvpSettings \" pulumi-lang-go=\" cvpSettings \" pulumi-lang-python=\" cvp_settings \" pulumi-lang-yaml=\" cvpSettings \" pulumi-lang-java=\" cvpSettings \"> cvp_settings </span>blocks are documented below.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "Configures how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceTcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "resourceType": {
          "type": "string",
          "description": "The type of the TCP resource.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "ufpSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceTcpUfpSettings:ManagementResourceTcpUfpSettings",
          "description": "UFP settings.<span pulumi-lang-nodejs=\" ufpSettings \" pulumi-lang-dotnet=\" UfpSettings \" pulumi-lang-go=\" ufpSettings \" pulumi-lang-python=\" ufp_settings \" pulumi-lang-yaml=\" ufpSettings \" pulumi-lang-java=\" ufpSettings \"> ufp_settings </span>blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceTcp resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "cvpSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceTcpCvpSettings:ManagementResourceTcpCvpSettings",
            "description": "CVP settings.<span pulumi-lang-nodejs=\" cvpSettings \" pulumi-lang-dotnet=\" CvpSettings \" pulumi-lang-go=\" cvpSettings \" pulumi-lang-python=\" cvp_settings \" pulumi-lang-yaml=\" cvpSettings \" pulumi-lang-java=\" cvpSettings \"> cvp_settings </span>blocks are documented below.\n"
          },
          "exceptionTrack": {
            "type": "string",
            "description": "Configures how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementResourceTcpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "resourceType": {
            "type": "string",
            "description": "The type of the TCP resource.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "ufpSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceTcpUfpSettings:ManagementResourceTcpUfpSettings",
            "description": "UFP settings.<span pulumi-lang-nodejs=\" ufpSettings \" pulumi-lang-dotnet=\" UfpSettings \" pulumi-lang-go=\" ufpSettings \" pulumi-lang-python=\" ufp_settings \" pulumi-lang-yaml=\" ufpSettings \" pulumi-lang-java=\" ufpSettings \"> ufp_settings </span>blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceUri:ManagementResourceUri": {
      "description": "This resource allows you to execute Check Point Resource Uri.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst uri = new checkpoint.ManagementResourceUri(\"uri\", {\n    name: \"newUriResource\",\n    useThisResourceTo: \"optimize_url_logging\",\n    connectionMethods: {\n        transparent: \"false\",\n        tunneling: \"true\",\n        proxy: \"false\",\n    },\n    uriMatchSpecificationType: \"wildcards\",\n    matchWildcards: {\n        host: \"hostName\",\n        path: \"pathName\",\n        query: \"query\",\n        schemes: {\n            gopher: true,\n            other: \"string2\",\n        },\n        methods: {\n            get: true,\n            post: true,\n            head: true,\n            put: true,\n            other: \"done7\",\n        },\n    },\n    action: {\n        stripActivexTags: true,\n        stripAppletTags: true,\n        stripFtpLinks: true,\n        stripPortStrings: true,\n        stripScriptTags: true,\n    },\n    soap: {\n        inspection: \"allow_all_soap_requests\",\n        file_id: \"scheme1\",\n        track_connections: \"mail_alert\",\n    },\n    cvp: {\n        allowedToModifyContent: true,\n        enableCvp: false,\n        replyOrder: \"return_data_after_content_is_approved\",\n        server: \"serverName\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nuri = checkpoint.ManagementResourceUri(\"uri\",\n    name=\"newUriResource\",\n    use_this_resource_to=\"optimize_url_logging\",\n    connection_methods={\n        \"transparent\": \"false\",\n        \"tunneling\": \"true\",\n        \"proxy\": \"false\",\n    },\n    uri_match_specification_type=\"wildcards\",\n    match_wildcards={\n        \"host\": \"hostName\",\n        \"path\": \"pathName\",\n        \"query\": \"query\",\n        \"schemes\": {\n            \"gopher\": True,\n            \"other\": \"string2\",\n        },\n        \"methods\": {\n            \"get\": True,\n            \"post\": True,\n            \"head\": True,\n            \"put\": True,\n            \"other\": \"done7\",\n        },\n    },\n    action={\n        \"strip_activex_tags\": True,\n        \"strip_applet_tags\": True,\n        \"strip_ftp_links\": True,\n        \"strip_port_strings\": True,\n        \"strip_script_tags\": True,\n    },\n    soap={\n        \"inspection\": \"allow_all_soap_requests\",\n        \"file_id\": \"scheme1\",\n        \"track_connections\": \"mail_alert\",\n    },\n    cvp={\n        \"allowed_to_modify_content\": True,\n        \"enable_cvp\": False,\n        \"reply_order\": \"return_data_after_content_is_approved\",\n        \"server\": \"serverName\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var uri = new Checkpoint.ManagementResourceUri(\"uri\", new()\n    {\n        Name = \"newUriResource\",\n        UseThisResourceTo = \"optimize_url_logging\",\n        ConnectionMethods = \n        {\n            { \"transparent\", \"false\" },\n            { \"tunneling\", \"true\" },\n            { \"proxy\", \"false\" },\n        },\n        UriMatchSpecificationType = \"wildcards\",\n        MatchWildcards = new Checkpoint.Inputs.ManagementResourceUriMatchWildcardsArgs\n        {\n            Host = \"hostName\",\n            Path = \"pathName\",\n            Query = \"query\",\n            Schemes = new Checkpoint.Inputs.ManagementResourceUriMatchWildcardsSchemesArgs\n            {\n                Gopher = true,\n                Other = \"string2\",\n            },\n            Methods = new Checkpoint.Inputs.ManagementResourceUriMatchWildcardsMethodsArgs\n            {\n                Get = true,\n                Post = true,\n                Head = true,\n                Put = true,\n                Other = \"done7\",\n            },\n        },\n        Action = new Checkpoint.Inputs.ManagementResourceUriActionArgs\n        {\n            StripActivexTags = true,\n            StripAppletTags = true,\n            StripFtpLinks = true,\n            StripPortStrings = true,\n            StripScriptTags = true,\n        },\n        Soap = \n        {\n            { \"inspection\", \"allow_all_soap_requests\" },\n            { \"file_id\", \"scheme1\" },\n            { \"track_connections\", \"mail_alert\" },\n        },\n        Cvp = new Checkpoint.Inputs.ManagementResourceUriCvpArgs\n        {\n            AllowedToModifyContent = true,\n            EnableCvp = false,\n            ReplyOrder = \"return_data_after_content_is_approved\",\n            Server = \"serverName\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceUri(ctx, \"uri\", &checkpoint.ManagementResourceUriArgs{\n\t\t\tName:              pulumi.String(\"newUriResource\"),\n\t\t\tUseThisResourceTo: pulumi.String(\"optimize_url_logging\"),\n\t\t\tConnectionMethods: pulumi.StringMap{\n\t\t\t\t\"transparent\": pulumi.String(\"false\"),\n\t\t\t\t\"tunneling\":   pulumi.String(\"true\"),\n\t\t\t\t\"proxy\":       pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tUriMatchSpecificationType: pulumi.String(\"wildcards\"),\n\t\t\tMatchWildcards: &checkpoint.ManagementResourceUriMatchWildcardsArgs{\n\t\t\t\tHost:  pulumi.String(\"hostName\"),\n\t\t\t\tPath:  pulumi.String(\"pathName\"),\n\t\t\t\tQuery: pulumi.String(\"query\"),\n\t\t\t\tSchemes: &checkpoint.ManagementResourceUriMatchWildcardsSchemesArgs{\n\t\t\t\t\tGopher: pulumi.Bool(true),\n\t\t\t\t\tOther:  pulumi.String(\"string2\"),\n\t\t\t\t},\n\t\t\t\tMethods: &checkpoint.ManagementResourceUriMatchWildcardsMethodsArgs{\n\t\t\t\t\tGet:   pulumi.Bool(true),\n\t\t\t\t\tPost:  pulumi.Bool(true),\n\t\t\t\t\tHead:  pulumi.Bool(true),\n\t\t\t\t\tPut:   pulumi.Bool(true),\n\t\t\t\t\tOther: pulumi.String(\"done7\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAction: &checkpoint.ManagementResourceUriActionArgs{\n\t\t\t\tStripActivexTags: pulumi.Bool(true),\n\t\t\t\tStripAppletTags:  pulumi.Bool(true),\n\t\t\t\tStripFtpLinks:    pulumi.Bool(true),\n\t\t\t\tStripPortStrings: pulumi.Bool(true),\n\t\t\t\tStripScriptTags:  pulumi.Bool(true),\n\t\t\t},\n\t\t\tSoap: pulumi.StringMap{\n\t\t\t\t\"inspection\":        pulumi.String(\"allow_all_soap_requests\"),\n\t\t\t\t\"file_id\":           pulumi.String(\"scheme1\"),\n\t\t\t\t\"track_connections\": pulumi.String(\"mail_alert\"),\n\t\t\t},\n\t\t\tCvp: &checkpoint.ManagementResourceUriCvpArgs{\n\t\t\t\tAllowedToModifyContent: pulumi.Bool(true),\n\t\t\t\tEnableCvp:              pulumi.Bool(false),\n\t\t\t\tReplyOrder:             pulumi.String(\"return_data_after_content_is_approved\"),\n\t\t\t\tServer:                 pulumi.String(\"serverName\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceUri;\nimport com.pulumi.checkpoint.ManagementResourceUriArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriMatchWildcardsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriMatchWildcardsSchemesArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriMatchWildcardsMethodsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriActionArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriCvpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var uri = new ManagementResourceUri(\"uri\", ManagementResourceUriArgs.builder()\n            .name(\"newUriResource\")\n            .useThisResourceTo(\"optimize_url_logging\")\n            .connectionMethods(Map.ofEntries(\n                Map.entry(\"transparent\", \"false\"),\n                Map.entry(\"tunneling\", \"true\"),\n                Map.entry(\"proxy\", \"false\")\n            ))\n            .uriMatchSpecificationType(\"wildcards\")\n            .matchWildcards(ManagementResourceUriMatchWildcardsArgs.builder()\n                .host(\"hostName\")\n                .path(\"pathName\")\n                .query(\"query\")\n                .schemes(ManagementResourceUriMatchWildcardsSchemesArgs.builder()\n                    .gopher(true)\n                    .other(\"string2\")\n                    .build())\n                .methods(ManagementResourceUriMatchWildcardsMethodsArgs.builder()\n                    .get(true)\n                    .post(true)\n                    .head(true)\n                    .put(true)\n                    .other(\"done7\")\n                    .build())\n                .build())\n            .action(ManagementResourceUriActionArgs.builder()\n                .stripActivexTags(true)\n                .stripAppletTags(true)\n                .stripFtpLinks(true)\n                .stripPortStrings(true)\n                .stripScriptTags(true)\n                .build())\n            .soap(Map.ofEntries(\n                Map.entry(\"inspection\", \"allow_all_soap_requests\"),\n                Map.entry(\"file_id\", \"scheme1\"),\n                Map.entry(\"track_connections\", \"mail_alert\")\n            ))\n            .cvp(ManagementResourceUriCvpArgs.builder()\n                .allowedToModifyContent(true)\n                .enableCvp(false)\n                .replyOrder(\"return_data_after_content_is_approved\")\n                .server(\"serverName\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  uri:\n    type: checkpoint:ManagementResourceUri\n    properties:\n      name: newUriResource\n      useThisResourceTo: optimize_url_logging\n      connectionMethods:\n        transparent: 'false'\n        tunneling: 'true'\n        proxy: false\n      uriMatchSpecificationType: wildcards\n      matchWildcards:\n        host: hostName\n        path: pathName\n        query: query\n        schemes:\n          gopher: true\n          other: string2\n        methods:\n          get: true\n          post: true\n          head: true\n          put: true\n          other: done7\n      action:\n        stripActivexTags: true\n        stripAppletTags: true\n        stripFtpLinks: true\n        stripPortStrings: true\n        stripScriptTags: true\n      soap:\n        inspection: allow_all_soap_requests\n        file_id: scheme1\n        track_connections: mail_alert\n      cvp:\n        allowedToModifyContent: true\n        enableCvp: false\n        replyOrder: return_data_after_content_is_approved\n        server: serverName\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriAction:ManagementResourceUriAction",
          "description": "Action settings.action blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "connectionMethods": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Connection methods.connection_methods blocks are documented below.\n"
        },
        "cvp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriCvp:ManagementResourceUriCvp",
          "description": "CVP settings.cvp blocks are documented below.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "Configures how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceUriId": {
          "type": "string"
        },
        "matchUfp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchUfp:ManagementResourceUriMatchUfp",
          "description": "Match - UFP settings.match_ufp blocks are documented below.\n"
        },
        "matchWildcards": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchWildcards:ManagementResourceUriMatchWildcards",
          "description": "Match - Wildcards settings.match_wildcards blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "soap": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "SOAP settings.soap blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uriMatchSpecificationType": {
          "type": "string",
          "description": "The type can be Wild Cards or UFP, where a UFP server holds categories of forbidden web sites.\n"
        },
        "useThisResourceTo": {
          "type": "string",
          "description": "Select the use of the URI resource.\n"
        }
      },
      "type": "object",
      "required": [
        "managementResourceUriId",
        "name"
      ],
      "inputProperties": {
        "action": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriAction:ManagementResourceUriAction",
          "description": "Action settings.action blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "connectionMethods": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Connection methods.connection_methods blocks are documented below.\n"
        },
        "cvp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriCvp:ManagementResourceUriCvp",
          "description": "CVP settings.cvp blocks are documented below.\n"
        },
        "exceptionTrack": {
          "type": "string",
          "description": "Configures how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceUriId": {
          "type": "string"
        },
        "matchUfp": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchUfp:ManagementResourceUriMatchUfp",
          "description": "Match - UFP settings.match_ufp blocks are documented below.\n"
        },
        "matchWildcards": {
          "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchWildcards:ManagementResourceUriMatchWildcards",
          "description": "Match - Wildcards settings.match_wildcards blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "soap": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "SOAP settings.soap blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "uriMatchSpecificationType": {
          "type": "string",
          "description": "The type can be Wild Cards or UFP, where a UFP server holds categories of forbidden web sites.\n"
        },
        "useThisResourceTo": {
          "type": "string",
          "description": "Select the use of the URI resource.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceUri resources.\n",
        "properties": {
          "action": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceUriAction:ManagementResourceUriAction",
            "description": "Action settings.action blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "connectionMethods": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Connection methods.connection_methods blocks are documented below.\n"
          },
          "cvp": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceUriCvp:ManagementResourceUriCvp",
            "description": "CVP settings.cvp blocks are documented below.\n"
          },
          "exceptionTrack": {
            "type": "string",
            "description": "Configures how to track connections that match this rule but fail the content security checks. An example of an exception is a connection with an unsupported scheme or method.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementResourceUriId": {
            "type": "string"
          },
          "matchUfp": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchUfp:ManagementResourceUriMatchUfp",
            "description": "Match - UFP settings.match_ufp blocks are documented below.\n"
          },
          "matchWildcards": {
            "$ref": "#/types/checkpoint:index%2FManagementResourceUriMatchWildcards:ManagementResourceUriMatchWildcards",
            "description": "Match - Wildcards settings.match_wildcards blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "soap": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "SOAP settings.soap blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "uriMatchSpecificationType": {
            "type": "string",
            "description": "The type can be Wild Cards or UFP, where a UFP server holds categories of forbidden web sites.\n"
          },
          "useThisResourceTo": {
            "type": "string",
            "description": "Select the use of the URI resource.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementResourceUriForQos:ManagementResourceUriForQos": {
      "description": "This resource allows you to execute Check Point Resource Uri For Qos.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementResourceUriForQos(\"example\", {\n    name: \"newUriForQosResource\",\n    searchForUrl: \"www.checkpoint.com\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementResourceUriForQos(\"example\",\n    name=\"newUriForQosResource\",\n    search_for_url=\"www.checkpoint.com\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementResourceUriForQos(\"example\", new()\n    {\n        Name = \"newUriForQosResource\",\n        SearchForUrl = \"www.checkpoint.com\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceUriForQos(ctx, \"example\", &checkpoint.ManagementResourceUriForQosArgs{\n\t\t\tName:         pulumi.String(\"newUriForQosResource\"),\n\t\t\tSearchForUrl: pulumi.String(\"www.checkpoint.com\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceUriForQos;\nimport com.pulumi.checkpoint.ManagementResourceUriForQosArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementResourceUriForQos(\"example\", ManagementResourceUriForQosArgs.builder()\n            .name(\"newUriForQosResource\")\n            .searchForUrl(\"www.checkpoint.com\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementResourceUriForQos\n    properties:\n      name: newUriForQosResource\n      searchForUrl: www.checkpoint.com\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceUriForQosId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "searchForUrl": {
          "type": "string",
          "description": "URL string that will be matched to an HTTP connection.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementResourceUriForQosId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementResourceUriForQosId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "searchForUrl": {
          "type": "string",
          "description": "URL string that will be matched to an HTTP connection.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementResourceUriForQos resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementResourceUriForQosId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "searchForUrl": {
            "type": "string",
            "description": "URL string that will be matched to an HTTP connection.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRestoreDomain:ManagementRestoreDomain": {
      "properties": {
        "domainIpAddress": {
          "type": "string",
          "description": "IPv4 address.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainName": {
          "type": "string",
          "description": "Domain name. Should be unique in the MDS.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainServerName": {
          "type": "string",
          "description": "Multi Domain server name.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path to the backup file to be restored. <br>Should be the full file path (example, \"/var/log/domain1_backup.tgz\").\n"
        },
        "managementRestoreDomainId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "verifyOnly": {
          "type": "boolean",
          "description": "If true, verify that the import operation is valid for this input file and this environment <br>Note: Restore operation will not be executed.\n"
        }
      },
      "type": "object",
      "required": [
        "domainIpAddress",
        "domainName",
        "domainServerName",
        "filePath",
        "managementRestoreDomainId",
        "taskId"
      ],
      "inputProperties": {
        "domainIpAddress": {
          "type": "string",
          "description": "IPv4 address.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainName": {
          "type": "string",
          "description": "Domain name. Should be unique in the MDS.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "domainServerName": {
          "type": "string",
          "description": "Multi Domain server name.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
        },
        "filePath": {
          "type": "string",
          "description": "Path to the backup file to be restored. <br>Should be the full file path (example, \"/var/log/domain1_backup.tgz\").\n"
        },
        "managementRestoreDomainId": {
          "type": "string"
        },
        "verifyOnly": {
          "type": "boolean",
          "description": "If true, verify that the import operation is valid for this input file and this environment <br>Note: Restore operation will not be executed.\n"
        }
      },
      "requiredInputs": [
        "domainIpAddress",
        "domainName",
        "domainServerName",
        "filePath"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRestoreDomain resources.\n",
        "properties": {
          "domainIpAddress": {
            "type": "string",
            "description": "IPv4 address.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
          },
          "domainName": {
            "type": "string",
            "description": "Domain name. Should be unique in the MDS.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
          },
          "domainServerName": {
            "type": "string",
            "description": "Multi Domain server name.<br><font color=\"red\">Required only for</font> importing Security Management Server into Multi-Domain Server.\n"
          },
          "filePath": {
            "type": "string",
            "description": "Path to the backup file to be restored. <br>Should be the full file path (example, \"/var/log/domain1_backup.tgz\").\n"
          },
          "managementRestoreDomainId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "verifyOnly": {
            "type": "boolean",
            "description": "If true, verify that the import operation is valid for this input file and this environment <br>Note: Restore operation will not be executed.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRevertToRevision:ManagementRevertToRevision": {
      "properties": {
        "managementRevertToRevisionId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "toSession": {
          "type": "string",
          "description": "Session unique identifier. Specify the session  id you would like to revert your database to.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRevertToRevisionId",
        "taskId"
      ],
      "inputProperties": {
        "managementRevertToRevisionId": {
          "type": "string"
        },
        "toSession": {
          "type": "string",
          "description": "Session unique identifier. Specify the session  id you would like to revert your database to.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRevertToRevision resources.\n",
        "properties": {
          "managementRevertToRevisionId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "toSession": {
            "type": "string",
            "description": "Session unique identifier. Specify the session  id you would like to revert your database to.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRunAppControlUpdate:ManagementRunAppControlUpdate": {
      "properties": {
        "managementRunAppControlUpdateId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier. Use show-task command to check the progress of the task.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRunAppControlUpdateId",
        "taskId"
      ],
      "inputProperties": {
        "managementRunAppControlUpdateId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRunAppControlUpdate resources.\n",
        "properties": {
          "managementRunAppControlUpdateId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier. Use show-task command to check the progress of the task.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRunIpsUpdate:ManagementRunIpsUpdate": {
      "properties": {
        "managementRunIpsUpdateId": {
          "type": "string"
        },
        "packagePath": {
          "type": "string",
          "description": "Offline update package path.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRunIpsUpdateId",
        "taskId"
      ],
      "inputProperties": {
        "managementRunIpsUpdateId": {
          "type": "string"
        },
        "packagePath": {
          "type": "string",
          "description": "Offline update package path.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRunIpsUpdate resources.\n",
        "properties": {
          "managementRunIpsUpdateId": {
            "type": "string"
          },
          "packagePath": {
            "type": "string",
            "description": "Offline update package path.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRunScript:ManagementRunScript": {
      "properties": {
        "args": {
          "type": "string",
          "description": "Script arguments.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "managementRunScriptId": {
          "type": "string"
        },
        "response": {
          "type": "string",
          "description": "Response message in JSON format.\n"
        },
        "script": {
          "type": "string",
          "description": "Script body.\n"
        },
        "scriptName": {
          "type": "string",
          "description": "Script name.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "tasks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of asynchronous task unique identifiers.\n"
        },
        "timeout": {
          "type": "number",
          "description": "Script timeout in seconds.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRunScriptId",
        "response",
        "script",
        "scriptName",
        "targets",
        "tasks"
      ],
      "inputProperties": {
        "args": {
          "type": "string",
          "description": "Script arguments.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "managementRunScriptId": {
          "type": "string"
        },
        "script": {
          "type": "string",
          "description": "Script body.\n"
        },
        "scriptName": {
          "type": "string",
          "description": "Script name.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "timeout": {
          "type": "number",
          "description": "Script timeout in seconds.\n"
        }
      },
      "requiredInputs": [
        "script",
        "scriptName",
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRunScript resources.\n",
        "properties": {
          "args": {
            "type": "string",
            "description": "Script arguments.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "managementRunScriptId": {
            "type": "string"
          },
          "response": {
            "type": "string",
            "description": "Response message in JSON format.\n"
          },
          "script": {
            "type": "string",
            "description": "Script body.\n"
          },
          "scriptName": {
            "type": "string",
            "description": "Script name.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "tasks": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of asynchronous task unique identifiers.\n"
          },
          "timeout": {
            "type": "number",
            "description": "Script timeout in seconds.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRunThreatEmulationFileTypesOfflineUpdate:ManagementRunThreatEmulationFileTypesOfflineUpdate": {
      "properties": {
        "filePath": {
          "type": "string",
          "description": "File path for offline update of Threat Emulation file types, the file path should be on the management machine.\n"
        },
        "fileRawData": {
          "type": "string",
          "description": "The contents of a file containing the Threat Emulation file types.\n"
        },
        "managementRunThreatEmulationFileTypesOfflineUpdateId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "filePath",
        "fileRawData",
        "managementRunThreatEmulationFileTypesOfflineUpdateId"
      ],
      "inputProperties": {
        "filePath": {
          "type": "string",
          "description": "File path for offline update of Threat Emulation file types, the file path should be on the management machine.\n"
        },
        "fileRawData": {
          "type": "string",
          "description": "The contents of a file containing the Threat Emulation file types.\n"
        },
        "managementRunThreatEmulationFileTypesOfflineUpdateId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "filePath",
        "fileRawData"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRunThreatEmulationFileTypesOfflineUpdate resources.\n",
        "properties": {
          "filePath": {
            "type": "string",
            "description": "File path for offline update of Threat Emulation file types, the file path should be on the management machine.\n"
          },
          "fileRawData": {
            "type": "string",
            "description": "The contents of a file containing the Threat Emulation file types.\n"
          },
          "managementRunThreatEmulationFileTypesOfflineUpdateId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementRunTrustedCaUpdate:ManagementRunTrustedCaUpdate": {
      "properties": {
        "managementRunTrustedCaUpdateId": {
          "type": "string"
        },
        "packagePath": {
          "type": "string",
          "description": "Path on the management server for offline Trusted CAs package update.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementRunTrustedCaUpdateId",
        "taskId"
      ],
      "inputProperties": {
        "managementRunTrustedCaUpdateId": {
          "type": "string"
        },
        "packagePath": {
          "type": "string",
          "description": "Path on the management server for offline Trusted CAs package update.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementRunTrustedCaUpdate resources.\n",
        "properties": {
          "managementRunTrustedCaUpdateId": {
            "type": "string"
          },
          "packagePath": {
            "type": "string",
            "description": "Path on the management server for offline Trusted CAs package update.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSecuremoteDnsServer:ManagementSecuremoteDnsServer": {
      "description": "This resource allows you to execute Check Point Securemote Dns Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSecuremoteDnsServer(\"example\", {\n    name: \"TestSecuRemoteDNSSever\",\n    host: \"TestHost\",\n    domains: [\n        {\n            domainSuffix: \".com\",\n            maximumPrefixLabelCount: 2,\n        },\n        {\n            domainSuffix: \".local\",\n            maximumPrefixLabelCount: 3,\n        },\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSecuremoteDnsServer(\"example\",\n    name=\"TestSecuRemoteDNSSever\",\n    host=\"TestHost\",\n    domains=[\n        {\n            \"domain_suffix\": \".com\",\n            \"maximum_prefix_label_count\": 2,\n        },\n        {\n            \"domain_suffix\": \".local\",\n            \"maximum_prefix_label_count\": 3,\n        },\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSecuremoteDnsServer(\"example\", new()\n    {\n        Name = \"TestSecuRemoteDNSSever\",\n        Host = \"TestHost\",\n        Domains = new[]\n        {\n            new Checkpoint.Inputs.ManagementSecuremoteDnsServerDomainArgs\n            {\n                DomainSuffix = \".com\",\n                MaximumPrefixLabelCount = 2,\n            },\n            new Checkpoint.Inputs.ManagementSecuremoteDnsServerDomainArgs\n            {\n                DomainSuffix = \".local\",\n                MaximumPrefixLabelCount = 3,\n            },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSecuremoteDnsServer(ctx, \"example\", &checkpoint.ManagementSecuremoteDnsServerArgs{\n\t\t\tName: pulumi.String(\"TestSecuRemoteDNSSever\"),\n\t\t\tHost: pulumi.String(\"TestHost\"),\n\t\t\tDomains: checkpoint.ManagementSecuremoteDnsServerDomainArray{\n\t\t\t\t&checkpoint.ManagementSecuremoteDnsServerDomainArgs{\n\t\t\t\t\tDomainSuffix:            pulumi.String(\".com\"),\n\t\t\t\t\tMaximumPrefixLabelCount: pulumi.Float64(2),\n\t\t\t\t},\n\t\t\t\t&checkpoint.ManagementSecuremoteDnsServerDomainArgs{\n\t\t\t\t\tDomainSuffix:            pulumi.String(\".local\"),\n\t\t\t\t\tMaximumPrefixLabelCount: pulumi.Float64(3),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSecuremoteDnsServer;\nimport com.pulumi.checkpoint.ManagementSecuremoteDnsServerArgs;\nimport com.pulumi.checkpoint.inputs.ManagementSecuremoteDnsServerDomainArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSecuremoteDnsServer(\"example\", ManagementSecuremoteDnsServerArgs.builder()\n            .name(\"TestSecuRemoteDNSSever\")\n            .host(\"TestHost\")\n            .domains(            \n                ManagementSecuremoteDnsServerDomainArgs.builder()\n                    .domainSuffix(\".com\")\n                    .maximumPrefixLabelCount(2.0)\n                    .build(),\n                ManagementSecuremoteDnsServerDomainArgs.builder()\n                    .domainSuffix(\".local\")\n                    .maximumPrefixLabelCount(3.0)\n                    .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSecuremoteDnsServer\n    properties:\n      name: TestSecuRemoteDNSSever\n      host: TestHost\n      domains:\n        - domainSuffix: .com\n          maximumPrefixLabelCount: 2\n        - domainSuffix: .local\n          maximumPrefixLabelCount: 3\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSecuremoteDnsServerDomain:ManagementSecuremoteDnsServerDomain"
          },
          "description": "The DNS domains that the remote clients can access. domains blocks are documented below.\n"
        },
        "host": {
          "type": "string",
          "description": "DNS server for remote clients in the Remote access community. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSecuremoteDnsServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "host",
        "managementSecuremoteDnsServerId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSecuremoteDnsServerDomain:ManagementSecuremoteDnsServerDomain"
          },
          "description": "The DNS domains that the remote clients can access. domains blocks are documented below.\n"
        },
        "host": {
          "type": "string",
          "description": "DNS server for remote clients in the Remote access community. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSecuremoteDnsServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "host"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSecuremoteDnsServer resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "domains": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementSecuremoteDnsServerDomain:ManagementSecuremoteDnsServerDomain"
            },
            "description": "The DNS domains that the remote clients can access. domains blocks are documented below.\n"
          },
          "host": {
            "type": "string",
            "description": "DNS server for remote clients in the Remote access community. \nIdentified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSecuremoteDnsServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSecuridServer:ManagementSecuridServer": {
      "description": "This resource allows you to execute Check Point Securid Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSecuridServer(\"example\", {\n    name: \"TestSecurIdServer\",\n    configFileName: \"configFile\",\n    base64ConfigFileContent: \"Q0xJRU5UX0lQPSAxLjEuMS4xMQ==\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSecuridServer(\"example\",\n    name=\"TestSecurIdServer\",\n    config_file_name=\"configFile\",\n    base64_config_file_content=\"Q0xJRU5UX0lQPSAxLjEuMS4xMQ==\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSecuridServer(\"example\", new()\n    {\n        Name = \"TestSecurIdServer\",\n        ConfigFileName = \"configFile\",\n        Base64ConfigFileContent = \"Q0xJRU5UX0lQPSAxLjEuMS4xMQ==\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSecuridServer(ctx, \"example\", &checkpoint.ManagementSecuridServerArgs{\n\t\t\tName:                    pulumi.String(\"TestSecurIdServer\"),\n\t\t\tConfigFileName:          pulumi.String(\"configFile\"),\n\t\t\tBase64ConfigFileContent: pulumi.String(\"Q0xJRU5UX0lQPSAxLjEuMS4xMQ==\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSecuridServer;\nimport com.pulumi.checkpoint.ManagementSecuridServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSecuridServer(\"example\", ManagementSecuridServerArgs.builder()\n            .name(\"TestSecurIdServer\")\n            .configFileName(\"configFile\")\n            .base64ConfigFileContent(\"Q0xJRU5UX0lQPSAxLjEuMS4xMQ==\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSecuridServer\n    properties:\n      name: TestSecurIdServer\n      configFileName: configFile\n      base64ConfigFileContent: Q0xJRU5UX0lQPSAxLjEuMS4xMQ==\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64ConfigFileContent": {
          "type": "string",
          "description": "Base64 encoded configuration file for authentication.<br>If no SecurID file was selected - this feature will work properly only if a SecurID file was already deployed manually on the target machine.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "configFileName": {
          "type": "string",
          "description": "Configuration file name. <font color=\"red\">Required only when</font> 'base64-config-file-content' is not empty.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSecuridServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSecuridServerId",
        "name"
      ],
      "inputProperties": {
        "base64ConfigFileContent": {
          "type": "string",
          "description": "Base64 encoded configuration file for authentication.<br>If no SecurID file was selected - this feature will work properly only if a SecurID file was already deployed manually on the target machine.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "configFileName": {
          "type": "string",
          "description": "Configuration file name. <font color=\"red\">Required only when</font> 'base64-config-file-content' is not empty.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSecuridServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSecuridServer resources.\n",
        "properties": {
          "base64ConfigFileContent": {
            "type": "string",
            "description": "Base64 encoded configuration file for authentication.<br>If no SecurID file was selected - this feature will work properly only if a SecurID file was already deployed manually on the target machine.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "configFileName": {
            "type": "string",
            "description": "Configuration file name. <font color=\"red\">Required only when</font> 'base64-config-file-content' is not empty.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSecuridServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSecurityZone:ManagementSecurityZone": {
      "description": "This resource allows you to execute Check Point Security Zone.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSecurityZone(\"example\", {\n    name: \"SZone1\",\n    comments: \"My Security Zone 1\",\n    color: \"yellow\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSecurityZone(\"example\",\n    name=\"SZone1\",\n    comments=\"My Security Zone 1\",\n    color=\"yellow\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSecurityZone(\"example\", new()\n    {\n        Name = \"SZone1\",\n        Comments = \"My Security Zone 1\",\n        Color = \"yellow\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSecurityZone(ctx, \"example\", &checkpoint.ManagementSecurityZoneArgs{\n\t\t\tName:     pulumi.String(\"SZone1\"),\n\t\t\tComments: pulumi.String(\"My Security Zone 1\"),\n\t\t\tColor:    pulumi.String(\"yellow\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSecurityZone;\nimport com.pulumi.checkpoint.ManagementSecurityZoneArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSecurityZone(\"example\", ManagementSecurityZoneArgs.builder()\n            .name(\"SZone1\")\n            .comments(\"My Security Zone 1\")\n            .color(\"yellow\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSecurityZone\n    properties:\n      name: SZone1\n      comments: My Security Zone 1\n      color: yellow\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSecurityZoneId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSecurityZoneId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSecurityZoneId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSecurityZone resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSecurityZoneId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServerCertificate:ManagementServerCertificate": {
      "description": "This resource allows you to execute Check Point Server Certificate.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServerCertificate(\"example\", {\n    name: \"MyServerCertificate\",\n    base64Certificate: \"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\",\n    base64Password: \"bXlfcGFzc3dvcmQ=\",\n    comments: \"this is a comment\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServerCertificate(\"example\",\n    name=\"MyServerCertificate\",\n    base64_certificate=\"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\",\n    base64_password=\"bXlfcGFzc3dvcmQ=\",\n    comments=\"this is a comment\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServerCertificate(\"example\", new()\n    {\n        Name = \"MyServerCertificate\",\n        Base64Certificate = \"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\",\n        Base64Password = \"bXlfcGFzc3dvcmQ=\",\n        Comments = \"this is a comment\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServerCertificate(ctx, \"example\", &checkpoint.ManagementServerCertificateArgs{\n\t\t\tName:              pulumi.String(\"MyServerCertificate\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t\tBase64Password:    pulumi.String(\"bXlfcGFzc3dvcmQ=\"),\n\t\t\tComments:          pulumi.String(\"this is a comment\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServerCertificate;\nimport com.pulumi.checkpoint.ManagementServerCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServerCertificate(\"example\", ManagementServerCertificateArgs.builder()\n            .name(\"MyServerCertificate\")\n            .base64Certificate(\"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\")\n            .base64Password(\"bXlfcGFzc3dvcmQ=\")\n            .comments(\"this is a comment\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServerCertificate\n    properties:\n      name: MyServerCertificate\n      base64Certificate: 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\n      base64Password: bXlfcGFzc3dvcmQ=\n      comments: this is a comment\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.<br/>Valid file formats: p12.\n",
          "secret": true
        },
        "base64Password": {
          "type": "string",
          "description": "Base64 encoded password of the certificate file.\n",
          "secret": true
        },
        "comments": {
          "type": "string",
          "description": "Server certificate comments.\n"
        },
        "managementServerCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "subject": {
          "type": "string",
          "description": "Certificate's subject.\n"
        },
        "validFrom": {
          "type": "string",
          "description": "Server certificate valid from date.\n"
        },
        "validTo": {
          "type": "string",
          "description": "Server certificate valid up to date.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServerCertificateId",
        "name",
        "subject",
        "validFrom",
        "validTo"
      ],
      "inputProperties": {
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.<br/>Valid file formats: p12.\n",
          "secret": true
        },
        "base64Password": {
          "type": "string",
          "description": "Base64 encoded password of the certificate file.\n",
          "secret": true
        },
        "comments": {
          "type": "string",
          "description": "Server certificate comments.\n"
        },
        "managementServerCertificateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServerCertificate resources.\n",
        "properties": {
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64.<br/>Valid file formats: p12.\n",
            "secret": true
          },
          "base64Password": {
            "type": "string",
            "description": "Base64 encoded password of the certificate file.\n",
            "secret": true
          },
          "comments": {
            "type": "string",
            "description": "Server certificate comments.\n"
          },
          "managementServerCertificateId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "subject": {
            "type": "string",
            "description": "Certificate's subject.\n"
          },
          "validFrom": {
            "type": "string",
            "description": "Server certificate valid from date.\n"
          },
          "validTo": {
            "type": "string",
            "description": "Server certificate valid up to date.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceCitrixTcp:ManagementServiceCitrixTcp": {
      "description": "This resource allows you to execute Check Point Service Citrix Tcp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceCitrixTcp(\"example\", {\n    name: \"mycitrixtcp\",\n    application: \"My Citrix Application\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceCitrixTcp(\"example\",\n    name=\"mycitrixtcp\",\n    application=\"My Citrix Application\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceCitrixTcp(\"example\", new()\n    {\n        Name = \"mycitrixtcp\",\n        Application = \"My Citrix Application\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceCitrixTcp(ctx, \"example\", &checkpoint.ManagementServiceCitrixTcpArgs{\n\t\t\tName:        pulumi.String(\"mycitrixtcp\"),\n\t\t\tApplication: pulumi.String(\"My Citrix Application\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceCitrixTcp;\nimport com.pulumi.checkpoint.ManagementServiceCitrixTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceCitrixTcp(\"example\", ManagementServiceCitrixTcpArgs.builder()\n            .name(\"mycitrixtcp\")\n            .application(\"My Citrix Application\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceCitrixTcp\n    properties:\n      name: mycitrixtcp\n      application: My Citrix Application\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "application": {
          "type": "string",
          "description": "Citrix application name.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementServiceCitrixTcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceCitrixTcpId",
        "name"
      ],
      "inputProperties": {
        "application": {
          "type": "string",
          "description": "Citrix application name.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementServiceCitrixTcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceCitrixTcp resources.\n",
        "properties": {
          "application": {
            "type": "string",
            "description": "Citrix application name.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementServiceCitrixTcpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceCompoundTcp:ManagementServiceCompoundTcp": {
      "description": "This resource allows you to execute Check Point Service Compound Tcp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceCompoundTcp(\"example\", {\n    name: \"mycompoundtcp\",\n    compoundService: \"pointcast\",\n    keepConnectionsOpenAfterPolicyInstallation: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceCompoundTcp(\"example\",\n    name=\"mycompoundtcp\",\n    compound_service=\"pointcast\",\n    keep_connections_open_after_policy_installation=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceCompoundTcp(\"example\", new()\n    {\n        Name = \"mycompoundtcp\",\n        CompoundService = \"pointcast\",\n        KeepConnectionsOpenAfterPolicyInstallation = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceCompoundTcp(ctx, \"example\", &checkpoint.ManagementServiceCompoundTcpArgs{\n\t\t\tName:            pulumi.String(\"mycompoundtcp\"),\n\t\t\tCompoundService: pulumi.String(\"pointcast\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceCompoundTcp;\nimport com.pulumi.checkpoint.ManagementServiceCompoundTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceCompoundTcp(\"example\", ManagementServiceCompoundTcpArgs.builder()\n            .name(\"mycompoundtcp\")\n            .compoundService(\"pointcast\")\n            .keepConnectionsOpenAfterPolicyInstallation(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceCompoundTcp\n    properties:\n      name: mycompoundtcp\n      compoundService: pointcast\n      keepConnectionsOpenAfterPolicyInstallation: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "compoundService": {
          "type": "string",
          "description": "Compound service type.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceCompoundTcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceCompoundTcpId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "compoundService": {
          "type": "string",
          "description": "Compound service type.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceCompoundTcpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceCompoundTcp resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "compoundService": {
            "type": "string",
            "description": "Compound service type.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceCompoundTcpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceDceRpc:ManagementServiceDceRpc": {
      "description": "This resource allows you to execute Check Point Service Dce Rpc.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceDceRpc(\"example\", {\n    name: \"New_DCE-RPC_Service_1\",\n    interfaceUuid: \"97aeb460-9aea-11d5-bd16-0090272ccb30\",\n    keepConnectionsOpenAfterPolicyInstallation: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceDceRpc(\"example\",\n    name=\"New_DCE-RPC_Service_1\",\n    interface_uuid=\"97aeb460-9aea-11d5-bd16-0090272ccb30\",\n    keep_connections_open_after_policy_installation=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceDceRpc(\"example\", new()\n    {\n        Name = \"New_DCE-RPC_Service_1\",\n        InterfaceUuid = \"97aeb460-9aea-11d5-bd16-0090272ccb30\",\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceDceRpc(ctx, \"example\", &checkpoint.ManagementServiceDceRpcArgs{\n\t\t\tName:          pulumi.String(\"New_DCE-RPC_Service_1\"),\n\t\t\tInterfaceUuid: pulumi.String(\"97aeb460-9aea-11d5-bd16-0090272ccb30\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceDceRpc;\nimport com.pulumi.checkpoint.ManagementServiceDceRpcArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceDceRpc(\"example\", ManagementServiceDceRpcArgs.builder()\n            .name(\"New_DCE-RPC_Service_1\")\n            .interfaceUuid(\"97aeb460-9aea-11d5-bd16-0090272ccb30\")\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceDceRpc\n    properties:\n      name: New_DCE-RPC_Service_1\n      interfaceUuid: 97aeb460-9aea-11d5-bd16-0090272ccb30\n      keepConnectionsOpenAfterPolicyInstallation: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaceUuid": {
          "type": "string",
          "description": "Network interface UUID.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceDceRpcId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceDceRpcId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaceUuid": {
          "type": "string",
          "description": "Network interface UUID.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceDceRpcId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceDceRpc resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interfaceUuid": {
            "type": "string",
            "description": "Network interface UUID.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceDceRpcId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceGroup:ManagementServiceGroup": {
      "description": "This resource allows you to add/update/delete Check Point Service Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceGroup(\"example\", {\n    name: \"New Service Group 1\",\n    members: [\n        \"https\",\n        \"bootp\",\n        \"nisplus\",\n        \"HP-OpCdistm\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceGroup(\"example\",\n    name=\"New Service Group 1\",\n    members=[\n        \"https\",\n        \"bootp\",\n        \"nisplus\",\n        \"HP-OpCdistm\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceGroup(\"example\", new()\n    {\n        Name = \"New Service Group 1\",\n        Members = new[]\n        {\n            \"https\",\n            \"bootp\",\n            \"nisplus\",\n            \"HP-OpCdistm\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceGroup(ctx, \"example\", &checkpoint.ManagementServiceGroupArgs{\n\t\t\tName: pulumi.String(\"New Service Group 1\"),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"https\"),\n\t\t\t\tpulumi.String(\"bootp\"),\n\t\t\t\tpulumi.String(\"nisplus\"),\n\t\t\t\tpulumi.String(\"HP-OpCdistm\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceGroup;\nimport com.pulumi.checkpoint.ManagementServiceGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceGroup(\"example\", ManagementServiceGroupArgs.builder()\n            .name(\"New Service Group 1\")\n            .members(            \n                \"https\",\n                \"bootp\",\n                \"nisplus\",\n                \"HP-OpCdistm\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceGroup\n    properties:\n      name: New Service Group 1\n      members:\n        - https\n        - bootp\n        - nisplus\n        - HP-OpCdistm\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementServiceGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementServiceGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementServiceGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceGtp:ManagementServiceGtp": {
      "description": "This resource allows you to execute Check Point Service Gtp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceGtp = new checkpoint.ManagementServiceGtp(\"service_gtp\", {\n    name: \"gtp_svc1\",\n    version: \"v2\",\n    reverseService: true,\n    traceManagement: true,\n    imsiPrefix: {\n        enable: \"true\",\n        prefix: \"123\",\n    },\n    interfaceProfile: {\n        profile: \"Custom\",\n        custom_message_types: \"32-35\",\n    },\n    selectionMode: {\n        enable: true,\n        mode: 1,\n    },\n    msIsdn: {\n        enable: \"true\",\n        ms_isdn: \"312\",\n    },\n    accessPointName: {\n        enable: \"true\",\n        apn: \"AccP2\",\n    },\n    applyAccessPolicyOnUserTraffic: {\n        enable: \"true\",\n        add_imsi_field_to_log: \"true\",\n    },\n    radioAccessTechnology: {\n        otherTypesRange: {\n            enable: true,\n            types: \"11-50\",\n        },\n    },\n    ldapGroup: {\n        enable: \"true\",\n        group: \"ldap_group_1\",\n        according_to: \"MS-ISDN\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_gtp = checkpoint.ManagementServiceGtp(\"service_gtp\",\n    name=\"gtp_svc1\",\n    version=\"v2\",\n    reverse_service=True,\n    trace_management=True,\n    imsi_prefix={\n        \"enable\": \"true\",\n        \"prefix\": \"123\",\n    },\n    interface_profile={\n        \"profile\": \"Custom\",\n        \"custom_message_types\": \"32-35\",\n    },\n    selection_mode={\n        \"enable\": True,\n        \"mode\": 1,\n    },\n    ms_isdn={\n        \"enable\": \"true\",\n        \"ms_isdn\": \"312\",\n    },\n    access_point_name={\n        \"enable\": \"true\",\n        \"apn\": \"AccP2\",\n    },\n    apply_access_policy_on_user_traffic={\n        \"enable\": \"true\",\n        \"add_imsi_field_to_log\": \"true\",\n    },\n    radio_access_technology={\n        \"other_types_range\": {\n            \"enable\": True,\n            \"types\": \"11-50\",\n        },\n    },\n    ldap_group={\n        \"enable\": \"true\",\n        \"group\": \"ldap_group_1\",\n        \"according_to\": \"MS-ISDN\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var serviceGtp = new Checkpoint.ManagementServiceGtp(\"service_gtp\", new()\n    {\n        Name = \"gtp_svc1\",\n        Version = \"v2\",\n        ReverseService = true,\n        TraceManagement = true,\n        ImsiPrefix = \n        {\n            { \"enable\", \"true\" },\n            { \"prefix\", \"123\" },\n        },\n        InterfaceProfile = \n        {\n            { \"profile\", \"Custom\" },\n            { \"custom_message_types\", \"32-35\" },\n        },\n        SelectionMode = new Checkpoint.Inputs.ManagementServiceGtpSelectionModeArgs\n        {\n            Enable = true,\n            Mode = 1,\n        },\n        MsIsdn = \n        {\n            { \"enable\", \"true\" },\n            { \"ms_isdn\", \"312\" },\n        },\n        AccessPointName = \n        {\n            { \"enable\", \"true\" },\n            { \"apn\", \"AccP2\" },\n        },\n        ApplyAccessPolicyOnUserTraffic = \n        {\n            { \"enable\", \"true\" },\n            { \"add_imsi_field_to_log\", \"true\" },\n        },\n        RadioAccessTechnology = new Checkpoint.Inputs.ManagementServiceGtpRadioAccessTechnologyArgs\n        {\n            OtherTypesRange = new Checkpoint.Inputs.ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs\n            {\n                Enable = true,\n                Types = \"11-50\",\n            },\n        },\n        LdapGroup = \n        {\n            { \"enable\", \"true\" },\n            { \"group\", \"ldap_group_1\" },\n            { \"according_to\", \"MS-ISDN\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceGtp(ctx, \"service_gtp\", &checkpoint.ManagementServiceGtpArgs{\n\t\t\tName:            pulumi.String(\"gtp_svc1\"),\n\t\t\tVersion:         pulumi.String(\"v2\"),\n\t\t\tReverseService:  pulumi.Bool(true),\n\t\t\tTraceManagement: pulumi.Bool(true),\n\t\t\tImsiPrefix: pulumi.StringMap{\n\t\t\t\t\"enable\": pulumi.String(\"true\"),\n\t\t\t\t\"prefix\": pulumi.String(\"123\"),\n\t\t\t},\n\t\t\tInterfaceProfile: pulumi.StringMap{\n\t\t\t\t\"profile\":              pulumi.String(\"Custom\"),\n\t\t\t\t\"custom_message_types\": pulumi.String(\"32-35\"),\n\t\t\t},\n\t\t\tSelectionMode: &checkpoint.ManagementServiceGtpSelectionModeArgs{\n\t\t\t\tEnable: pulumi.Bool(true),\n\t\t\t\tMode:   pulumi.Float64(1),\n\t\t\t},\n\t\t\tMsIsdn: pulumi.StringMap{\n\t\t\t\t\"enable\":  pulumi.String(\"true\"),\n\t\t\t\t\"ms_isdn\": pulumi.String(\"312\"),\n\t\t\t},\n\t\t\tAccessPointName: pulumi.StringMap{\n\t\t\t\t\"enable\": pulumi.String(\"true\"),\n\t\t\t\t\"apn\":    pulumi.String(\"AccP2\"),\n\t\t\t},\n\t\t\tApplyAccessPolicyOnUserTraffic: pulumi.StringMap{\n\t\t\t\t\"enable\":                pulumi.String(\"true\"),\n\t\t\t\t\"add_imsi_field_to_log\": pulumi.String(\"true\"),\n\t\t\t},\n\t\t\tRadioAccessTechnology: &checkpoint.ManagementServiceGtpRadioAccessTechnologyArgs{\n\t\t\t\tOtherTypesRange: &checkpoint.ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs{\n\t\t\t\t\tEnable: pulumi.Bool(true),\n\t\t\t\t\tTypes:  pulumi.String(\"11-50\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLdapGroup: pulumi.StringMap{\n\t\t\t\t\"enable\":       pulumi.String(\"true\"),\n\t\t\t\t\"group\":        pulumi.String(\"ldap_group_1\"),\n\t\t\t\t\"according_to\": pulumi.String(\"MS-ISDN\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceGtp;\nimport com.pulumi.checkpoint.ManagementServiceGtpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementServiceGtpSelectionModeArgs;\nimport com.pulumi.checkpoint.inputs.ManagementServiceGtpRadioAccessTechnologyArgs;\nimport com.pulumi.checkpoint.inputs.ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceGtp = new ManagementServiceGtp(\"serviceGtp\", ManagementServiceGtpArgs.builder()\n            .name(\"gtp_svc1\")\n            .version(\"v2\")\n            .reverseService(true)\n            .traceManagement(true)\n            .imsiPrefix(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"prefix\", \"123\")\n            ))\n            .interfaceProfile(Map.ofEntries(\n                Map.entry(\"profile\", \"Custom\"),\n                Map.entry(\"custom_message_types\", \"32-35\")\n            ))\n            .selectionMode(ManagementServiceGtpSelectionModeArgs.builder()\n                .enable(true)\n                .mode(1.0)\n                .build())\n            .msIsdn(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"ms_isdn\", \"312\")\n            ))\n            .accessPointName(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"apn\", \"AccP2\")\n            ))\n            .applyAccessPolicyOnUserTraffic(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"add_imsi_field_to_log\", \"true\")\n            ))\n            .radioAccessTechnology(ManagementServiceGtpRadioAccessTechnologyArgs.builder()\n                .otherTypesRange(ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs.builder()\n                    .enable(true)\n                    .types(\"11-50\")\n                    .build())\n                .build())\n            .ldapGroup(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"group\", \"ldap_group_1\"),\n                Map.entry(\"according_to\", \"MS-ISDN\")\n            ))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceGtp:\n    type: checkpoint:ManagementServiceGtp\n    name: service_gtp\n    properties:\n      name: gtp_svc1\n      version: v2\n      reverseService: true\n      traceManagement: true\n      imsiPrefix:\n        enable: true\n        prefix: '123'\n      interfaceProfile:\n        profile: Custom\n        custom_message_types: 32-35\n      selectionMode:\n        enable: true\n        mode: 1\n      msIsdn:\n        enable: true\n        ms_isdn: '312'\n      accessPointName:\n        enable: true\n        apn: AccP2\n      applyAccessPolicyOnUserTraffic:\n        enable: true\n        add_imsi_field_to_log: true\n      radioAccessTechnology:\n        otherTypesRange:\n          enable: true\n          types: 11-50\n      ldapGroup:\n        enable: true\n        group: ldap_group_1\n        according_to: MS-ISDN\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "accessPointName": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by Access Point Name.access_point_name blocks are documented below.\n"
        },
        "allowUsageOfStaticIp": {
          "type": "boolean",
          "description": "Allow usage of static IP addresses.\n"
        },
        "applyAccessPolicyOnUserTraffic": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Apply Access Policy on user traffic.apply_access_policy_on_user_traffic blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "csFallbackAndSrvcc": {
          "type": "boolean",
          "description": "CS Fallback and SRVCC (Relevant for V2 only).\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "imsiPrefix": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by IMSI prefix.imsi_prefix blocks are documented below.\n"
        },
        "interfaceProfile": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match only message types relevant to the given GTP interface. Relevant only for GTP V1 or V2.interface_profile blocks are documented below.\n"
        },
        "ldapGroup": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by an LDAP Group.ldap_group blocks are documented below.\n"
        },
        "managementServiceGtpId": {
          "type": "string"
        },
        "msIsdn": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by an MS-ISDN.ms_isdn blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "radioAccessTechnology": {
          "$ref": "#/types/checkpoint:index%2FManagementServiceGtpRadioAccessTechnology:ManagementServiceGtpRadioAccessTechnology",
          "description": "Match by Radio Access Technology.radio_access_technology blocks are documented below.\n"
        },
        "restorationAndRecovery": {
          "type": "boolean",
          "description": "Restoration and Recovery (Relevant for V2 only).\n"
        },
        "reverseService": {
          "type": "boolean",
          "description": "Accept PDUs from the GGSN/PGW to the SGSN/SGW on a previously established PDP context, even if different ports are used.\n"
        },
        "selectionMode": {
          "$ref": "#/types/checkpoint:index%2FManagementServiceGtpSelectionMode:ManagementServiceGtpSelectionMode",
          "description": "Match by a selection mode.selection_mode blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "traceManagement": {
          "type": "boolean",
          "description": "Trace Management (Relevant for V2 only).\n"
        },
        "version": {
          "type": "string",
          "description": "GTP version.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceGtpId",
        "name"
      ],
      "inputProperties": {
        "accessPointName": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by Access Point Name.access_point_name blocks are documented below.\n"
        },
        "allowUsageOfStaticIp": {
          "type": "boolean",
          "description": "Allow usage of static IP addresses.\n"
        },
        "applyAccessPolicyOnUserTraffic": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Apply Access Policy on user traffic.apply_access_policy_on_user_traffic blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "csFallbackAndSrvcc": {
          "type": "boolean",
          "description": "CS Fallback and SRVCC (Relevant for V2 only).\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "imsiPrefix": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by IMSI prefix.imsi_prefix blocks are documented below.\n"
        },
        "interfaceProfile": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match only message types relevant to the given GTP interface. Relevant only for GTP V1 or V2.interface_profile blocks are documented below.\n"
        },
        "ldapGroup": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by an LDAP Group.ldap_group blocks are documented below.\n"
        },
        "managementServiceGtpId": {
          "type": "string"
        },
        "msIsdn": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Match by an MS-ISDN.ms_isdn blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "radioAccessTechnology": {
          "$ref": "#/types/checkpoint:index%2FManagementServiceGtpRadioAccessTechnology:ManagementServiceGtpRadioAccessTechnology",
          "description": "Match by Radio Access Technology.radio_access_technology blocks are documented below.\n"
        },
        "restorationAndRecovery": {
          "type": "boolean",
          "description": "Restoration and Recovery (Relevant for V2 only).\n"
        },
        "reverseService": {
          "type": "boolean",
          "description": "Accept PDUs from the GGSN/PGW to the SGSN/SGW on a previously established PDP context, even if different ports are used.\n"
        },
        "selectionMode": {
          "$ref": "#/types/checkpoint:index%2FManagementServiceGtpSelectionMode:ManagementServiceGtpSelectionMode",
          "description": "Match by a selection mode.selection_mode blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "traceManagement": {
          "type": "boolean",
          "description": "Trace Management (Relevant for V2 only).\n"
        },
        "version": {
          "type": "string",
          "description": "GTP version.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceGtp resources.\n",
        "properties": {
          "accessPointName": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Match by Access Point Name.access_point_name blocks are documented below.\n"
          },
          "allowUsageOfStaticIp": {
            "type": "boolean",
            "description": "Allow usage of static IP addresses.\n"
          },
          "applyAccessPolicyOnUserTraffic": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Apply Access Policy on user traffic.apply_access_policy_on_user_traffic blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "csFallbackAndSrvcc": {
            "type": "boolean",
            "description": "CS Fallback and SRVCC (Relevant for V2 only).\n"
          },
          "groups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of group identifiers.groups blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "imsiPrefix": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Match by IMSI prefix.imsi_prefix blocks are documented below.\n"
          },
          "interfaceProfile": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Match only message types relevant to the given GTP interface. Relevant only for GTP V1 or V2.interface_profile blocks are documented below.\n"
          },
          "ldapGroup": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Match by an LDAP Group.ldap_group blocks are documented below.\n"
          },
          "managementServiceGtpId": {
            "type": "string"
          },
          "msIsdn": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Match by an MS-ISDN.ms_isdn blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "radioAccessTechnology": {
            "$ref": "#/types/checkpoint:index%2FManagementServiceGtpRadioAccessTechnology:ManagementServiceGtpRadioAccessTechnology",
            "description": "Match by Radio Access Technology.radio_access_technology blocks are documented below.\n"
          },
          "restorationAndRecovery": {
            "type": "boolean",
            "description": "Restoration and Recovery (Relevant for V2 only).\n"
          },
          "reverseService": {
            "type": "boolean",
            "description": "Accept PDUs from the GGSN/PGW to the SGSN/SGW on a previously established PDP context, even if different ports are used.\n"
          },
          "selectionMode": {
            "$ref": "#/types/checkpoint:index%2FManagementServiceGtpSelectionMode:ManagementServiceGtpSelectionMode",
            "description": "Match by a selection mode.selection_mode blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "traceManagement": {
            "type": "boolean",
            "description": "Trace Management (Relevant for V2 only).\n"
          },
          "version": {
            "type": "string",
            "description": "GTP version.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceIcmp6:ManagementServiceIcmp6": {
      "description": "This resource allows you to execute Check Point Service Icmp6.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceIcmp6(\"example\", {\n    name: \"Icmp1\",\n    icmpType: 5,\n    icmpCode: 7,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceIcmp6(\"example\",\n    name=\"Icmp1\",\n    icmp_type=5,\n    icmp_code=7)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceIcmp6(\"example\", new()\n    {\n        Name = \"Icmp1\",\n        IcmpType = 5,\n        IcmpCode = 7,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceIcmp6(ctx, \"example\", &checkpoint.ManagementServiceIcmp6Args{\n\t\t\tName:     pulumi.String(\"Icmp1\"),\n\t\t\tIcmpType: pulumi.Float64(5),\n\t\t\tIcmpCode: pulumi.Float64(7),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceIcmp6;\nimport com.pulumi.checkpoint.ManagementServiceIcmp6Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceIcmp6(\"example\", ManagementServiceIcmp6Args.builder()\n            .name(\"Icmp1\")\n            .icmpType(5.0)\n            .icmpCode(7.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceIcmp6\n    properties:\n      name: Icmp1\n      icmpType: 5\n      icmpCode: 7\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "icmpCode": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "icmpType": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceIcmp6Id": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceIcmp6Id",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "icmpCode": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "icmpType": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceIcmp6Id": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceIcmp6 resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "icmpCode": {
            "type": "number",
            "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
          },
          "icmpType": {
            "type": "number",
            "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceIcmp6Id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceIcmp:ManagementServiceIcmp": {
      "description": "This resource allows you to execute Check Point Service Icmp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceIcmp(\"example\", {\n    name: \"Icmp1\",\n    icmpType: 5,\n    icmpCode: 7,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceIcmp(\"example\",\n    name=\"Icmp1\",\n    icmp_type=5,\n    icmp_code=7)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceIcmp(\"example\", new()\n    {\n        Name = \"Icmp1\",\n        IcmpType = 5,\n        IcmpCode = 7,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceIcmp(ctx, \"example\", &checkpoint.ManagementServiceIcmpArgs{\n\t\t\tName:     pulumi.String(\"Icmp1\"),\n\t\t\tIcmpType: pulumi.Float64(5),\n\t\t\tIcmpCode: pulumi.Float64(7),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceIcmp;\nimport com.pulumi.checkpoint.ManagementServiceIcmpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceIcmp(\"example\", ManagementServiceIcmpArgs.builder()\n            .name(\"Icmp1\")\n            .icmpType(5.0)\n            .icmpCode(7.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceIcmp\n    properties:\n      name: Icmp1\n      icmpType: 5\n      icmpCode: 7\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "icmpCode": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "icmpType": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceIcmpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceIcmpId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "icmpCode": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "icmpType": {
          "type": "number",
          "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceIcmpId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceIcmp resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "icmpCode": {
            "type": "number",
            "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
          },
          "icmpType": {
            "type": "number",
            "description": "As listed in: <a href=\"http://www.iana.org/assignments/icmp-parameters\" target=\"_blank\">RFC 792</a>.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceIcmpId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceOther:ManagementServiceOther": {
      "description": "This resource allows you to execute Check Point Service Other.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceOther(\"example\", {\n    name: \"New_Service_1\",\n    keepConnectionsOpenAfterPolicyInstallation: false,\n    sessionTimeout: 100,\n    matchForAny: true,\n    syncConnectionsOnCluster: true,\n    ipProtocol: 51,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceOther(\"example\",\n    name=\"New_Service_1\",\n    keep_connections_open_after_policy_installation=False,\n    session_timeout=100,\n    match_for_any=True,\n    sync_connections_on_cluster=True,\n    ip_protocol=51)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceOther(\"example\", new()\n    {\n        Name = \"New_Service_1\",\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n        SessionTimeout = 100,\n        MatchForAny = true,\n        SyncConnectionsOnCluster = true,\n        IpProtocol = 51,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceOther(ctx, \"example\", &checkpoint.ManagementServiceOtherArgs{\n\t\t\tName: pulumi.String(\"New_Service_1\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t\tSessionTimeout:           pulumi.Float64(100),\n\t\t\tMatchForAny:              pulumi.Bool(true),\n\t\t\tSyncConnectionsOnCluster: pulumi.Bool(true),\n\t\t\tIpProtocol:               pulumi.Float64(51),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceOther;\nimport com.pulumi.checkpoint.ManagementServiceOtherArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceOther(\"example\", ManagementServiceOtherArgs.builder()\n            .name(\"New_Service_1\")\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .sessionTimeout(100.0)\n            .matchForAny(true)\n            .syncConnectionsOnCluster(true)\n            .ipProtocol(51.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceOther\n    properties:\n      name: New_Service_1\n      keepConnectionsOpenAfterPolicyInstallation: false\n      sessionTimeout: 100\n      matchForAny: true\n      syncConnectionsOnCluster: true\n      ipProtocol: 51\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "acceptReplies": {
          "type": "boolean",
          "description": "Specifies whether Other Service replies are to be accepted.\n"
        },
        "action": {
          "type": "string",
          "description": "Contains an INSPECT expression that defines the action to take if a rule containing this service is matched.\nExample: set<span pulumi-lang-nodejs=\" rMhandler \" pulumi-lang-dotnet=\" RMhandler \" pulumi-lang-go=\" rMhandler \" pulumi-lang-python=\" r_mhandler \" pulumi-lang-yaml=\" rMhandler \" pulumi-lang-java=\" rMhandler \"> r_mhandler </span>&open_ssl_handler sets a handler on the connection.\n"
        },
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections.aggressive_aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipProtocol": {
          "type": "number",
          "description": "IP protocol number.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceOtherId": {
          "type": "string"
        },
        "match": {
          "type": "string",
          "description": "Contains an INSPECT expression that defines the matching criteria. The connection is examined against the expression during the first packet.\nExample: tcp, dport = 21, direction = 0 matches incoming FTP control connections.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceOtherId",
        "name"
      ],
      "inputProperties": {
        "acceptReplies": {
          "type": "boolean",
          "description": "Specifies whether Other Service replies are to be accepted.\n"
        },
        "action": {
          "type": "string",
          "description": "Contains an INSPECT expression that defines the action to take if a rule containing this service is matched.\nExample: set<span pulumi-lang-nodejs=\" rMhandler \" pulumi-lang-dotnet=\" RMhandler \" pulumi-lang-go=\" rMhandler \" pulumi-lang-python=\" r_mhandler \" pulumi-lang-yaml=\" rMhandler \" pulumi-lang-java=\" rMhandler \"> r_mhandler </span>&open_ssl_handler sets a handler on the connection.\n"
        },
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections.aggressive_aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipProtocol": {
          "type": "number",
          "description": "IP protocol number.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceOtherId": {
          "type": "string"
        },
        "match": {
          "type": "string",
          "description": "Contains an INSPECT expression that defines the matching criteria. The connection is examined against the expression during the first packet.\nExample: tcp, dport = 21, direction = 0 matches incoming FTP control connections.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceOther resources.\n",
        "properties": {
          "acceptReplies": {
            "type": "boolean",
            "description": "Specifies whether Other Service replies are to be accepted.\n"
          },
          "action": {
            "type": "string",
            "description": "Contains an INSPECT expression that defines the action to take if a rule containing this service is matched.\nExample: set<span pulumi-lang-nodejs=\" rMhandler \" pulumi-lang-dotnet=\" RMhandler \" pulumi-lang-go=\" rMhandler \" pulumi-lang-python=\" r_mhandler \" pulumi-lang-yaml=\" rMhandler \" pulumi-lang-java=\" rMhandler \"> r_mhandler </span>&open_ssl_handler sets a handler on the connection.\n"
          },
          "aggressiveAging": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Sets short (aggressive) timeouts for idle connections.aggressive_aging blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipProtocol": {
            "type": "number",
            "description": "IP protocol number.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceOtherId": {
            "type": "string"
          },
          "match": {
            "type": "string",
            "description": "Contains an INSPECT expression that defines the matching criteria. The connection is examined against the expression during the first packet.\nExample: tcp, dport = 21, direction = 0 matches incoming FTP control connections.\n"
          },
          "matchForAny": {
            "type": "boolean",
            "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "overrideDefaultSettings": {
            "type": "boolean",
            "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
          },
          "sessionTimeout": {
            "type": "number",
            "description": "Time (in seconds) before the session times out.\n"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean",
            "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean",
            "description": "Use default virtual session timeout.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceRpc:ManagementServiceRpc": {
      "description": "This resource allows you to execute Check Point Service Rpc.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceRpc(\"example\", {\n    name: \"New_RPC_Service_1\",\n    programNumber: 5669,\n    keepConnectionsOpenAfterPolicyInstallation: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceRpc(\"example\",\n    name=\"New_RPC_Service_1\",\n    program_number=5669,\n    keep_connections_open_after_policy_installation=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceRpc(\"example\", new()\n    {\n        Name = \"New_RPC_Service_1\",\n        ProgramNumber = 5669,\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceRpc(ctx, \"example\", &checkpoint.ManagementServiceRpcArgs{\n\t\t\tName:          pulumi.String(\"New_RPC_Service_1\"),\n\t\t\tProgramNumber: pulumi.Float64(5669),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceRpc;\nimport com.pulumi.checkpoint.ManagementServiceRpcArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceRpc(\"example\", ManagementServiceRpcArgs.builder()\n            .name(\"New_RPC_Service_1\")\n            .programNumber(5669.0)\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceRpc\n    properties:\n      name: New_RPC_Service_1\n      programNumber: 5669\n      keepConnectionsOpenAfterPolicyInstallation: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceRpcId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "programNumber": {
          "type": "number",
          "description": "N/A\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceRpcId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceRpcId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "programNumber": {
          "type": "number",
          "description": "N/A\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceRpc resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceRpcId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "programNumber": {
            "type": "number",
            "description": "N/A\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceSctp:ManagementServiceSctp": {
      "description": "This resource allows you to execute Check Point Service Sctp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceSctp(\"example\", {\n    name: \"New_SCTP_Service_1\",\n    port: \"5669\",\n    keepConnectionsOpenAfterPolicyInstallation: false,\n    sessionTimeout: 100,\n    matchForAny: true,\n    syncConnectionsOnCluster: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceSctp(\"example\",\n    name=\"New_SCTP_Service_1\",\n    port=\"5669\",\n    keep_connections_open_after_policy_installation=False,\n    session_timeout=100,\n    match_for_any=True,\n    sync_connections_on_cluster=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceSctp(\"example\", new()\n    {\n        Name = \"New_SCTP_Service_1\",\n        Port = \"5669\",\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n        SessionTimeout = 100,\n        MatchForAny = true,\n        SyncConnectionsOnCluster = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceSctp(ctx, \"example\", &checkpoint.ManagementServiceSctpArgs{\n\t\t\tName: pulumi.String(\"New_SCTP_Service_1\"),\n\t\t\tPort: pulumi.String(\"5669\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t\tSessionTimeout:           pulumi.Float64(100),\n\t\t\tMatchForAny:              pulumi.Bool(true),\n\t\t\tSyncConnectionsOnCluster: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceSctp;\nimport com.pulumi.checkpoint.ManagementServiceSctpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceSctp(\"example\", ManagementServiceSctpArgs.builder()\n            .name(\"New_SCTP_Service_1\")\n            .port(\"5669\")\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .sessionTimeout(100.0)\n            .matchForAny(true)\n            .syncConnectionsOnCluster(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceSctp\n    properties:\n      name: New_SCTP_Service_1\n      port: '5669'\n      keepConnectionsOpenAfterPolicyInstallation: false\n      sessionTimeout: 100\n      matchForAny: true\n      syncConnectionsOnCluster: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections.aggressive_aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceSctpId": {
          "type": "string"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "port": {
          "type": "string",
          "description": "Port number. To specify a port range add a hyphen between the lowest and the highest port numbers, for example 44-45.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Source port number. To specify a port range add a hyphen between the lowest and the highest port numbers, for example 44-45.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceSctpId",
        "name"
      ],
      "inputProperties": {
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections.aggressive_aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceSctpId": {
          "type": "string"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "port": {
          "type": "string",
          "description": "Port number. To specify a port range add a hyphen between the lowest and the highest port numbers, for example 44-45.\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Source port number. To specify a port range add a hyphen between the lowest and the highest port numbers, for example 44-45.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceSctp resources.\n",
        "properties": {
          "aggressiveAging": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Sets short (aggressive) timeouts for idle connections.aggressive_aging blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceSctpId": {
            "type": "string"
          },
          "matchForAny": {
            "type": "boolean",
            "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "port": {
            "type": "string",
            "description": "Port number. To specify a port range add a hyphen between the lowest and the highest port numbers, for example 44-45.\n"
          },
          "sessionTimeout": {
            "type": "number",
            "description": "Time (in seconds) before the session times out.\n"
          },
          "sourcePort": {
            "type": "string",
            "description": "Source port number. To specify a port range add a hyphen between the lowest and the highest port numbers, for example 44-45.\n"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean",
            "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean",
            "description": "Use default virtual session timeout.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceTcp:ManagementServiceTcp": {
      "description": "This resource allows you to add/update/delete Check Point Service Tcp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceTcp(\"example\", {\n    name: \"New_TCP_Service_1\",\n    port: \"5669\",\n    keepConnectionsOpenAfterPolicyInstallation: false,\n    sessionTimeout: 0,\n    matchForAny: true,\n    syncConnectionsOnCluster: true,\n    aggressiveAging: {\n        enable: \"true\",\n        timeout: \"360\",\n        use_default_timeout: \"false\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceTcp(\"example\",\n    name=\"New_TCP_Service_1\",\n    port=\"5669\",\n    keep_connections_open_after_policy_installation=False,\n    session_timeout=0,\n    match_for_any=True,\n    sync_connections_on_cluster=True,\n    aggressive_aging={\n        \"enable\": \"true\",\n        \"timeout\": \"360\",\n        \"use_default_timeout\": \"false\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceTcp(\"example\", new()\n    {\n        Name = \"New_TCP_Service_1\",\n        Port = \"5669\",\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n        SessionTimeout = 0,\n        MatchForAny = true,\n        SyncConnectionsOnCluster = true,\n        AggressiveAging = \n        {\n            { \"enable\", \"true\" },\n            { \"timeout\", \"360\" },\n            { \"use_default_timeout\", \"false\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceTcp(ctx, \"example\", &checkpoint.ManagementServiceTcpArgs{\n\t\t\tName: pulumi.String(\"New_TCP_Service_1\"),\n\t\t\tPort: pulumi.String(\"5669\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t\tSessionTimeout:           pulumi.Float64(0),\n\t\t\tMatchForAny:              pulumi.Bool(true),\n\t\t\tSyncConnectionsOnCluster: pulumi.Bool(true),\n\t\t\tAggressiveAging: pulumi.StringMap{\n\t\t\t\t\"enable\":              pulumi.String(\"true\"),\n\t\t\t\t\"timeout\":             pulumi.String(\"360\"),\n\t\t\t\t\"use_default_timeout\": pulumi.String(\"false\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceTcp;\nimport com.pulumi.checkpoint.ManagementServiceTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceTcp(\"example\", ManagementServiceTcpArgs.builder()\n            .name(\"New_TCP_Service_1\")\n            .port(\"5669\")\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .sessionTimeout(0.0)\n            .matchForAny(true)\n            .syncConnectionsOnCluster(true)\n            .aggressiveAging(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"timeout\", \"360\"),\n                Map.entry(\"use_default_timeout\", \"false\")\n            ))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceTcp\n    properties:\n      name: New_TCP_Service_1\n      port: 5669\n      keepConnectionsOpenAfterPolicyInstallation: false\n      sessionTimeout: 0\n      matchForAny: true\n      syncConnectionsOnCluster: true\n      aggressiveAging:\n        enable: true\n        timeout: 360\n        use_default_timeout: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceTcpId": {
          "type": "string"
        },
        "matchByProtocolSignature": {
          "type": "boolean",
          "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "port": {
          "type": "string",
          "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceTcpId",
        "name"
      ],
      "inputProperties": {
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceTcpId": {
          "type": "string"
        },
        "matchByProtocolSignature": {
          "type": "boolean",
          "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "port": {
          "type": "string",
          "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceTcp resources.\n",
        "properties": {
          "aggressiveAging": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceTcpId": {
            "type": "string"
          },
          "matchByProtocolSignature": {
            "type": "boolean",
            "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
          },
          "matchForAny": {
            "type": "boolean",
            "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "overrideDefaultSettings": {
            "type": "boolean",
            "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
          },
          "port": {
            "type": "string",
            "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
          },
          "protocol": {
            "type": "string",
            "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
          },
          "sessionTimeout": {
            "type": "number",
            "description": "Time (in seconds) before the session times out.\n"
          },
          "sourcePort": {
            "type": "string",
            "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean",
            "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean",
            "description": "Use default virtual session timeout.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementServiceUdp:ManagementServiceUdp": {
      "description": "This resource allows you to add/update/delete Check Point Service Udp.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServiceUdp(\"example\", {\n    name: \"New_UDP_Service_1\",\n    port: \"5669\",\n    keepConnectionsOpenAfterPolicyInstallation: false,\n    sessionTimeout: 0,\n    matchForAny: true,\n    syncConnectionsOnCluster: true,\n    aggressiveAging: {\n        enable: \"true\",\n        timeout: \"360\",\n        use_default_timeout: \"false\",\n    },\n    acceptReplies: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServiceUdp(\"example\",\n    name=\"New_UDP_Service_1\",\n    port=\"5669\",\n    keep_connections_open_after_policy_installation=False,\n    session_timeout=0,\n    match_for_any=True,\n    sync_connections_on_cluster=True,\n    aggressive_aging={\n        \"enable\": \"true\",\n        \"timeout\": \"360\",\n        \"use_default_timeout\": \"false\",\n    },\n    accept_replies=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementServiceUdp(\"example\", new()\n    {\n        Name = \"New_UDP_Service_1\",\n        Port = \"5669\",\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n        SessionTimeout = 0,\n        MatchForAny = true,\n        SyncConnectionsOnCluster = true,\n        AggressiveAging = \n        {\n            { \"enable\", \"true\" },\n            { \"timeout\", \"360\" },\n            { \"use_default_timeout\", \"false\" },\n        },\n        AcceptReplies = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServiceUdp(ctx, \"example\", &checkpoint.ManagementServiceUdpArgs{\n\t\t\tName: pulumi.String(\"New_UDP_Service_1\"),\n\t\t\tPort: pulumi.String(\"5669\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t\tSessionTimeout:           pulumi.Float64(0),\n\t\t\tMatchForAny:              pulumi.Bool(true),\n\t\t\tSyncConnectionsOnCluster: pulumi.Bool(true),\n\t\t\tAggressiveAging: pulumi.StringMap{\n\t\t\t\t\"enable\":              pulumi.String(\"true\"),\n\t\t\t\t\"timeout\":             pulumi.String(\"360\"),\n\t\t\t\t\"use_default_timeout\": pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tAcceptReplies: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceUdp;\nimport com.pulumi.checkpoint.ManagementServiceUdpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServiceUdp(\"example\", ManagementServiceUdpArgs.builder()\n            .name(\"New_UDP_Service_1\")\n            .port(\"5669\")\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .sessionTimeout(0.0)\n            .matchForAny(true)\n            .syncConnectionsOnCluster(true)\n            .aggressiveAging(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"timeout\", \"360\"),\n                Map.entry(\"use_default_timeout\", \"false\")\n            ))\n            .acceptReplies(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServiceUdp\n    properties:\n      name: New_UDP_Service_1\n      port: 5669\n      keepConnectionsOpenAfterPolicyInstallation: false\n      sessionTimeout: 0\n      matchForAny: true\n      syncConnectionsOnCluster: true\n      aggressiveAging:\n        enable: true\n        timeout: 360\n        use_default_timeout: false\n      acceptReplies: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "acceptReplies": {
          "type": "boolean",
          "description": "N/A.\n"
        },
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceUdpId": {
          "type": "string"
        },
        "matchByProtocolSignature": {
          "type": "boolean",
          "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "port": {
          "type": "string",
          "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "type": "object",
      "required": [
        "managementServiceUdpId",
        "name"
      ],
      "inputProperties": {
        "acceptReplies": {
          "type": "boolean",
          "description": "N/A.\n"
        },
        "aggressiveAging": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "keepConnectionsOpenAfterPolicyInstallation": {
          "type": "boolean",
          "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
        },
        "managementServiceUdpId": {
          "type": "string"
        },
        "matchByProtocolSignature": {
          "type": "boolean",
          "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
        },
        "matchForAny": {
          "type": "boolean",
          "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrideDefaultSettings": {
          "type": "boolean",
          "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
        },
        "port": {
          "type": "string",
          "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
        },
        "protocol": {
          "type": "string",
          "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
        },
        "sessionTimeout": {
          "type": "number",
          "description": "Time (in seconds) before the session times out.\n"
        },
        "sourcePort": {
          "type": "string",
          "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
        },
        "syncConnectionsOnCluster": {
          "type": "boolean",
          "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "useDefaultSessionTimeout": {
          "type": "boolean",
          "description": "Use default virtual session timeout.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementServiceUdp resources.\n",
        "properties": {
          "acceptReplies": {
            "type": "boolean",
            "description": "N/A.\n"
          },
          "aggressiveAging": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Sets short (aggressive) timeouts for idle connections. Aggressive Aging blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean",
            "description": "Keep connections open after policy has been installed even if they are not allowed under the new policy. This overrides the settings in the Connection Persistence page. If you change this property, the change will not affect open connections, but only future connections.\n"
          },
          "managementServiceUdpId": {
            "type": "string"
          },
          "matchByProtocolSignature": {
            "type": "boolean",
            "description": "A value of true enables matching by the selected protocol's signature - the signature identifies the protocol as genuine. Select this option to limit the port to the specified protocol. If the selected protocol does not support matching by signature, this field cannot be set to true.\n"
          },
          "matchForAny": {
            "type": "boolean",
            "description": "Indicates whether this service is used when 'Any' is set as the rule's service and there are several service objects with the same source port and protocol.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "overrideDefaultSettings": {
            "type": "boolean",
            "description": "Indicates whether this service is a Data Domain service which has been overridden.\n"
          },
          "port": {
            "type": "string",
            "description": "The number of the port used to provide this service. To specify a port range, place a hyphen between the lowest and highest port numbers, for example 44-55.\n"
          },
          "protocol": {
            "type": "string",
            "description": "Select the protocol type associated with the service, and by implication, the management server (if any) that enforces Content Security and Authentication for the service. Selecting a Protocol Type invokes the specific protocol handlers for each protocol type, thus enabling higher level of security by parsing the protocol, and higher level of connectivity by tracking dynamic actions (such as opening of ports).\n"
          },
          "sessionTimeout": {
            "type": "number",
            "description": "Time (in seconds) before the session times out.\n"
          },
          "sourcePort": {
            "type": "string",
            "description": "Port number for the client side service. If specified, only those Source port Numbers will be Accepted, Dropped, or Rejected during packet inspection. Otherwise, the source port is not inspected.\n"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean",
            "description": "Enables state-synchronized High Availability or Load Sharing on a ClusterXL or OPSEC-certified cluster.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean",
            "description": "Use default virtual session timeout.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetAntiMalwareUpdateSchedule:ManagementSetAntiMalwareUpdateSchedule": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable Anti-Malware Update Schedule.\n"
        },
        "managementSetAntiMalwareUpdateScheduleId": {
          "type": "string"
        },
        "schedule": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAntiMalwareUpdateScheduleSchedule:ManagementSetAntiMalwareUpdateScheduleSchedule",
          "description": "Schedule Configuration.schedule blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetAntiMalwareUpdateScheduleId"
      ],
      "inputProperties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable Anti-Malware Update Schedule.\n"
        },
        "managementSetAntiMalwareUpdateScheduleId": {
          "type": "string"
        },
        "schedule": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAntiMalwareUpdateScheduleSchedule:ManagementSetAntiMalwareUpdateScheduleSchedule",
          "description": "Schedule Configuration.schedule blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetAntiMalwareUpdateSchedule resources.\n",
        "properties": {
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable Anti-Malware Update Schedule.\n"
          },
          "managementSetAntiMalwareUpdateScheduleId": {
            "type": "string"
          },
          "schedule": {
            "$ref": "#/types/checkpoint:index%2FManagementSetAntiMalwareUpdateScheduleSchedule:ManagementSetAntiMalwareUpdateScheduleSchedule",
            "description": "Schedule Configuration.schedule blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetApiSettings:ManagementSetApiSettings": {
      "properties": {
        "acceptedApiCallsFrom": {
          "type": "string",
          "description": "Clients allowed to connect to the API Server.\n"
        },
        "automaticStart": {
          "type": "boolean",
          "description": "MGMT API will start after server will start.\n"
        },
        "managementSetApiSettingsId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementSetApiSettingsId"
      ],
      "inputProperties": {
        "acceptedApiCallsFrom": {
          "type": "string",
          "description": "Clients allowed to connect to the API Server.\n"
        },
        "automaticStart": {
          "type": "boolean",
          "description": "MGMT API will start after server will start.\n"
        },
        "managementSetApiSettingsId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetApiSettings resources.\n",
        "properties": {
          "acceptedApiCallsFrom": {
            "type": "string",
            "description": "Clients allowed to connect to the API Server.\n"
          },
          "automaticStart": {
            "type": "boolean",
            "description": "MGMT API will start after server will start.\n"
          },
          "managementSetApiSettingsId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetAppControlUpdateSchedule:ManagementSetAppControlUpdateSchedule": {
      "properties": {
        "managementSetAppControlUpdateScheduleId": {
          "type": "string"
        },
        "scheduleGatewayUpdate": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleGatewayUpdate:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdate",
          "description": "Application Control & URL Filtering Update Schedule on Gateway.schedule_gateway_update blocks are documented below.\n"
        },
        "scheduleManagementUpdate": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleManagementUpdate:ManagementSetAppControlUpdateScheduleScheduleManagementUpdate",
          "description": "Application Control & URL Filtering Update Schedule on Management Server.schedule_management_update blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetAppControlUpdateScheduleId"
      ],
      "inputProperties": {
        "managementSetAppControlUpdateScheduleId": {
          "type": "string"
        },
        "scheduleGatewayUpdate": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleGatewayUpdate:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdate",
          "description": "Application Control & URL Filtering Update Schedule on Gateway.schedule_gateway_update blocks are documented below.\n"
        },
        "scheduleManagementUpdate": {
          "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleManagementUpdate:ManagementSetAppControlUpdateScheduleScheduleManagementUpdate",
          "description": "Application Control & URL Filtering Update Schedule on Management Server.schedule_management_update blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetAppControlUpdateSchedule resources.\n",
        "properties": {
          "managementSetAppControlUpdateScheduleId": {
            "type": "string"
          },
          "scheduleGatewayUpdate": {
            "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleGatewayUpdate:ManagementSetAppControlUpdateScheduleScheduleGatewayUpdate",
            "description": "Application Control & URL Filtering Update Schedule on Gateway.schedule_gateway_update blocks are documented below.\n"
          },
          "scheduleManagementUpdate": {
            "$ref": "#/types/checkpoint:index%2FManagementSetAppControlUpdateScheduleScheduleManagementUpdate:ManagementSetAppControlUpdateScheduleScheduleManagementUpdate",
            "description": "Application Control & URL Filtering Update Schedule on Management Server.schedule_management_update blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetAutomaticPurge:ManagementSetAutomaticPurge": {
      "description": "This command resource allows you to execute Check Point Set Automatic Purge.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSetAutomaticPurge(\"example\", {\n    enabled: true,\n    keepSessionsByDays: false,\n    numberOfSessionsToKeep: 10,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSetAutomaticPurge(\"example\",\n    enabled=True,\n    keep_sessions_by_days=False,\n    number_of_sessions_to_keep=10)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSetAutomaticPurge(\"example\", new()\n    {\n        Enabled = true,\n        KeepSessionsByDays = false,\n        NumberOfSessionsToKeep = 10,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSetAutomaticPurge(ctx, \"example\", &checkpoint.ManagementSetAutomaticPurgeArgs{\n\t\t\tEnabled:                pulumi.Bool(true),\n\t\t\tKeepSessionsByDays:     pulumi.Bool(false),\n\t\t\tNumberOfSessionsToKeep: pulumi.Float64(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSetAutomaticPurge;\nimport com.pulumi.checkpoint.ManagementSetAutomaticPurgeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSetAutomaticPurge(\"example\", ManagementSetAutomaticPurgeArgs.builder()\n            .enabled(true)\n            .keepSessionsByDays(false)\n            .numberOfSessionsToKeep(10.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSetAutomaticPurge\n    properties:\n      enabled: true\n      keepSessionsByDays: false\n      numberOfSessionsToKeep: 10\n```\n<!--End PulumiCodeChooser -->\n\n## How To Use\n\nMake sure this command will be executed in the right execution order.\n",
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Turn on/off the automatic-purge feature.\n"
        },
        "keepSessionsByCount": {
          "type": "boolean",
          "description": "Whether or not to keep the latest N sessions.\nNote: when the automatic purge feature is enabled, this field and/or the \"keep-sessions-by-date\" field must be set to 'true'.\n"
        },
        "keepSessionsByDays": {
          "type": "boolean",
          "description": "Whether or not to keep the sessions for D days.\nNote: when the automatic purge feature is enabled, this field and/or the \"keep-sessions-by-count\" field must be set to 'true'.\n"
        },
        "managementSetAutomaticPurgeId": {
          "type": "string"
        },
        "numberOfDaysToKeep": {
          "type": "number",
          "description": "When \"keep-sessions-by-days = true\" this sets the number of days to keep the sessions.\n"
        },
        "numberOfSessionsToKeep": {
          "type": "number",
          "description": "When \"keep-sessions-by-count = true\" this sets the number of newest sessions to preserve, by the sessions's publish date.\n"
        },
        "scheduling": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "When to purge sessions that do not meet the \"keep\" criteria. Note: when the automatic purge feature is enabled, this field must be set.scheduling blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "managementSetAutomaticPurgeId"
      ],
      "inputProperties": {
        "enabled": {
          "type": "boolean",
          "description": "Turn on/off the automatic-purge feature.\n"
        },
        "keepSessionsByCount": {
          "type": "boolean",
          "description": "Whether or not to keep the latest N sessions.\nNote: when the automatic purge feature is enabled, this field and/or the \"keep-sessions-by-date\" field must be set to 'true'.\n"
        },
        "keepSessionsByDays": {
          "type": "boolean",
          "description": "Whether or not to keep the sessions for D days.\nNote: when the automatic purge feature is enabled, this field and/or the \"keep-sessions-by-count\" field must be set to 'true'.\n"
        },
        "managementSetAutomaticPurgeId": {
          "type": "string"
        },
        "numberOfDaysToKeep": {
          "type": "number",
          "description": "When \"keep-sessions-by-days = true\" this sets the number of days to keep the sessions.\n"
        },
        "numberOfSessionsToKeep": {
          "type": "number",
          "description": "When \"keep-sessions-by-count = true\" this sets the number of newest sessions to preserve, by the sessions's publish date.\n"
        },
        "scheduling": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "When to purge sessions that do not meet the \"keep\" criteria. Note: when the automatic purge feature is enabled, this field must be set.scheduling blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "enabled"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetAutomaticPurge resources.\n",
        "properties": {
          "enabled": {
            "type": "boolean",
            "description": "Turn on/off the automatic-purge feature.\n"
          },
          "keepSessionsByCount": {
            "type": "boolean",
            "description": "Whether or not to keep the latest N sessions.\nNote: when the automatic purge feature is enabled, this field and/or the \"keep-sessions-by-date\" field must be set to 'true'.\n"
          },
          "keepSessionsByDays": {
            "type": "boolean",
            "description": "Whether or not to keep the sessions for D days.\nNote: when the automatic purge feature is enabled, this field and/or the \"keep-sessions-by-count\" field must be set to 'true'.\n"
          },
          "managementSetAutomaticPurgeId": {
            "type": "string"
          },
          "numberOfDaysToKeep": {
            "type": "number",
            "description": "When \"keep-sessions-by-days = true\" this sets the number of days to keep the sessions.\n"
          },
          "numberOfSessionsToKeep": {
            "type": "number",
            "description": "When \"keep-sessions-by-count = true\" this sets the number of newest sessions to preserve, by the sessions's publish date.\n"
          },
          "scheduling": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "When to purge sessions that do not meet the \"keep\" criteria. Note: when the automatic purge feature is enabled, this field must be set.scheduling blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetCpPasswordRequirements:ManagementSetCpPasswordRequirements": {
      "properties": {
        "managementSetCpPasswordRequirementsId": {
          "type": "string"
        },
        "minPasswordLength": {
          "type": "number",
          "description": "Minimum Check Point password length.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetCpPasswordRequirementsId",
        "uid"
      ],
      "inputProperties": {
        "managementSetCpPasswordRequirementsId": {
          "type": "string"
        },
        "minPasswordLength": {
          "type": "number",
          "description": "Minimum Check Point password length.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetCpPasswordRequirements resources.\n",
        "properties": {
          "managementSetCpPasswordRequirementsId": {
            "type": "string"
          },
          "minPasswordLength": {
            "type": "number",
            "description": "Minimum Check Point password length.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetDefaultAdministratorSettings:ManagementSetDefaultAdministratorSettings": {
      "properties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method for new administrator.\n"
        },
        "daysToIndicateExpirationInAdminView": {
          "type": "number",
          "description": "Number of days in advanced to show 'about to expire' indication in administrator view.\n"
        },
        "daysToNotifyExpirationToAdmin": {
          "type": "number",
          "description": "Number of days in advanced to notify administrator about expiration.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Expiration date for new administrator in YYYY-MM-DD format. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration date'.\n"
        },
        "expirationPeriod": {
          "type": "number",
          "description": "Expiration period for new administrator. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration period'.\n"
        },
        "expirationPeriodTimeUnits": {
          "type": "string",
          "description": "Expiration period time units for new administrator. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration period'.\n"
        },
        "expirationType": {
          "type": "string",
          "description": "Expiration type for new administrator.\n"
        },
        "indicateExpirationInAdminView": {
          "type": "boolean",
          "description": "Indicates whether to notify administrator about expiration.\n"
        },
        "managementSetDefaultAdministratorSettingsId": {
          "type": "string"
        },
        "notifyExpirationToAdmin": {
          "type": "boolean",
          "description": "Indicates whether to show 'about to expire' indication in administrator view.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetDefaultAdministratorSettingsId"
      ],
      "inputProperties": {
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method for new administrator.\n"
        },
        "daysToIndicateExpirationInAdminView": {
          "type": "number",
          "description": "Number of days in advanced to show 'about to expire' indication in administrator view.\n"
        },
        "daysToNotifyExpirationToAdmin": {
          "type": "number",
          "description": "Number of days in advanced to notify administrator about expiration.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Expiration date for new administrator in YYYY-MM-DD format. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration date'.\n"
        },
        "expirationPeriod": {
          "type": "number",
          "description": "Expiration period for new administrator. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration period'.\n"
        },
        "expirationPeriodTimeUnits": {
          "type": "string",
          "description": "Expiration period time units for new administrator. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration period'.\n"
        },
        "expirationType": {
          "type": "string",
          "description": "Expiration type for new administrator.\n"
        },
        "indicateExpirationInAdminView": {
          "type": "boolean",
          "description": "Indicates whether to notify administrator about expiration.\n"
        },
        "managementSetDefaultAdministratorSettingsId": {
          "type": "string"
        },
        "notifyExpirationToAdmin": {
          "type": "boolean",
          "description": "Indicates whether to show 'about to expire' indication in administrator view.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetDefaultAdministratorSettings resources.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string",
            "description": "Authentication method for new administrator.\n"
          },
          "daysToIndicateExpirationInAdminView": {
            "type": "number",
            "description": "Number of days in advanced to show 'about to expire' indication in administrator view.\n"
          },
          "daysToNotifyExpirationToAdmin": {
            "type": "number",
            "description": "Number of days in advanced to notify administrator about expiration.\n"
          },
          "expirationDate": {
            "type": "string",
            "description": "Expiration date for new administrator in YYYY-MM-DD format. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration date'.\n"
          },
          "expirationPeriod": {
            "type": "number",
            "description": "Expiration period for new administrator. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration period'.\n"
          },
          "expirationPeriodTimeUnits": {
            "type": "string",
            "description": "Expiration period time units for new administrator. <font color=\"red\">Required only when</font> 'expiration-type' is set to 'expiration period'.\n"
          },
          "expirationType": {
            "type": "string",
            "description": "Expiration type for new administrator.\n"
          },
          "indicateExpirationInAdminView": {
            "type": "boolean",
            "description": "Indicates whether to notify administrator about expiration.\n"
          },
          "managementSetDefaultAdministratorSettingsId": {
            "type": "string"
          },
          "notifyExpirationToAdmin": {
            "type": "boolean",
            "description": "Indicates whether to show 'about to expire' indication in administrator view.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetGatewayGlobalUse:ManagementSetGatewayGlobalUse": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether global use is enabled on the target.\n"
        },
        "managementSetGatewayGlobalUseId": {
          "type": "string"
        },
        "target": {
          "type": "string",
          "description": "On what target to execute this command. Target may be identified by its object name, or object unique identifier.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        }
      },
      "type": "object",
      "required": [
        "enabled",
        "managementSetGatewayGlobalUseId",
        "target",
        "uid"
      ],
      "inputProperties": {
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether global use is enabled on the target.\n"
        },
        "managementSetGatewayGlobalUseId": {
          "type": "string"
        },
        "target": {
          "type": "string",
          "description": "On what target to execute this command. Target may be identified by its object name, or object unique identifier.\n"
        }
      },
      "requiredInputs": [
        "enabled",
        "target"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetGatewayGlobalUse resources.\n",
        "properties": {
          "enabled": {
            "type": "boolean",
            "description": "Indicates whether global use is enabled on the target.\n"
          },
          "managementSetGatewayGlobalUseId": {
            "type": "string"
          },
          "target": {
            "type": "string",
            "description": "On what target to execute this command. Target may be identified by its object name, or object unique identifier.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetGlobalDomain:ManagementSetGlobalDomain": {
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSetGlobalDomainId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "servers": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Multi Domain Servers. When the field is provided, 'set-global-domain' command is executed asynchronously.servers blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. Note: The list of tags can not be modified in a singlecommand together with the domain servers. To modify tags, please use the separate 'set-global-domain' command, without providing the list of domain servers.tags blocks are documented below.\n"
        },
        "tasks": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of asynchronous task unique identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetGlobalDomainId",
        "name",
        "tasks"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSetGlobalDomainId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "servers": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Multi Domain Servers. When the field is provided, 'set-global-domain' command is executed asynchronously.servers blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. Note: The list of tags can not be modified in a singlecommand together with the domain servers. To modify tags, please use the separate 'set-global-domain' command, without providing the list of domain servers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetGlobalDomain resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSetGlobalDomainId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "servers": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Multi Domain Servers. When the field is provided, 'set-global-domain' command is executed asynchronously.servers blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. Note: The list of tags can not be modified in a singlecommand together with the domain servers. To modify tags, please use the separate 'set-global-domain' command, without providing the list of domain servers.tags blocks are documented below.\n"
          },
          "tasks": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of asynchronous task unique identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetHaState:ManagementSetHaState": {
      "description": "This command resource allows you to execute Check Point Set HA State.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSetHaState(\"example\", {newState: \"active\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSetHaState(\"example\", new_state=\"active\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSetHaState(\"example\", new()\n    {\n        NewState = \"active\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSetHaState(ctx, \"example\", &checkpoint.ManagementSetHaStateArgs{\n\t\t\tNewState: pulumi.String(\"active\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSetHaState;\nimport com.pulumi.checkpoint.ManagementSetHaStateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSetHaState(\"example\", ManagementSetHaStateArgs.builder()\n            .newState(\"active\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSetHaState\n    properties:\n      newState: active\n```\n<!--End PulumiCodeChooser -->\n\n## How To Use\n\nMake sure this command will be executed in the right execution order.\n",
      "properties": {
        "managementSetHaStateId": {
          "type": "string"
        },
        "newState": {
          "type": "string",
          "description": "Domain server new state.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetHaStateId",
        "newState",
        "taskId"
      ],
      "inputProperties": {
        "managementSetHaStateId": {
          "type": "string"
        },
        "newState": {
          "type": "string",
          "description": "Domain server new state.\n"
        }
      },
      "requiredInputs": [
        "newState"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetHaState resources.\n",
        "properties": {
          "managementSetHaStateId": {
            "type": "string"
          },
          "newState": {
            "type": "string",
            "description": "Domain server new state.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetHttpsAdvancedSettings:ManagementSetHttpsAdvancedSettings": {
      "properties": {
        "blockedCertificateTracking": {
          "type": "string",
          "description": "Controls whether to log and send a notification for dropped traffic.<br><ul style=\"list-style-type:square\"><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.\n"
        },
        "blockedCertificates": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSetHttpsAdvancedSettingsBlockedCertificate:ManagementSetHttpsAdvancedSettingsBlockedCertificate"
          },
          "description": "Collection of certificates objects identified by serial number.<br>Drop traffic from servers using the blocked certificate.blocked_certificates blocks are documented below.\n"
        },
        "bypassOnClientFailure": {
          "type": "boolean",
          "description": "Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during handshake)<br><ul style=\"list-style-type:square\"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true.\n"
        },
        "bypassOnFailure": {
          "type": "boolean",
          "description": "Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server authentication)<br><ul style=\"list-style-type:square\"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true.\n"
        },
        "bypassUnderLoad": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Bypass the HTTPS Inspection temporarily to improve connectivity during a heavy load on the Security Gateway. The HTTPS Inspection would resume as soon as the load decreases.bypass_under_load blocks are documented below.\n"
        },
        "bypassUpdateServices": {
          "type": "boolean",
          "description": "Configure the value \"true\" to bypass traffic to well-known software update services.<br>The default value is true.\n"
        },
        "certificatePinnedAppsAction": {
          "type": "string",
          "description": "Configure the value \"bypass\" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect connections initiated by certificate-pinned applications.<br>Configure the value \"detect\" to send logs for traffic from certificate-pinned applications approved by Check Point.<br>The default value is bypass.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "logSessions": {
          "type": "boolean",
          "description": "The value \"true\" configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true.\n"
        },
        "managementSetHttpsAdvancedSettingsId": {
          "type": "string"
        },
        "retrieveIntermediateCaCertificates": {
          "type": "boolean",
          "description": "Configure the value \"true\" to use the \"Certificate Authority Information Access\" extension to retrieve certificates that are missing from the certificate chain.<br>The default value is true.\n"
        },
        "serverCertificateValidationActions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it.server_certificate_validation_actions blocks are documented below.\n"
        },
        "siteCategorizationAllowMode": {
          "type": "string",
          "description": "Whether all requests should be allowed or blocked until categorization is complete.<br><ul style=\"list-style-type:square\"><li>Background - to allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is hold.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementSetHttpsAdvancedSettingsId",
        "uid"
      ],
      "inputProperties": {
        "blockedCertificateTracking": {
          "type": "string",
          "description": "Controls whether to log and send a notification for dropped traffic.<br><ul style=\"list-style-type:square\"><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.\n"
        },
        "blockedCertificates": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSetHttpsAdvancedSettingsBlockedCertificate:ManagementSetHttpsAdvancedSettingsBlockedCertificate"
          },
          "description": "Collection of certificates objects identified by serial number.<br>Drop traffic from servers using the blocked certificate.blocked_certificates blocks are documented below.\n"
        },
        "bypassOnClientFailure": {
          "type": "boolean",
          "description": "Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during handshake)<br><ul style=\"list-style-type:square\"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true.\n"
        },
        "bypassOnFailure": {
          "type": "boolean",
          "description": "Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server authentication)<br><ul style=\"list-style-type:square\"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true.\n"
        },
        "bypassUnderLoad": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Bypass the HTTPS Inspection temporarily to improve connectivity during a heavy load on the Security Gateway. The HTTPS Inspection would resume as soon as the load decreases.bypass_under_load blocks are documented below.\n"
        },
        "bypassUpdateServices": {
          "type": "boolean",
          "description": "Configure the value \"true\" to bypass traffic to well-known software update services.<br>The default value is true.\n"
        },
        "certificatePinnedAppsAction": {
          "type": "string",
          "description": "Configure the value \"bypass\" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect connections initiated by certificate-pinned applications.<br>Configure the value \"detect\" to send logs for traffic from certificate-pinned applications approved by Check Point.<br>The default value is bypass.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "logSessions": {
          "type": "boolean",
          "description": "The value \"true\" configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true.\n"
        },
        "managementSetHttpsAdvancedSettingsId": {
          "type": "string"
        },
        "retrieveIntermediateCaCertificates": {
          "type": "boolean",
          "description": "Configure the value \"true\" to use the \"Certificate Authority Information Access\" extension to retrieve certificates that are missing from the certificate chain.<br>The default value is true.\n"
        },
        "serverCertificateValidationActions": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it.server_certificate_validation_actions blocks are documented below.\n"
        },
        "siteCategorizationAllowMode": {
          "type": "string",
          "description": "Whether all requests should be allowed or blocked until categorization is complete.<br><ul style=\"list-style-type:square\"><li>Background - to allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is hold.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetHttpsAdvancedSettings resources.\n",
        "properties": {
          "blockedCertificateTracking": {
            "type": "string",
            "description": "Controls whether to log and send a notification for dropped traffic.<br><ul style=\"list-style-type:square\"><li>None - Does not record the event.</li><li>Log - Records the event details in SmartView.</li><li>Alert - Logs the event and executes a command.</li><li>Mail - Sends an email to the administrator.</li><li>SNMP Trap - Sends an SNMP alert to the SNMP GU.</li><li>User Defined Alert - Sends customized alerts.</li></ul>.\n"
          },
          "blockedCertificates": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementSetHttpsAdvancedSettingsBlockedCertificate:ManagementSetHttpsAdvancedSettingsBlockedCertificate"
            },
            "description": "Collection of certificates objects identified by serial number.<br>Drop traffic from servers using the blocked certificate.blocked_certificates blocks are documented below.\n"
          },
          "bypassOnClientFailure": {
            "type": "boolean",
            "description": "Whether all requests should be bypassed or blocked-in case of client errors (Client closes the connection due to authentication issues during handshake)<br><ul style=\"list-style-type:square\"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true.\n"
          },
          "bypassOnFailure": {
            "type": "boolean",
            "description": "Whether all requests should be bypassed or blocked-in case of server errors (for example validation error during GW-Server authentication)<br><ul style=\"list-style-type:square\"><li>true - Fail-open (bypass all requests).</li><li>false - Fail-close (block all requests.</li></ul><br>The default value is true.\n"
          },
          "bypassUnderLoad": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Bypass the HTTPS Inspection temporarily to improve connectivity during a heavy load on the Security Gateway. The HTTPS Inspection would resume as soon as the load decreases.bypass_under_load blocks are documented below.\n"
          },
          "bypassUpdateServices": {
            "type": "boolean",
            "description": "Configure the value \"true\" to bypass traffic to well-known software update services.<br>The default value is true.\n"
          },
          "certificatePinnedAppsAction": {
            "type": "string",
            "description": "Configure the value \"bypass\" to bypass traffic from certificate-pinned applications approved by Check Point.<br>HTTPS Inspection cannot inspect connections initiated by certificate-pinned applications.<br>Configure the value \"detect\" to send logs for traffic from certificate-pinned applications approved by Check Point.<br>The default value is bypass.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "logSessions": {
            "type": "boolean",
            "description": "The value \"true\" configures the Security Gateway to send HTTPS Inspection session logs.<br>The default value is true.\n"
          },
          "managementSetHttpsAdvancedSettingsId": {
            "type": "string"
          },
          "retrieveIntermediateCaCertificates": {
            "type": "boolean",
            "description": "Configure the value \"true\" to use the \"Certificate Authority Information Access\" extension to retrieve certificates that are missing from the certificate chain.<br>The default value is true.\n"
          },
          "serverCertificateValidationActions": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "When a Security Gateway receives an untrusted certificate from a website server, define when to drop the connection and how to track it.server_certificate_validation_actions blocks are documented below.\n"
          },
          "siteCategorizationAllowMode": {
            "type": "string",
            "description": "Whether all requests should be allowed or blocked until categorization is complete.<br><ul style=\"list-style-type:square\"><li>Background - to allow requests until categorization is complete.</li><li>Hold- to block requests until categorization is complete.</li></ul><br>The default value is hold.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetIdpDefaultAssignment:ManagementSetIdpDefaultAssignment": {
      "properties": {
        "identityProvider": {
          "type": "string",
          "description": "Represents the Identity Provider to be used for Login by this assignment identified by the name or UID, to cancel existing assignment should set to 'none'.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSetIdpDefaultAssignmentId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "identityProvider",
        "managementSetIdpDefaultAssignmentId",
        "taskId"
      ],
      "inputProperties": {
        "identityProvider": {
          "type": "string",
          "description": "Represents the Identity Provider to be used for Login by this assignment identified by the name or UID, to cancel existing assignment should set to 'none'.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSetIdpDefaultAssignmentId": {
          "type": "string"
        }
      },
      "requiredInputs": [
        "identityProvider"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetIdpDefaultAssignment resources.\n",
        "properties": {
          "identityProvider": {
            "type": "string",
            "description": "Represents the Identity Provider to be used for Login by this assignment identified by the name or UID, to cancel existing assignment should set to 'none'.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSetIdpDefaultAssignmentId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetIdpToDomainAssignment:ManagementSetIdpToDomainAssignment": {
      "properties": {
        "assignedDomain": {
          "type": "string",
          "description": "Represents the Domain assigned by 'idp-to-domain-assignment', need to be domain name or UID.\n"
        },
        "identityProvider": {
          "type": "string",
          "description": "Represents the Identity Provider to be used for Login by this assignment. Must be set when \"using-default\" was set to be false.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSetIdpToDomainAssignmentId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        },
        "usingDefault": {
          "type": "boolean",
          "description": "Is this assignment override by 'idp-default-assignment'.\n"
        }
      },
      "type": "object",
      "required": [
        "assignedDomain",
        "managementSetIdpToDomainAssignmentId",
        "taskId"
      ],
      "inputProperties": {
        "assignedDomain": {
          "type": "string",
          "description": "Represents the Domain assigned by 'idp-to-domain-assignment', need to be domain name or UID.\n"
        },
        "identityProvider": {
          "type": "string",
          "description": "Represents the Identity Provider to be used for Login by this assignment. Must be set when \"using-default\" was set to be false.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSetIdpToDomainAssignmentId": {
          "type": "string"
        },
        "usingDefault": {
          "type": "boolean",
          "description": "Is this assignment override by 'idp-default-assignment'.\n"
        }
      },
      "requiredInputs": [
        "assignedDomain"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetIdpToDomainAssignment resources.\n",
        "properties": {
          "assignedDomain": {
            "type": "string",
            "description": "Represents the Domain assigned by 'idp-to-domain-assignment', need to be domain name or UID.\n"
          },
          "identityProvider": {
            "type": "string",
            "description": "Represents the Identity Provider to be used for Login by this assignment. Must be set when \"using-default\" was set to be false.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSetIdpToDomainAssignmentId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          },
          "usingDefault": {
            "type": "boolean",
            "description": "Is this assignment override by 'idp-default-assignment'.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetIpsUpdateSchedule:ManagementSetIpsUpdateSchedule": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable IPS Update Schedule.\n"
        },
        "managementSetIpsUpdateScheduleId": {
          "type": "string"
        },
        "recurrence": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Days recurrence.recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetIpsUpdateScheduleId"
      ],
      "inputProperties": {
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable IPS Update Schedule.\n"
        },
        "managementSetIpsUpdateScheduleId": {
          "type": "string"
        },
        "recurrence": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Days recurrence.recurrence blocks are documented below.\n"
        },
        "time": {
          "type": "string",
          "description": "Time in format HH:mm.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetIpsUpdateSchedule resources.\n",
        "properties": {
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable IPS Update Schedule.\n"
          },
          "managementSetIpsUpdateScheduleId": {
            "type": "string"
          },
          "recurrence": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Days recurrence.recurrence blocks are documented below.\n"
          },
          "time": {
            "type": "string",
            "description": "Time in format HH:mm.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetLoginMessage:ManagementSetLoginMessage": {
      "properties": {
        "header": {
          "type": "string",
          "description": "Login message header.\n"
        },
        "managementSetLoginMessageId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Login message body.\n"
        },
        "showMessage": {
          "type": "boolean",
          "description": "Whether to show login message.\n"
        },
        "warning": {
          "type": "boolean",
          "description": "Add warning sign.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetLoginMessageId"
      ],
      "inputProperties": {
        "header": {
          "type": "string",
          "description": "Login message header.\n"
        },
        "managementSetLoginMessageId": {
          "type": "string"
        },
        "message": {
          "type": "string",
          "description": "Login message body.\n"
        },
        "showMessage": {
          "type": "boolean",
          "description": "Whether to show login message.\n"
        },
        "warning": {
          "type": "boolean",
          "description": "Add warning sign.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetLoginMessage resources.\n",
        "properties": {
          "header": {
            "type": "string",
            "description": "Login message header.\n"
          },
          "managementSetLoginMessageId": {
            "type": "string"
          },
          "message": {
            "type": "string",
            "description": "Login message body.\n"
          },
          "showMessage": {
            "type": "boolean",
            "description": "Whether to show login message.\n"
          },
          "warning": {
            "type": "boolean",
            "description": "Add warning sign.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetLoginRestrictions:ManagementSetLoginRestrictions": {
      "properties": {
        "displayAccessDeniedMessage": {
          "type": "boolean",
          "description": "Indicates whether to display informative message upon denying access. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        },
        "failedAuthenticationAttempts": {
          "type": "number",
          "description": "Number of failed authentication attempts before lockout administrator account. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        },
        "lockoutAdminAccount": {
          "type": "boolean",
          "description": "Indicates whether to lockout administrator's account after specified number of failed authentication attempts.\n"
        },
        "lockoutDuration": {
          "type": "number",
          "description": "Number of minutes of administrator account lockout. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        },
        "managementSetLoginRestrictionsId": {
          "type": "string"
        },
        "unlockAdminAccount": {
          "type": "boolean",
          "description": "Indicates whether to unlock administrator account after specified number of minutes. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetLoginRestrictionsId"
      ],
      "inputProperties": {
        "displayAccessDeniedMessage": {
          "type": "boolean",
          "description": "Indicates whether to display informative message upon denying access. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        },
        "failedAuthenticationAttempts": {
          "type": "number",
          "description": "Number of failed authentication attempts before lockout administrator account. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        },
        "lockoutAdminAccount": {
          "type": "boolean",
          "description": "Indicates whether to lockout administrator's account after specified number of failed authentication attempts.\n"
        },
        "lockoutDuration": {
          "type": "number",
          "description": "Number of minutes of administrator account lockout. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        },
        "managementSetLoginRestrictionsId": {
          "type": "string"
        },
        "unlockAdminAccount": {
          "type": "boolean",
          "description": "Indicates whether to unlock administrator account after specified number of minutes. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetLoginRestrictions resources.\n",
        "properties": {
          "displayAccessDeniedMessage": {
            "type": "boolean",
            "description": "Indicates whether to display informative message upon denying access. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
          },
          "failedAuthenticationAttempts": {
            "type": "number",
            "description": "Number of failed authentication attempts before lockout administrator account. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
          },
          "lockoutAdminAccount": {
            "type": "boolean",
            "description": "Indicates whether to lockout administrator's account after specified number of failed authentication attempts.\n"
          },
          "lockoutDuration": {
            "type": "number",
            "description": "Number of minutes of administrator account lockout. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
          },
          "managementSetLoginRestrictionsId": {
            "type": "string"
          },
          "unlockAdminAccount": {
            "type": "boolean",
            "description": "Indicates whether to unlock administrator account after specified number of minutes. <font color=\"red\">Required only when</font> lockout-admin-account is set to true.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetSmartConsoleIdleTimeout:ManagementSetSmartConsoleIdleTimeout": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to perform logout after being idle.\n"
        },
        "managementSetSmartConsoleIdleTimeoutId": {
          "type": "string"
        },
        "timeoutDuration": {
          "type": "number",
          "description": "Number of minutes that the SmartConsole will automatically logout after being idle.<br>Updating the interval will take effect only on the next login.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetSmartConsoleIdleTimeoutId"
      ],
      "inputProperties": {
        "enabled": {
          "type": "boolean",
          "description": "Indicates whether to perform logout after being idle.\n"
        },
        "managementSetSmartConsoleIdleTimeoutId": {
          "type": "string"
        },
        "timeoutDuration": {
          "type": "number",
          "description": "Number of minutes that the SmartConsole will automatically logout after being idle.<br>Updating the interval will take effect only on the next login.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetSmartConsoleIdleTimeout resources.\n",
        "properties": {
          "enabled": {
            "type": "boolean",
            "description": "Indicates whether to perform logout after being idle.\n"
          },
          "managementSetSmartConsoleIdleTimeoutId": {
            "type": "string"
          },
          "timeoutDuration": {
            "type": "number",
            "description": "Number of minutes that the SmartConsole will automatically logout after being idle.<br>Updating the interval will take effect only on the next login.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetSyncWithUserCenter:ManagementSetSyncWithUserCenter": {
      "properties": {
        "enabled": {
          "type": "boolean",
          "description": "Synchronize information once a day.<br>Warning: Synchronizing with the Check Point UserCenter requires a valid licence.\n"
        },
        "managementSetSyncWithUserCenterId": {
          "type": "string"
        }
      },
      "type": "object",
      "required": [
        "managementSetSyncWithUserCenterId"
      ],
      "inputProperties": {
        "enabled": {
          "type": "boolean",
          "description": "Synchronize information once a day.<br>Warning: Synchronizing with the Check Point UserCenter requires a valid licence.\n"
        },
        "managementSetSyncWithUserCenterId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetSyncWithUserCenter resources.\n",
        "properties": {
          "enabled": {
            "type": "boolean",
            "description": "Synchronize information once a day.<br>Warning: Synchronizing with the Check Point UserCenter requires a valid licence.\n"
          },
          "managementSetSyncWithUserCenterId": {
            "type": "string"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetThreatProtection:ManagementSetThreatProtection": {
      "properties": {
        "comments": {
          "type": "string",
          "description": "Protection comments.\n"
        },
        "followUp": {
          "type": "boolean",
          "description": "Tag the protection with pre-defined follow-up flag.\n"
        },
        "managementSetThreatProtectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSetThreatProtectionOverride:ManagementSetThreatProtectionOverride"
          },
          "description": "Overrides per profile for this protection<br> Note: Remove override for Core protections removes only the actions override. Remove override for Threat Cloud protections removes the action, track and packet captures.overrides blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetThreatProtectionId",
        "name"
      ],
      "inputProperties": {
        "comments": {
          "type": "string",
          "description": "Protection comments.\n"
        },
        "followUp": {
          "type": "boolean",
          "description": "Tag the protection with pre-defined follow-up flag.\n"
        },
        "managementSetThreatProtectionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSetThreatProtectionOverride:ManagementSetThreatProtectionOverride"
          },
          "description": "Overrides per profile for this protection<br> Note: Remove override for Core protections removes only the actions override. Remove override for Threat Cloud protections removes the action, track and packet captures.overrides blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetThreatProtection resources.\n",
        "properties": {
          "comments": {
            "type": "string",
            "description": "Protection comments.\n"
          },
          "followUp": {
            "type": "boolean",
            "description": "Tag the protection with pre-defined follow-up flag.\n"
          },
          "managementSetThreatProtectionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "overrides": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementSetThreatProtectionOverride:ManagementSetThreatProtectionOverride"
            },
            "description": "Overrides per profile for this protection<br> Note: Remove override for Core protections removes only the actions override. Remove override for Threat Cloud protections removes the action, track and packet captures.overrides blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSetTrust:ManagementSetTrust": {
      "properties": {
        "ipv4Address": {
          "type": "string",
          "description": "IP address of the object, for establishing trust with dynamic gateways.\n"
        },
        "managementSetTrustId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Minimum Check Point password length.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "Shared password to establish SIC between the Security Management and the Security Gateway.\n"
        },
        "trustMethod": {
          "type": "string",
          "description": "Establish the trust communication method.\n"
        },
        "trustSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSetTrustTrustSettings:ManagementSetTrustTrustSettings",
          "description": "Settings for the trusted communication establishment. trust settings blocks are documented below.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSetTrustId",
        "name"
      ],
      "inputProperties": {
        "ipv4Address": {
          "type": "string",
          "description": "IP address of the object, for establishing trust with dynamic gateways.\n"
        },
        "managementSetTrustId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Minimum Check Point password length.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "Shared password to establish SIC between the Security Management and the Security Gateway.\n"
        },
        "trustMethod": {
          "type": "string",
          "description": "Establish the trust communication method.\n"
        },
        "trustSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSetTrustTrustSettings:ManagementSetTrustTrustSettings",
          "description": "Settings for the trusted communication establishment. trust settings blocks are documented below.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSetTrust resources.\n",
        "properties": {
          "ipv4Address": {
            "type": "string",
            "description": "IP address of the object, for establishing trust with dynamic gateways.\n"
          },
          "managementSetTrustId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Minimum Check Point password length.\n"
          },
          "oneTimePassword": {
            "type": "string",
            "description": "Shared password to establish SIC between the Security Management and the Security Gateway.\n"
          },
          "trustMethod": {
            "type": "string",
            "description": "Establish the trust communication method.\n"
          },
          "trustSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSetTrustTrustSettings:ManagementSetTrustTrustSettings",
            "description": "Settings for the trusted communication establishment. trust settings blocks are documented below.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSimpleCluster:ManagementSimpleCluster": {
      "description": "This resource allows you to execute Check Point Simple Cluster.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSimpleCluster(\"example\", {\n    name: \"cluster1\",\n    color: \"yellow\",\n    version: \"R80.30\",\n    osName: \"Gaia\",\n    clusterMode: \"cluster-xl-ha\",\n    firewall: true,\n    ipv4Address: \"17.23.5.1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSimpleCluster(\"example\",\n    name=\"cluster1\",\n    color=\"yellow\",\n    version=\"R80.30\",\n    os_name=\"Gaia\",\n    cluster_mode=\"cluster-xl-ha\",\n    firewall=True,\n    ipv4_address=\"17.23.5.1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSimpleCluster(\"example\", new()\n    {\n        Name = \"cluster1\",\n        Color = \"yellow\",\n        Version = \"R80.30\",\n        OsName = \"Gaia\",\n        ClusterMode = \"cluster-xl-ha\",\n        Firewall = true,\n        Ipv4Address = \"17.23.5.1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSimpleCluster(ctx, \"example\", &checkpoint.ManagementSimpleClusterArgs{\n\t\t\tName:        pulumi.String(\"cluster1\"),\n\t\t\tColor:       pulumi.String(\"yellow\"),\n\t\t\tVersion:     pulumi.String(\"R80.30\"),\n\t\t\tOsName:      pulumi.String(\"Gaia\"),\n\t\t\tClusterMode: pulumi.String(\"cluster-xl-ha\"),\n\t\t\tFirewall:    pulumi.Bool(true),\n\t\t\tIpv4Address: pulumi.String(\"17.23.5.1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSimpleCluster;\nimport com.pulumi.checkpoint.ManagementSimpleClusterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSimpleCluster(\"example\", ManagementSimpleClusterArgs.builder()\n            .name(\"cluster1\")\n            .color(\"yellow\")\n            .version(\"R80.30\")\n            .osName(\"Gaia\")\n            .clusterMode(\"cluster-xl-ha\")\n            .firewall(true)\n            .ipv4Address(\"17.23.5.1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSimpleCluster\n    properties:\n      name: cluster1\n      color: yellow\n      version: R80.30\n      osName: Gaia\n      clusterMode: cluster-xl-ha\n      firewall: true\n      ipv4Address: 17.23.5.1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "advancedSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterAdvancedSettings:ManagementSimpleClusterAdvancedSettings",
          "description": "N/Aadvanced_settings blocks are documented below.\n"
        },
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade enabled.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade enabled.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade enabled.\n"
        },
        "clusterMode": {
          "type": "string",
          "description": "Cluster mode.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade enabled.\n"
        },
        "dataAwareness": {
          "type": "boolean",
          "description": "Data Awareness blade enabled."
        },
        "dynamicIp": {
          "type": "boolean",
          "description": "Dynamic IP address."
        },
        "enableHttpsInspection": {
          "type": "boolean",
          "description": "Enable HTTPS Inspection after defining an outbound inspection certificate. <br>To define the outbound certificate use outbound inspection certificate API.\n"
        },
        "fetchPolicies": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Security management server(s) to fetch the policy from.fetch_policy blocks are documented below.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Firewall blade enabled.\n"
        },
        "firewallSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Afirewall_settings blocks are documented below.\n"
        },
        "geoMode": {
          "type": "boolean",
          "description": "Cluster High Availability Geo mode.<br>This setting applies only to a cluster deployed in a cloud. Available when the cluster mode equals \"cluster-xl-ha\".\n"
        },
        "hardware": {
          "type": "string",
          "description": "Cluster platform hardware.\n"
        },
        "hitCount": {
          "type": "boolean",
          "description": "Hit count tracks the number of connections each rule matches.\n"
        },
        "httpsInspection": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspection:ManagementSimpleClusterHttpsInspection",
          "description": "HTTPS inspection.https_inspection blocks are documented below.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity awareness blade enabled.\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettings:ManagementSimpleClusterIdentityAwarenessSettings",
          "description": "Gateway Identity Awareness settings.identity_awareness_settings blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterInterface:ManagementSimpleClusterInterface"
          },
          "description": "Cluster interfaces.interfaces blocks are documented below.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "Intrusion Prevention System blade enabled.\n"
        },
        "ipsSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIpsSettings:ManagementSimpleClusterIpsSettings",
          "description": "Cluster IPS settings.<span pulumi-lang-nodejs=\" ipsSettings \" pulumi-lang-dotnet=\" IpsSettings \" pulumi-lang-go=\" ipsSettings \" pulumi-lang-python=\" ips_settings \" pulumi-lang-yaml=\" ipsSettings \" pulumi-lang-java=\" ipsSettings \"> ips_settings </span>blocks are documented below.\n"
        },
        "ipsUpdatePolicy": {
          "type": "string",
          "description": "Specifies whether the IPS will be downloaded from the Management or directly to the Gateway.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementSimpleClusterId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterMember:ManagementSimpleClusterMember"
          },
          "description": "Cluster members list. Only new cluster member can be added. Adding existing gateway is not supported.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "natHideInternalInterfaces": {
          "type": "boolean",
          "description": "Hide internal networks behind the Gateway's external IP.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.nat_settings blocks are documented below.\n"
        },
        "osName": {
          "type": "string",
          "description": "Cluster platform operating system.\n"
        },
        "platformPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettings:ManagementSimpleClusterPlatformPortalSettings",
          "description": "Platform portal settings.platform_portal_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Proxy Server for Gateway.proxy_settings blocks are documented below.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "QoS.\n"
        },
        "saveLogsLocally": {
          "type": "boolean",
          "description": "Save logs locally."
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send alerts to.send_alerts_to_server blocks are documented below.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Backup server(s) to send logs to.send_logs_to_backup_server blocks are documented below.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send logs to.send_logs_to_server blocks are documented below.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Secure Internal Communication name."
        },
        "sicState": {
          "type": "string",
          "description": "Secure Internal Communication state."
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade enabled.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade enabled.\n"
        },
        "usercheckPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettings:ManagementSimpleClusterUsercheckPortalSettings",
          "description": "UserCheck portal settings.usercheck_portal_settings blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Cluster platform version.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade enabled.\n"
        },
        "vpnSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Gateway VPN settings.vpn_settings blocks are documented below.\n"
        },
        "zeroPhishing": {
          "type": "boolean",
          "description": "Zero Phishing blade enabled.\n"
        },
        "zeroPhishingFqdn": {
          "type": "string",
          "description": "Zero Phishing gateway FQDN.\n"
        }
      },
      "type": "object",
      "required": [
        "dynamicIp",
        "managementSimpleClusterId",
        "name",
        "sicName",
        "sicState"
      ],
      "inputProperties": {
        "advancedSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterAdvancedSettings:ManagementSimpleClusterAdvancedSettings",
          "description": "N/Aadvanced_settings blocks are documented below.\n"
        },
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade enabled.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade enabled.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade enabled.\n"
        },
        "clusterMode": {
          "type": "string",
          "description": "Cluster mode.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade enabled.\n"
        },
        "dataAwareness": {
          "type": "boolean",
          "description": "Data Awareness blade enabled."
        },
        "enableHttpsInspection": {
          "type": "boolean",
          "description": "Enable HTTPS Inspection after defining an outbound inspection certificate. <br>To define the outbound certificate use outbound inspection certificate API.\n"
        },
        "fetchPolicies": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Security management server(s) to fetch the policy from.fetch_policy blocks are documented below.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Firewall blade enabled.\n"
        },
        "firewallSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Afirewall_settings blocks are documented below.\n"
        },
        "geoMode": {
          "type": "boolean",
          "description": "Cluster High Availability Geo mode.<br>This setting applies only to a cluster deployed in a cloud. Available when the cluster mode equals \"cluster-xl-ha\".\n"
        },
        "hardware": {
          "type": "string",
          "description": "Cluster platform hardware.\n"
        },
        "hitCount": {
          "type": "boolean",
          "description": "Hit count tracks the number of connections each rule matches.\n"
        },
        "httpsInspection": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspection:ManagementSimpleClusterHttpsInspection",
          "description": "HTTPS inspection.https_inspection blocks are documented below.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity awareness blade enabled.\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettings:ManagementSimpleClusterIdentityAwarenessSettings",
          "description": "Gateway Identity Awareness settings.identity_awareness_settings blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterInterface:ManagementSimpleClusterInterface"
          },
          "description": "Cluster interfaces.interfaces blocks are documented below.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "Intrusion Prevention System blade enabled.\n"
        },
        "ipsSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIpsSettings:ManagementSimpleClusterIpsSettings",
          "description": "Cluster IPS settings.<span pulumi-lang-nodejs=\" ipsSettings \" pulumi-lang-dotnet=\" IpsSettings \" pulumi-lang-go=\" ipsSettings \" pulumi-lang-python=\" ips_settings \" pulumi-lang-yaml=\" ipsSettings \" pulumi-lang-java=\" ipsSettings \"> ips_settings </span>blocks are documented below.\n"
        },
        "ipsUpdatePolicy": {
          "type": "string",
          "description": "Specifies whether the IPS will be downloaded from the Management or directly to the Gateway.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "managementSimpleClusterId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterMember:ManagementSimpleClusterMember"
          },
          "description": "Cluster members list. Only new cluster member can be added. Adding existing gateway is not supported.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "natHideInternalInterfaces": {
          "type": "boolean",
          "description": "Hide internal networks behind the Gateway's external IP.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.nat_settings blocks are documented below.\n"
        },
        "osName": {
          "type": "string",
          "description": "Cluster platform operating system.\n"
        },
        "platformPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettings:ManagementSimpleClusterPlatformPortalSettings",
          "description": "Platform portal settings.platform_portal_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Proxy Server for Gateway.proxy_settings blocks are documented below.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "QoS.\n"
        },
        "saveLogsLocally": {
          "type": "boolean",
          "description": "Save logs locally."
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send alerts to.send_alerts_to_server blocks are documented below.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Backup server(s) to send logs to.send_logs_to_backup_server blocks are documented below.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send logs to.send_logs_to_server blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade enabled.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade enabled.\n"
        },
        "usercheckPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettings:ManagementSimpleClusterUsercheckPortalSettings",
          "description": "UserCheck portal settings.usercheck_portal_settings blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Cluster platform version.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade enabled.\n"
        },
        "vpnSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Gateway VPN settings.vpn_settings blocks are documented below.\n"
        },
        "zeroPhishing": {
          "type": "boolean",
          "description": "Zero Phishing blade enabled.\n"
        },
        "zeroPhishingFqdn": {
          "type": "string",
          "description": "Zero Phishing gateway FQDN.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSimpleCluster resources.\n",
        "properties": {
          "advancedSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterAdvancedSettings:ManagementSimpleClusterAdvancedSettings",
            "description": "N/Aadvanced_settings blocks are documented below.\n"
          },
          "antiBot": {
            "type": "boolean",
            "description": "Anti-Bot blade enabled.\n"
          },
          "antiVirus": {
            "type": "boolean",
            "description": "Anti-Virus blade enabled.\n"
          },
          "applicationControl": {
            "type": "boolean",
            "description": "Application Control blade enabled.\n"
          },
          "clusterMode": {
            "type": "string",
            "description": "Cluster mode.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "contentAwareness": {
            "type": "boolean",
            "description": "Content Awareness blade enabled.\n"
          },
          "dataAwareness": {
            "type": "boolean",
            "description": "Data Awareness blade enabled."
          },
          "dynamicIp": {
            "type": "boolean",
            "description": "Dynamic IP address."
          },
          "enableHttpsInspection": {
            "type": "boolean",
            "description": "Enable HTTPS Inspection after defining an outbound inspection certificate. <br>To define the outbound certificate use outbound inspection certificate API.\n"
          },
          "fetchPolicies": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Security management server(s) to fetch the policy from.fetch_policy blocks are documented below.\n"
          },
          "firewall": {
            "type": "boolean",
            "description": "Firewall blade enabled.\n"
          },
          "firewallSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "N/Afirewall_settings blocks are documented below.\n"
          },
          "geoMode": {
            "type": "boolean",
            "description": "Cluster High Availability Geo mode.<br>This setting applies only to a cluster deployed in a cloud. Available when the cluster mode equals \"cluster-xl-ha\".\n"
          },
          "hardware": {
            "type": "string",
            "description": "Cluster platform hardware.\n"
          },
          "hitCount": {
            "type": "boolean",
            "description": "Hit count tracks the number of connections each rule matches.\n"
          },
          "httpsInspection": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterHttpsInspection:ManagementSimpleClusterHttpsInspection",
            "description": "HTTPS inspection.https_inspection blocks are documented below.\n"
          },
          "identityAwareness": {
            "type": "boolean",
            "description": "Identity awareness blade enabled.\n"
          },
          "identityAwarenessSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIdentityAwarenessSettings:ManagementSimpleClusterIdentityAwarenessSettings",
            "description": "Gateway Identity Awareness settings.identity_awareness_settings blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterInterface:ManagementSimpleClusterInterface"
            },
            "description": "Cluster interfaces.interfaces blocks are documented below.\n"
          },
          "ips": {
            "type": "boolean",
            "description": "Intrusion Prevention System blade enabled.\n"
          },
          "ipsSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterIpsSettings:ManagementSimpleClusterIpsSettings",
            "description": "Cluster IPS settings.<span pulumi-lang-nodejs=\" ipsSettings \" pulumi-lang-dotnet=\" IpsSettings \" pulumi-lang-go=\" ipsSettings \" pulumi-lang-python=\" ips_settings \" pulumi-lang-yaml=\" ipsSettings \" pulumi-lang-java=\" ipsSettings \"> ips_settings </span>blocks are documented below.\n"
          },
          "ipsUpdatePolicy": {
            "type": "string",
            "description": "Specifies whether the IPS will be downloaded from the Management or directly to the Gateway.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "managementSimpleClusterId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterMember:ManagementSimpleClusterMember"
            },
            "description": "Cluster members list. Only new cluster member can be added. Adding existing gateway is not supported.members blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "natHideInternalInterfaces": {
            "type": "boolean",
            "description": "Hide internal networks behind the Gateway's external IP.\n"
          },
          "natSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "NAT settings.nat_settings blocks are documented below.\n"
          },
          "osName": {
            "type": "string",
            "description": "Cluster platform operating system.\n"
          },
          "platformPortalSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterPlatformPortalSettings:ManagementSimpleClusterPlatformPortalSettings",
            "description": "Platform portal settings.platform_portal_settings blocks are documented below.\n"
          },
          "proxySettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Proxy Server for Gateway.proxy_settings blocks are documented below.\n"
          },
          "qos": {
            "type": "boolean",
            "description": "QoS.\n"
          },
          "saveLogsLocally": {
            "type": "boolean",
            "description": "Save logs locally."
          },
          "sendAlertsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Server(s) to send alerts to.send_alerts_to_server blocks are documented below.\n"
          },
          "sendLogsToBackupServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Backup server(s) to send logs to.send_logs_to_backup_server blocks are documented below.\n"
          },
          "sendLogsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Server(s) to send logs to.send_logs_to_server blocks are documented below.\n"
          },
          "sicName": {
            "type": "string",
            "description": "Secure Internal Communication name."
          },
          "sicState": {
            "type": "string",
            "description": "Secure Internal Communication state."
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "threatEmulation": {
            "type": "boolean",
            "description": "Threat Emulation blade enabled.\n"
          },
          "urlFiltering": {
            "type": "boolean",
            "description": "URL Filtering blade enabled.\n"
          },
          "usercheckPortalSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleClusterUsercheckPortalSettings:ManagementSimpleClusterUsercheckPortalSettings",
            "description": "UserCheck portal settings.usercheck_portal_settings blocks are documented below.\n"
          },
          "version": {
            "type": "string",
            "description": "Cluster platform version.\n"
          },
          "vpn": {
            "type": "boolean",
            "description": "VPN blade enabled.\n"
          },
          "vpnSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Gateway VPN settings.vpn_settings blocks are documented below.\n"
          },
          "zeroPhishing": {
            "type": "boolean",
            "description": "Zero Phishing blade enabled.\n"
          },
          "zeroPhishingFqdn": {
            "type": "string",
            "description": "Zero Phishing gateway FQDN.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSimpleGateway:ManagementSimpleGateway": {
      "description": "This resource allows you to execute Check Point Simple Gateway.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSimpleGateway(\"example\", {\n    name: \"gw1\",\n    ipv4Address: \"192.0.2.1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSimpleGateway(\"example\",\n    name=\"gw1\",\n    ipv4_address=\"192.0.2.1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSimpleGateway(\"example\", new()\n    {\n        Name = \"gw1\",\n        Ipv4Address = \"192.0.2.1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSimpleGateway(ctx, \"example\", &checkpoint.ManagementSimpleGatewayArgs{\n\t\t\tName:        pulumi.String(\"gw1\"),\n\t\t\tIpv4Address: pulumi.String(\"192.0.2.1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSimpleGateway;\nimport com.pulumi.checkpoint.ManagementSimpleGatewayArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSimpleGateway(\"example\", ManagementSimpleGatewayArgs.builder()\n            .name(\"gw1\")\n            .ipv4Address(\"192.0.2.1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSimpleGateway\n    properties:\n      name: gw1\n      ipv4Address: 192.0.2.1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "advancedSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayAdvancedSettings:ManagementSimpleGatewayAdvancedSettings",
          "description": "N/Aadvanced_settings blocks are documented below.\n"
        },
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade enabled.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade enabled.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade enabled.\n"
        },
        "applicationControlAndUrlFilteringSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayApplicationControlAndUrlFilteringSettings:ManagementSimpleGatewayApplicationControlAndUrlFilteringSettings",
          "description": "Gateway Application Control and URL filtering settings.application_control_and_url_filtering_settings blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade enabled.\n"
        },
        "dynamicIp": {
          "type": "boolean",
          "description": "Dynamic IP address."
        },
        "enableHttpsInspection": {
          "type": "boolean",
          "description": "Enable HTTPS Inspection after defining an outbound inspection certificate. <br>To define the outbound certificate use outbound inspection certificate API.\n"
        },
        "fetchPolicies": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Security management server(s) to fetch the policy from.fetch_policy blocks are documented below.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Firewall blade enabled.\n"
        },
        "firewallSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Afirewall_settings blocks are documented below.\n"
        },
        "hardware": {
          "type": "string",
          "description": "Gateway platform hardware type."
        },
        "hitCount": {
          "type": "boolean",
          "description": "Hit count tracks the number of connections each rule matches.\n"
        },
        "httpsInspection": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspection:ManagementSimpleGatewayHttpsInspection",
          "description": "HTTPS inspection.https_inspection blocks are documented below.\n"
        },
        "icapServer": {
          "type": "boolean",
          "description": "ICAP Server enabled.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity awareness blade enabled.\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettings:ManagementSimpleGatewayIdentityAwarenessSettings",
          "description": "Gateway Identity Awareness settings.identity_awareness_settings blocks are documented below.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayInterface:ManagementSimpleGatewayInterface"
          },
          "description": "Network interfaces.interfaces blocks are documented below.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "Intrusion Prevention System blade enabled.\n"
        },
        "ipsSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIpsSettings:ManagementSimpleGatewayIpsSettings",
          "description": "Gateway IPS settings.ips_settings blocks are documented below.\n"
        },
        "ipsUpdatePolicy": {
          "type": "string",
          "description": "Specifies whether the IPS will be downloaded from the Management or directly to the Gateway.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "logsSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Logs settings that apply to Quantum Security Gateways that run Gaia OS.logs_settings blocks are documented below.\n"
        },
        "managementSimpleGatewayId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "natHideInternalInterfaces": {
          "type": "boolean",
          "description": "Hide internal networks behind the Gateway's external IP.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.nat_settings blocks are documented below.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "N/A\n",
          "secret": true
        },
        "osName": {
          "type": "string",
          "description": "Gateway platform operating system.\n"
        },
        "platformPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettings:ManagementSimpleGatewayPlatformPortalSettings",
          "description": "Platform portal settings.platform_portal_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Proxy Server for Gateway.proxy_settings blocks are documented below.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "QoS.\n"
        },
        "saveLogsLocally": {
          "type": "boolean",
          "description": "Save logs locally on the gateway.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send alerts to.send_alerts_to_server blocks are documented below.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Backup server(s) to send logs to.send_logs_to_backup_server blocks are documented below.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send logs to.send_logs_to_server blocks are documented below.\n"
        },
        "sicName": {
          "type": "string",
          "description": "Secure Internal Communication name."
        },
        "sicState": {
          "type": "string",
          "description": "Secure Internal Communication state."
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade enabled.\n"
        },
        "threatExtraction": {
          "type": "boolean",
          "description": "Threat Extraction blade enabled.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade enabled.\n"
        },
        "usercheckPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettings:ManagementSimpleGatewayUsercheckPortalSettings",
          "description": "UserCheck portal settings.usercheck_portal_settings blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Gateway platform version.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade enabled.\n"
        },
        "vpnSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Gateway VPN settings.vpn_settings blocks are documented below.\n"
        },
        "zeroPhishing": {
          "type": "boolean",
          "description": "Zero Phishing blade enabled.\n"
        },
        "zeroPhishingFqdn": {
          "type": "string",
          "description": "Zero Phishing gateway FQDN.\n"
        }
      },
      "type": "object",
      "required": [
        "dynamicIp",
        "hardware",
        "managementSimpleGatewayId",
        "name",
        "sicName",
        "sicState"
      ],
      "inputProperties": {
        "advancedSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayAdvancedSettings:ManagementSimpleGatewayAdvancedSettings",
          "description": "N/Aadvanced_settings blocks are documented below.\n"
        },
        "antiBot": {
          "type": "boolean",
          "description": "Anti-Bot blade enabled.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Anti-Virus blade enabled.\n"
        },
        "applicationControl": {
          "type": "boolean",
          "description": "Application Control blade enabled.\n"
        },
        "applicationControlAndUrlFilteringSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayApplicationControlAndUrlFilteringSettings:ManagementSimpleGatewayApplicationControlAndUrlFilteringSettings",
          "description": "Gateway Application Control and URL filtering settings.application_control_and_url_filtering_settings blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "contentAwareness": {
          "type": "boolean",
          "description": "Content Awareness blade enabled.\n"
        },
        "enableHttpsInspection": {
          "type": "boolean",
          "description": "Enable HTTPS Inspection after defining an outbound inspection certificate. <br>To define the outbound certificate use outbound inspection certificate API.\n"
        },
        "fetchPolicies": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Security management server(s) to fetch the policy from.fetch_policy blocks are documented below.\n"
        },
        "firewall": {
          "type": "boolean",
          "description": "Firewall blade enabled.\n"
        },
        "firewallSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "N/Afirewall_settings blocks are documented below.\n"
        },
        "hitCount": {
          "type": "boolean",
          "description": "Hit count tracks the number of connections each rule matches.\n"
        },
        "httpsInspection": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspection:ManagementSimpleGatewayHttpsInspection",
          "description": "HTTPS inspection.https_inspection blocks are documented below.\n"
        },
        "icapServer": {
          "type": "boolean",
          "description": "ICAP Server enabled.\n"
        },
        "identityAwareness": {
          "type": "boolean",
          "description": "Identity awareness blade enabled.\n"
        },
        "identityAwarenessSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettings:ManagementSimpleGatewayIdentityAwarenessSettings",
          "description": "Gateway Identity Awareness settings.identity_awareness_settings blocks are documented below.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings."
        },
        "interfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayInterface:ManagementSimpleGatewayInterface"
          },
          "description": "Network interfaces.interfaces blocks are documented below.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "Intrusion Prevention System blade enabled.\n"
        },
        "ipsSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIpsSettings:ManagementSimpleGatewayIpsSettings",
          "description": "Gateway IPS settings.ips_settings blocks are documented below.\n"
        },
        "ipsUpdatePolicy": {
          "type": "string",
          "description": "Specifies whether the IPS will be downloaded from the Management or directly to the Gateway.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "logsSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Logs settings that apply to Quantum Security Gateways that run Gaia OS.logs_settings blocks are documented below.\n"
        },
        "managementSimpleGatewayId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "natHideInternalInterfaces": {
          "type": "boolean",
          "description": "Hide internal networks behind the Gateway's external IP.\n"
        },
        "natSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "NAT settings.nat_settings blocks are documented below.\n"
        },
        "oneTimePassword": {
          "type": "string",
          "description": "N/A\n",
          "secret": true
        },
        "osName": {
          "type": "string",
          "description": "Gateway platform operating system.\n"
        },
        "platformPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettings:ManagementSimpleGatewayPlatformPortalSettings",
          "description": "Platform portal settings.platform_portal_settings blocks are documented below.\n"
        },
        "proxySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Proxy Server for Gateway.proxy_settings blocks are documented below.\n"
        },
        "qos": {
          "type": "boolean",
          "description": "QoS.\n"
        },
        "saveLogsLocally": {
          "type": "boolean",
          "description": "Save logs locally on the gateway.\n"
        },
        "sendAlertsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send alerts to.send_alerts_to_server blocks are documented below.\n"
        },
        "sendLogsToBackupServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Backup server(s) to send logs to.send_logs_to_backup_server blocks are documented below.\n"
        },
        "sendLogsToServers": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Server(s) to send logs to.send_logs_to_server blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Threat Emulation blade enabled.\n"
        },
        "threatExtraction": {
          "type": "boolean",
          "description": "Threat Extraction blade enabled.\n"
        },
        "urlFiltering": {
          "type": "boolean",
          "description": "URL Filtering blade enabled.\n"
        },
        "usercheckPortalSettings": {
          "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettings:ManagementSimpleGatewayUsercheckPortalSettings",
          "description": "UserCheck portal settings.usercheck_portal_settings blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "Gateway platform version.\n"
        },
        "vpn": {
          "type": "boolean",
          "description": "VPN blade enabled.\n"
        },
        "vpnSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Gateway VPN settings.vpn_settings blocks are documented below.\n"
        },
        "zeroPhishing": {
          "type": "boolean",
          "description": "Zero Phishing blade enabled.\n"
        },
        "zeroPhishingFqdn": {
          "type": "string",
          "description": "Zero Phishing gateway FQDN.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSimpleGateway resources.\n",
        "properties": {
          "advancedSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayAdvancedSettings:ManagementSimpleGatewayAdvancedSettings",
            "description": "N/Aadvanced_settings blocks are documented below.\n"
          },
          "antiBot": {
            "type": "boolean",
            "description": "Anti-Bot blade enabled.\n"
          },
          "antiVirus": {
            "type": "boolean",
            "description": "Anti-Virus blade enabled.\n"
          },
          "applicationControl": {
            "type": "boolean",
            "description": "Application Control blade enabled.\n"
          },
          "applicationControlAndUrlFilteringSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayApplicationControlAndUrlFilteringSettings:ManagementSimpleGatewayApplicationControlAndUrlFilteringSettings",
            "description": "Gateway Application Control and URL filtering settings.application_control_and_url_filtering_settings blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "contentAwareness": {
            "type": "boolean",
            "description": "Content Awareness blade enabled.\n"
          },
          "dynamicIp": {
            "type": "boolean",
            "description": "Dynamic IP address."
          },
          "enableHttpsInspection": {
            "type": "boolean",
            "description": "Enable HTTPS Inspection after defining an outbound inspection certificate. <br>To define the outbound certificate use outbound inspection certificate API.\n"
          },
          "fetchPolicies": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Security management server(s) to fetch the policy from.fetch_policy blocks are documented below.\n"
          },
          "firewall": {
            "type": "boolean",
            "description": "Firewall blade enabled.\n"
          },
          "firewallSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "N/Afirewall_settings blocks are documented below.\n"
          },
          "hardware": {
            "type": "string",
            "description": "Gateway platform hardware type."
          },
          "hitCount": {
            "type": "boolean",
            "description": "Hit count tracks the number of connections each rule matches.\n"
          },
          "httpsInspection": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayHttpsInspection:ManagementSimpleGatewayHttpsInspection",
            "description": "HTTPS inspection.https_inspection blocks are documented below.\n"
          },
          "icapServer": {
            "type": "boolean",
            "description": "ICAP Server enabled.\n"
          },
          "identityAwareness": {
            "type": "boolean",
            "description": "Identity awareness blade enabled.\n"
          },
          "identityAwarenessSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIdentityAwarenessSettings:ManagementSimpleGatewayIdentityAwarenessSettings",
            "description": "Gateway Identity Awareness settings.identity_awareness_settings blocks are documented below.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings."
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayInterface:ManagementSimpleGatewayInterface"
            },
            "description": "Network interfaces.interfaces blocks are documented below.\n"
          },
          "ips": {
            "type": "boolean",
            "description": "Intrusion Prevention System blade enabled.\n"
          },
          "ipsSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayIpsSettings:ManagementSimpleGatewayIpsSettings",
            "description": "Gateway IPS settings.ips_settings blocks are documented below.\n"
          },
          "ipsUpdatePolicy": {
            "type": "string",
            "description": "Specifies whether the IPS will be downloaded from the Management or directly to the Gateway.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "logsSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Logs settings that apply to Quantum Security Gateways that run Gaia OS.logs_settings blocks are documented below.\n"
          },
          "managementSimpleGatewayId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "natHideInternalInterfaces": {
            "type": "boolean",
            "description": "Hide internal networks behind the Gateway's external IP.\n"
          },
          "natSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "NAT settings.nat_settings blocks are documented below.\n"
          },
          "oneTimePassword": {
            "type": "string",
            "description": "N/A\n",
            "secret": true
          },
          "osName": {
            "type": "string",
            "description": "Gateway platform operating system.\n"
          },
          "platformPortalSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayPlatformPortalSettings:ManagementSimpleGatewayPlatformPortalSettings",
            "description": "Platform portal settings.platform_portal_settings blocks are documented below.\n"
          },
          "proxySettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Proxy Server for Gateway.proxy_settings blocks are documented below.\n"
          },
          "qos": {
            "type": "boolean",
            "description": "QoS.\n"
          },
          "saveLogsLocally": {
            "type": "boolean",
            "description": "Save logs locally on the gateway.\n"
          },
          "sendAlertsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Server(s) to send alerts to.send_alerts_to_server blocks are documented below.\n"
          },
          "sendLogsToBackupServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Backup server(s) to send logs to.send_logs_to_backup_server blocks are documented below.\n"
          },
          "sendLogsToServers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Server(s) to send logs to.send_logs_to_server blocks are documented below.\n"
          },
          "sicName": {
            "type": "string",
            "description": "Secure Internal Communication name."
          },
          "sicState": {
            "type": "string",
            "description": "Secure Internal Communication state."
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "threatEmulation": {
            "type": "boolean",
            "description": "Threat Emulation blade enabled.\n"
          },
          "threatExtraction": {
            "type": "boolean",
            "description": "Threat Extraction blade enabled.\n"
          },
          "urlFiltering": {
            "type": "boolean",
            "description": "URL Filtering blade enabled.\n"
          },
          "usercheckPortalSettings": {
            "$ref": "#/types/checkpoint:index%2FManagementSimpleGatewayUsercheckPortalSettings:ManagementSimpleGatewayUsercheckPortalSettings",
            "description": "UserCheck portal settings.usercheck_portal_settings blocks are documented below.\n"
          },
          "version": {
            "type": "string",
            "description": "Gateway platform version.\n"
          },
          "vpn": {
            "type": "boolean",
            "description": "VPN blade enabled.\n"
          },
          "vpnSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Gateway VPN settings.vpn_settings blocks are documented below.\n"
          },
          "zeroPhishing": {
            "type": "boolean",
            "description": "Zero Phishing blade enabled.\n"
          },
          "zeroPhishingFqdn": {
            "type": "string",
            "description": "Zero Phishing gateway FQDN.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSmartTask:ManagementSmartTask": {
      "description": "This resource allows you to execute Check Point Smart Task.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst smartTask = new checkpoint.ManagementSmartTask(\"smart_task\", {\n    name: \"smt\",\n    trigger: \"Before Publish\",\n    description: \"my smart task\",\n    action: {\n        sendWebRequest: {\n            url: \"https://demo.example.com/policy-installation-reports\",\n            fingerprint: \"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\",\n            overrideProxy: true,\n            proxyUrl: \"https://demo.example.com/policy-installation-reports\",\n            timeOut: 200,\n            sharedSecret: \" secret\",\n        },\n    },\n    enabled: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsmart_task = checkpoint.ManagementSmartTask(\"smart_task\",\n    name=\"smt\",\n    trigger=\"Before Publish\",\n    description=\"my smart task\",\n    action={\n        \"send_web_request\": {\n            \"url\": \"https://demo.example.com/policy-installation-reports\",\n            \"fingerprint\": \"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\",\n            \"override_proxy\": True,\n            \"proxy_url\": \"https://demo.example.com/policy-installation-reports\",\n            \"time_out\": 200,\n            \"shared_secret\": \" secret\",\n        },\n    },\n    enabled=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var smartTask = new Checkpoint.ManagementSmartTask(\"smart_task\", new()\n    {\n        Name = \"smt\",\n        Trigger = \"Before Publish\",\n        Description = \"my smart task\",\n        Action = new Checkpoint.Inputs.ManagementSmartTaskActionArgs\n        {\n            SendWebRequest = new Checkpoint.Inputs.ManagementSmartTaskActionSendWebRequestArgs\n            {\n                Url = \"https://demo.example.com/policy-installation-reports\",\n                Fingerprint = \"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\",\n                OverrideProxy = true,\n                ProxyUrl = \"https://demo.example.com/policy-installation-reports\",\n                TimeOut = 200,\n                SharedSecret = \" secret\",\n            },\n        },\n        Enabled = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSmartTask(ctx, \"smart_task\", &checkpoint.ManagementSmartTaskArgs{\n\t\t\tName:        pulumi.String(\"smt\"),\n\t\t\tTrigger:     pulumi.String(\"Before Publish\"),\n\t\t\tDescription: pulumi.String(\"my smart task\"),\n\t\t\tAction: &checkpoint.ManagementSmartTaskActionArgs{\n\t\t\t\tSendWebRequest: &checkpoint.ManagementSmartTaskActionSendWebRequestArgs{\n\t\t\t\t\tUrl:           pulumi.String(\"https://demo.example.com/policy-installation-reports\"),\n\t\t\t\t\tFingerprint:   pulumi.String(\"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\"),\n\t\t\t\t\tOverrideProxy: pulumi.Bool(true),\n\t\t\t\t\tProxyUrl:      pulumi.String(\"https://demo.example.com/policy-installation-reports\"),\n\t\t\t\t\tTimeOut:       pulumi.Float64(200),\n\t\t\t\t\tSharedSecret:  pulumi.String(\" secret\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSmartTask;\nimport com.pulumi.checkpoint.ManagementSmartTaskArgs;\nimport com.pulumi.checkpoint.inputs.ManagementSmartTaskActionArgs;\nimport com.pulumi.checkpoint.inputs.ManagementSmartTaskActionSendWebRequestArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var smartTask = new ManagementSmartTask(\"smartTask\", ManagementSmartTaskArgs.builder()\n            .name(\"smt\")\n            .trigger(\"Before Publish\")\n            .description(\"my smart task\")\n            .action(ManagementSmartTaskActionArgs.builder()\n                .sendWebRequest(ManagementSmartTaskActionSendWebRequestArgs.builder()\n                    .url(\"https://demo.example.com/policy-installation-reports\")\n                    .fingerprint(\"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\")\n                    .overrideProxy(true)\n                    .proxyUrl(\"https://demo.example.com/policy-installation-reports\")\n                    .timeOut(200.0)\n                    .sharedSecret(\" secret\")\n                    .build())\n                .build())\n            .enabled(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  smartTask:\n    type: checkpoint:ManagementSmartTask\n    name: smart_task\n    properties:\n      name: smt\n      trigger: Before Publish\n      description: my smart task\n      action:\n        sendWebRequest:\n          url: https://demo.example.com/policy-installation-reports\n          fingerprint: 8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\n          overrideProxy: true\n          proxyUrl: https://demo.example.com/policy-installation-reports\n          timeOut: 200\n          sharedSecret: ' secret'\n      enabled: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskAction:ManagementSmartTaskAction",
          "description": "The action to be run when the trigger is fired.action blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customData": {
          "type": "string",
          "description": "Per SmartTask custom data in JSON format.<br>When the trigger is fired, the trigger data is converted to JSON. The custom data is then concatenated to the trigger data JSON.\n"
        },
        "description": {
          "type": "string",
          "description": "Description of the SmartTask's functionality and options.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Whether the SmartTask is enabled and will run when triggered.\n"
        },
        "failOpen": {
          "type": "boolean",
          "description": "If the action fails to execute, whether to treat the execution failure as an error, or continue.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSmartTaskId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "trigger": {
          "type": "string",
          "description": "Trigger type associated with the SmartTask.\n"
        }
      },
      "type": "object",
      "required": [
        "managementSmartTaskId",
        "name"
      ],
      "inputProperties": {
        "action": {
          "$ref": "#/types/checkpoint:index%2FManagementSmartTaskAction:ManagementSmartTaskAction",
          "description": "The action to be run when the trigger is fired.action blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customData": {
          "type": "string",
          "description": "Per SmartTask custom data in JSON format.<br>When the trigger is fired, the trigger data is converted to JSON. The custom data is then concatenated to the trigger data JSON.\n"
        },
        "description": {
          "type": "string",
          "description": "Description of the SmartTask's functionality and options.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Whether the SmartTask is enabled and will run when triggered.\n"
        },
        "failOpen": {
          "type": "boolean",
          "description": "If the action fails to execute, whether to treat the execution failure as an error, or continue.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSmartTaskId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "trigger": {
          "type": "string",
          "description": "Trigger type associated with the SmartTask.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSmartTask resources.\n",
        "properties": {
          "action": {
            "$ref": "#/types/checkpoint:index%2FManagementSmartTaskAction:ManagementSmartTaskAction",
            "description": "The action to be run when the trigger is fired.action blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "customData": {
            "type": "string",
            "description": "Per SmartTask custom data in JSON format.<br>When the trigger is fired, the trigger data is converted to JSON. The custom data is then concatenated to the trigger data JSON.\n"
          },
          "description": {
            "type": "string",
            "description": "Description of the SmartTask's functionality and options.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Whether the SmartTask is enabled and will run when triggered.\n"
          },
          "failOpen": {
            "type": "boolean",
            "description": "If the action fails to execute, whether to treat the execution failure as an error, or continue.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSmartTaskId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "trigger": {
            "type": "string",
            "description": "Trigger type associated with the SmartTask.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSmtpServer:ManagementSmtpServer": {
      "description": "This resource allows you to execute Check Point Smtp Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSmtpServer(\"example\", {\n    name: \"SMTP1\",\n    server: \"smtp.example.com\",\n    port: 25,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSmtpServer(\"example\",\n    name=\"SMTP1\",\n    server=\"smtp.example.com\",\n    port=25)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSmtpServer(\"example\", new()\n    {\n        Name = \"SMTP1\",\n        Server = \"smtp.example.com\",\n        Port = 25,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSmtpServer(ctx, \"example\", &checkpoint.ManagementSmtpServerArgs{\n\t\t\tName:   pulumi.String(\"SMTP1\"),\n\t\t\tServer: pulumi.String(\"smtp.example.com\"),\n\t\t\tPort:   pulumi.Float64(25),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSmtpServer;\nimport com.pulumi.checkpoint.ManagementSmtpServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSmtpServer(\"example\", ManagementSmtpServerArgs.builder()\n            .name(\"SMTP1\")\n            .server(\"smtp.example.com\")\n            .port(25.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSmtpServer\n    properties:\n      name: SMTP1\n      server: smtp.example.com\n      port: 25\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "authentication": {
          "type": "boolean",
          "description": "Does the mail server requires authentication.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "encryption": {
          "type": "string",
          "description": "Encryption type.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSmtpServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "A password for the SMTP server.Required only if authentication is set to true.\n",
          "secret": true
        },
        "port": {
          "type": "number",
          "description": "The SMTP port to use.\n"
        },
        "server": {
          "type": "string",
          "description": "The SMTP server address.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "username": {
          "type": "string",
          "description": "A username for the SMTP server.Required only if authentication is set to true.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "managementSmtpServerId",
        "name"
      ],
      "inputProperties": {
        "authentication": {
          "type": "boolean",
          "description": "Does the mail server requires authentication.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsToProcesses": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
        },
        "encryption": {
          "type": "string",
          "description": "Encryption type.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSmtpServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "A password for the SMTP server.Required only if authentication is set to true.\n",
          "secret": true
        },
        "port": {
          "type": "number",
          "description": "The SMTP port to use.\n"
        },
        "server": {
          "type": "string",
          "description": "The SMTP server address.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "username": {
          "type": "string",
          "description": "A username for the SMTP server.Required only if authentication is set to true.\n",
          "secret": true
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSmtpServer resources.\n",
        "properties": {
          "authentication": {
            "type": "boolean",
            "description": "Does the mail server requires authentication.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.domains_to_process blocks are documented below.\n"
          },
          "encryption": {
            "type": "string",
            "description": "Encryption type.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSmtpServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "A password for the SMTP server.Required only if authentication is set to true.\n",
            "secret": true
          },
          "port": {
            "type": "number",
            "description": "The SMTP port to use.\n"
          },
          "server": {
            "type": "string",
            "description": "The SMTP server address.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "username": {
            "type": "string",
            "description": "A username for the SMTP server.Required only if authentication is set to true.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSubordinateCa:ManagementSubordinateCa": {
      "description": "This resource allows you to execute Check Point Subordinate CA.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSubordinateCa(\"example\", {\n    name: \"TestSubordinateCa\",\n    base64Certificate: \"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\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSubordinateCa(\"example\",\n    name=\"TestSubordinateCa\",\n    base64_certificate=\"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\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSubordinateCa(\"example\", new()\n    {\n        Name = \"TestSubordinateCa\",\n        Base64Certificate = \"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\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSubordinateCa(ctx, \"example\", &checkpoint.ManagementSubordinateCaArgs{\n\t\t\tName:              pulumi.String(\"TestSubordinateCa\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSubordinateCa;\nimport com.pulumi.checkpoint.ManagementSubordinateCaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSubordinateCa(\"example\", ManagementSubordinateCaArgs.builder()\n            .name(\"TestSubordinateCa\")\n            .base64Certificate(\"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\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSubordinateCa\n    properties:\n      name: TestSubordinateCa\n      base64Certificate: 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\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "automaticEnrollment": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollment:ManagementSubordinateCaAutomaticEnrollment",
          "description": "Certificate automatic enrollment.<span pulumi-lang-nodejs=\" automaticEnrollment \" pulumi-lang-dotnet=\" AutomaticEnrollment \" pulumi-lang-go=\" automaticEnrollment \" pulumi-lang-python=\" automatic_enrollment \" pulumi-lang-yaml=\" automaticEnrollment \" pulumi-lang-java=\" automaticEnrollment \"> automatic_enrollment </span>blocks are documented below.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSubordinateCaId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "base64Certificate",
        "managementSubordinateCaId",
        "name"
      ],
      "inputProperties": {
        "automaticEnrollment": {
          "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollment:ManagementSubordinateCaAutomaticEnrollment",
          "description": "Certificate automatic enrollment.<span pulumi-lang-nodejs=\" automaticEnrollment \" pulumi-lang-dotnet=\" AutomaticEnrollment \" pulumi-lang-go=\" automaticEnrollment \" pulumi-lang-python=\" automatic_enrollment \" pulumi-lang-yaml=\" automaticEnrollment \" pulumi-lang-java=\" automaticEnrollment \"> automatic_enrollment </span>blocks are documented below.\n"
        },
        "base64Certificate": {
          "type": "string",
          "description": "Certificate file encoded in base64.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "groups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of group identifiers.groups blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSubordinateCaId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "base64Certificate"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSubordinateCa resources.\n",
        "properties": {
          "automaticEnrollment": {
            "$ref": "#/types/checkpoint:index%2FManagementSubordinateCaAutomaticEnrollment:ManagementSubordinateCaAutomaticEnrollment",
            "description": "Certificate automatic enrollment.<span pulumi-lang-nodejs=\" automaticEnrollment \" pulumi-lang-dotnet=\" AutomaticEnrollment \" pulumi-lang-go=\" automaticEnrollment \" pulumi-lang-python=\" automatic_enrollment \" pulumi-lang-yaml=\" automaticEnrollment \" pulumi-lang-java=\" automaticEnrollment \"> automatic_enrollment </span>blocks are documented below.\n"
          },
          "base64Certificate": {
            "type": "string",
            "description": "Certificate file encoded in base64.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "groups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of group identifiers.groups blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSubordinateCaId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementSyslogServer:ManagementSyslogServer": {
      "description": "This resource allows you to execute Check Point Syslog Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSyslogServer(\"example\", {\n    name: \"newSyslogServer\",\n    host: \"syslogServerHost\",\n    port: 18889,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSyslogServer(\"example\",\n    name=\"newSyslogServer\",\n    host=\"syslogServerHost\",\n    port=18889)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementSyslogServer(\"example\", new()\n    {\n        Name = \"newSyslogServer\",\n        Host = \"syslogServerHost\",\n        Port = 18889,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSyslogServer(ctx, \"example\", &checkpoint.ManagementSyslogServerArgs{\n\t\t\tName: pulumi.String(\"newSyslogServer\"),\n\t\t\tHost: pulumi.String(\"syslogServerHost\"),\n\t\t\tPort: pulumi.Float64(18889),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSyslogServer;\nimport com.pulumi.checkpoint.ManagementSyslogServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSyslogServer(\"example\", ManagementSyslogServerArgs.builder()\n            .name(\"newSyslogServer\")\n            .host(\"syslogServerHost\")\n            .port(18889.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSyslogServer\n    properties:\n      name: newSyslogServer\n      host: syslogServerHost\n      port: 18889\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "host": {
          "type": "string",
          "description": "Host server object identified by the name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSyslogServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "RFC version.\n"
        }
      },
      "type": "object",
      "required": [
        "host",
        "managementSyslogServerId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "host": {
          "type": "string",
          "description": "Host server object identified by the name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementSyslogServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "port": {
          "type": "number",
          "description": "Port number.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "version": {
          "type": "string",
          "description": "RFC version.\n"
        }
      },
      "requiredInputs": [
        "host"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementSyslogServer resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "host": {
            "type": "string",
            "description": "Host server object identified by the name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementSyslogServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "port": {
            "type": "number",
            "description": "Port number.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "version": {
            "type": "string",
            "description": "RFC version.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTacacsGroup:ManagementTacacsGroup": {
      "description": "This resource allows you to  add/update/delete Check Point Tacacs Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementTacacsGroup(\"example\", {\n    name: \"New Tacacs Group 1\",\n    members: [\n        \"t1\",\n        \"t3\",\n        \"group1\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementTacacsGroup(\"example\",\n    name=\"New Tacacs Group 1\",\n    members=[\n        \"t1\",\n        \"t3\",\n        \"group1\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementTacacsGroup(\"example\", new()\n    {\n        Name = \"New Tacacs Group 1\",\n        Members = new[]\n        {\n            \"t1\",\n            \"t3\",\n            \"group1\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementTacacsGroup(ctx, \"example\", &checkpoint.ManagementTacacsGroupArgs{\n\t\t\tName: pulumi.String(\"New Tacacs Group 1\"),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"t1\"),\n\t\t\t\tpulumi.String(\"t3\"),\n\t\t\t\tpulumi.String(\"group1\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTacacsGroup;\nimport com.pulumi.checkpoint.ManagementTacacsGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementTacacsGroup(\"example\", ManagementTacacsGroupArgs.builder()\n            .name(\"New Tacacs Group 1\")\n            .members(            \n                \"t1\",\n                \"t3\",\n                \"group1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementTacacsGroup\n    properties:\n      name: New Tacacs Group 1\n      members:\n        - t1\n        - t3\n        - group1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTacacsGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tacacs servers identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementTacacsGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTacacsGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tacacs servers identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTacacsGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementTacacsGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tacacs servers identified by the name or UID.members blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTacacsServer:ManagementTacacsServer": {
      "description": "This resource allows you to execute Check Point Tacacs Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementTacacsServer(\"example\", {\n    name: \"My Tacacs Server\",\n    server: \"h1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementTacacsServer(\"example\",\n    name=\"My Tacacs Server\",\n    server=\"h1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementTacacsServer(\"example\", new()\n    {\n        Name = \"My Tacacs Server\",\n        Server = \"h1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementTacacsServer(ctx, \"example\", &checkpoint.ManagementTacacsServerArgs{\n\t\t\tName:   pulumi.String(\"My Tacacs Server\"),\n\t\t\tServer: pulumi.String(\"h1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTacacsServer;\nimport com.pulumi.checkpoint.ManagementTacacsServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementTacacsServer(\"example\", ManagementTacacsServerArgs.builder()\n            .name(\"My Tacacs Server\")\n            .server(\"h1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementTacacsServer\n    properties:\n      name: My Tacacs Server\n      server: h1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "encryption": {
          "type": "boolean",
          "description": "Is there a secret key defined on the server. Must be set true when \"server-type\" was selected to be \"TACACS+\".\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTacacsServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "priority": {
          "type": "number",
          "description": "The priority of the TACACS Server in case it is a member of a TACACS Group.\n"
        },
        "secretKey": {
          "type": "string",
          "description": "The server's secret key.<br><font color=\"red\">Required only when</font> \"server-type\" was selected to be \"TACACS+\".\n",
          "secret": true
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the host that is the TACACS Server.\n"
        },
        "serverType": {
          "type": "string",
          "description": "Server type, TACACS or TACACS+.\n"
        },
        "service": {
          "type": "string",
          "description": "Server service, only relevant when \"server-type\" is TACACS.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementTacacsServerId",
        "name",
        "server"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "encryption": {
          "type": "boolean",
          "description": "Is there a secret key defined on the server. Must be set true when \"server-type\" was selected to be \"TACACS+\".\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTacacsServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "priority": {
          "type": "number",
          "description": "The priority of the TACACS Server in case it is a member of a TACACS Group.\n"
        },
        "secretKey": {
          "type": "string",
          "description": "The server's secret key.<br><font color=\"red\">Required only when</font> \"server-type\" was selected to be \"TACACS+\".\n",
          "secret": true
        },
        "server": {
          "type": "string",
          "description": "The UID or Name of the host that is the TACACS Server.\n"
        },
        "serverType": {
          "type": "string",
          "description": "Server type, TACACS or TACACS+.\n"
        },
        "service": {
          "type": "string",
          "description": "Server service, only relevant when \"server-type\" is TACACS.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "server"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTacacsServer resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "encryption": {
            "type": "boolean",
            "description": "Is there a secret key defined on the server. Must be set true when \"server-type\" was selected to be \"TACACS+\".\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementTacacsServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "priority": {
            "type": "number",
            "description": "The priority of the TACACS Server in case it is a member of a TACACS Group.\n"
          },
          "secretKey": {
            "type": "string",
            "description": "The server's secret key.<br><font color=\"red\">Required only when</font> \"server-type\" was selected to be \"TACACS+\".\n",
            "secret": true
          },
          "server": {
            "type": "string",
            "description": "The UID or Name of the host that is the TACACS Server.\n"
          },
          "serverType": {
            "type": "string",
            "description": "Server type, TACACS or TACACS+.\n"
          },
          "service": {
            "type": "string",
            "description": "Server service, only relevant when \"server-type\" is TACACS.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTag:ManagementTag": {
      "description": "This resource allows you to add/update/delete Check Point Tag.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementTag(\"example\", {\n    name: \"My Tag\",\n    tags: [\n        \"tag1\",\n        \"tag2\",\n    ],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementTag(\"example\",\n    name=\"My Tag\",\n    tags=[\n        \"tag1\",\n        \"tag2\",\n    ])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementTag(\"example\", new()\n    {\n        Name = \"My Tag\",\n        Tags = new[]\n        {\n            \"tag1\",\n            \"tag2\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementTag(ctx, \"example\", &checkpoint.ManagementTagArgs{\n\t\t\tName: pulumi.String(\"My Tag\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"tag1\"),\n\t\t\t\tpulumi.String(\"tag2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTag;\nimport com.pulumi.checkpoint.ManagementTagArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementTag(\"example\", ManagementTagArgs.builder()\n            .name(\"My Tag\")\n            .tags(            \n                \"tag1\",\n                \"tag2\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementTag\n    properties:\n      name: My Tag\n      tags:\n        - tag1\n        - tag2\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTagId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name Must be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementTagId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTagId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name Must be unique in the domain.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTag resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementTagId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name Must be unique in the domain.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTestSicStatus:ManagementTestSicStatus": {
      "properties": {
        "managementTestSicStatusId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Gateway, cluster member or Check Point host name.\n"
        },
        "sicMessage": {
          "type": "string",
          "description": "SIC message from the gateway."
        },
        "sicName": {
          "type": "string",
          "description": "SIC (Secure Internal Communication) name."
        },
        "sicStatus": {
          "type": "string",
          "description": "SIC Status reflects the state of the gateway after it has received the certificate issued by the ICA."
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        }
      },
      "type": "object",
      "required": [
        "managementTestSicStatusId",
        "name",
        "sicMessage",
        "sicName",
        "sicStatus",
        "taskId"
      ],
      "inputProperties": {
        "managementTestSicStatusId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Gateway, cluster member or Check Point host name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTestSicStatus resources.\n",
        "properties": {
          "managementTestSicStatusId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Gateway, cluster member or Check Point host name.\n"
          },
          "sicMessage": {
            "type": "string",
            "description": "SIC message from the gateway."
          },
          "sicName": {
            "type": "string",
            "description": "SIC (Secure Internal Communication) name."
          },
          "sicStatus": {
            "type": "string",
            "description": "SIC Status reflects the state of the gateway after it has received the certificate issued by the ICA."
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTestTrust:ManagementTestTrust": {
      "properties": {
        "managementTestTrustId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Minimum Check Point password length.\n"
        },
        "trustMethod": {
          "type": "string",
          "description": "Trust method to use for establishing communication.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementTestTrustId",
        "name"
      ],
      "inputProperties": {
        "managementTestTrustId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Minimum Check Point password length.\n"
        },
        "trustMethod": {
          "type": "string",
          "description": "Trust method to use for establishing communication.\n"
        },
        "uid": {
          "type": "string",
          "description": "Object unique identifier.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTestTrust resources.\n",
        "properties": {
          "managementTestTrustId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Minimum Check Point password length.\n"
          },
          "trustMethod": {
            "type": "string",
            "description": "Trust method to use for establishing communication.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementThreatException:ManagementThreatException": {
      "description": "This resource allows you to add/update/delete Check Point Threat Exception.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst test = new checkpoint.ManagementThreatRule(\"test\", {\n    name: \"threat rule\",\n    layer: \"Standard Threat Prevention\",\n    position: {\n        top: \"top\",\n    },\n});\nconst testManagementThreatException = new checkpoint.ManagementThreatException(\"test\", {\n    name: \"threat exception\",\n    layer: \"Standard Threat Prevention\",\n    position: {\n        top: \"top\",\n    },\n    ruleName: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest = checkpoint.ManagementThreatRule(\"test\",\n    name=\"threat rule\",\n    layer=\"Standard Threat Prevention\",\n    position={\n        \"top\": \"top\",\n    })\ntest_management_threat_exception = checkpoint.ManagementThreatException(\"test\",\n    name=\"threat exception\",\n    layer=\"Standard Threat Prevention\",\n    position={\n        \"top\": \"top\",\n    },\n    rule_name=test.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var test = new Checkpoint.ManagementThreatRule(\"test\", new()\n    {\n        Name = \"threat rule\",\n        Layer = \"Standard Threat Prevention\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var testManagementThreatException = new Checkpoint.ManagementThreatException(\"test\", new()\n    {\n        Name = \"threat exception\",\n        Layer = \"Standard Threat Prevention\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        RuleName = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttest, err := checkpoint.NewManagementThreatRule(ctx, \"test\", &checkpoint.ManagementThreatRuleArgs{\n\t\t\tName:  pulumi.String(\"threat rule\"),\n\t\t\tLayer: pulumi.String(\"Standard Threat Prevention\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewManagementThreatException(ctx, \"test\", &checkpoint.ManagementThreatExceptionArgs{\n\t\t\tName:  pulumi.String(\"threat exception\"),\n\t\t\tLayer: pulumi.String(\"Standard Threat Prevention\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tRuleName: test.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatRule;\nimport com.pulumi.checkpoint.ManagementThreatRuleArgs;\nimport com.pulumi.checkpoint.ManagementThreatException;\nimport com.pulumi.checkpoint.ManagementThreatExceptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var test = new ManagementThreatRule(\"test\", ManagementThreatRuleArgs.builder()\n            .name(\"threat rule\")\n            .layer(\"Standard Threat Prevention\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        var testManagementThreatException = new ManagementThreatException(\"testManagementThreatException\", ManagementThreatExceptionArgs.builder()\n            .name(\"threat exception\")\n            .layer(\"Standard Threat Prevention\")\n            .position(Map.of(\"top\", \"top\"))\n            .ruleName(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  test:\n    type: checkpoint:ManagementThreatRule\n    properties:\n      name: threat rule\n      layer: Standard Threat Prevention\n      position:\n        top: top\n  testManagementThreatException:\n    type: checkpoint:ManagementThreatException\n    name: test\n    properties:\n      name: threat exception\n      layer: Standard Threat Prevention\n      position:\n        top: top\n      ruleName: ${test.name}\n```\n<!--End PulumiCodeChooser -->\n\n## Import\n\n`checkpoint_management_threat_exception` can be imported by using the following format: LAYER_UID;exception_group_uid or rule_uid;EXCEPTION_GROUP_UID or PARENT_RULE_UID;EXCEPTION_GROUP_UID\n\n```sh\n$ pulumi import checkpoint:index/managementThreatException:ManagementThreatException example \"Standard Threat Prevention;exception_group_uid;9423d36f-2d66-4754-b9e2-e9f4493751e5;9423d36f-2d66-4754-b9e2-e9f4493751d3\"\n```\n\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "Action-the enforced profile.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "exceptionGroupName": {
          "type": "string",
          "description": "The name of the exception-group.\n"
        },
        "exceptionGroupUid": {
          "type": "string",
          "description": "The UID of the exception-group.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementThreatExceptionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the exception.\n"
        },
        "owner": {
          "type": "string",
          "description": "Owner UID.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "protectedScopeNegate": {
          "type": "boolean",
          "description": "True if negate is set for Protected Scope.\n"
        },
        "protectedScopes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
        },
        "protectionOrSites": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of protection or site objects identified by the name or UID.\n"
        },
        "ruleName": {
          "type": "string",
          "description": "The name of the parent rule.\n"
        },
        "ruleUid": {
          "type": "string",
          "description": "The UID of the parent rule.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "track": {
          "type": "string",
          "description": "Packet tracking.\n"
        }
      },
      "type": "object",
      "required": [
        "managementThreatExceptionId",
        "name",
        "owner",
        "position"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "Action-the enforced profile.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "exceptionGroupName": {
          "type": "string",
          "description": "The name of the exception-group.\n"
        },
        "exceptionGroupUid": {
          "type": "string",
          "description": "The UID of the exception-group.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementThreatExceptionId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the exception.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "protectedScopeNegate": {
          "type": "boolean",
          "description": "True if negate is set for Protected Scope.\n"
        },
        "protectedScopes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
        },
        "protectionOrSites": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of protection or site objects identified by the name or UID.\n"
        },
        "ruleName": {
          "type": "string",
          "description": "The name of the parent rule.\n"
        },
        "ruleUid": {
          "type": "string",
          "description": "The UID of the parent rule.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "track": {
          "type": "string",
          "description": "Packet tracking.\n"
        }
      },
      "requiredInputs": [
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementThreatException resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "Action-the enforced profile.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "destinationNegate": {
            "type": "boolean",
            "description": "True if negate is set for destination.\n"
          },
          "destinations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "exceptionGroupName": {
            "type": "string",
            "description": "The name of the exception-group.\n"
          },
          "exceptionGroupUid": {
            "type": "string",
            "description": "The UID of the exception-group.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on.\n"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "managementThreatExceptionId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the exception.\n"
          },
          "owner": {
            "type": "string",
            "description": "Owner UID.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "protectedScopeNegate": {
            "type": "boolean",
            "description": "True if negate is set for Protected Scope.\n"
          },
          "protectedScopes": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
          },
          "protectionOrSites": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of protection or site objects identified by the name or UID.\n"
          },
          "ruleName": {
            "type": "string",
            "description": "The name of the parent rule.\n"
          },
          "ruleUid": {
            "type": "string",
            "description": "The UID of the parent rule.\n"
          },
          "serviceNegate": {
            "type": "boolean",
            "description": "True if negate is set for service.\n"
          },
          "services": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "sourceNegate": {
            "type": "boolean",
            "description": "True if negate is set for source.\n"
          },
          "sources": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "track": {
            "type": "string",
            "description": "Packet tracking.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementThreatIndicator:ManagementThreatIndicator": {
      "description": "This resource allows you to add/update/delete Check Point Threat Indicator.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementThreatIndicator(\"example\", {\n    name: \"My_Indicator\",\n    observables: [{\n        name: \"My_Observable\",\n        mailTo: \"someone@somewhere.com\",\n        confidence: \"medium\",\n        severity: \"low\",\n        product: \"AV\",\n    }],\n    action: \"ask\",\n    profileOverrides: [{\n        profile: \"My_Profile\",\n        action: \"detect\",\n    }],\n    ignoreWarnings: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementThreatIndicator(\"example\",\n    name=\"My_Indicator\",\n    observables=[{\n        \"name\": \"My_Observable\",\n        \"mail_to\": \"someone@somewhere.com\",\n        \"confidence\": \"medium\",\n        \"severity\": \"low\",\n        \"product\": \"AV\",\n    }],\n    action=\"ask\",\n    profile_overrides=[{\n        \"profile\": \"My_Profile\",\n        \"action\": \"detect\",\n    }],\n    ignore_warnings=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementThreatIndicator(\"example\", new()\n    {\n        Name = \"My_Indicator\",\n        Observables = new[]\n        {\n            new Checkpoint.Inputs.ManagementThreatIndicatorObservableArgs\n            {\n                Name = \"My_Observable\",\n                MailTo = \"someone@somewhere.com\",\n                Confidence = \"medium\",\n                Severity = \"low\",\n                Product = \"AV\",\n            },\n        },\n        Action = \"ask\",\n        ProfileOverrides = new[]\n        {\n            new Checkpoint.Inputs.ManagementThreatIndicatorProfileOverrideArgs\n            {\n                Profile = \"My_Profile\",\n                Action = \"detect\",\n            },\n        },\n        IgnoreWarnings = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementThreatIndicator(ctx, \"example\", &checkpoint.ManagementThreatIndicatorArgs{\n\t\t\tName: pulumi.String(\"My_Indicator\"),\n\t\t\tObservables: checkpoint.ManagementThreatIndicatorObservableArray{\n\t\t\t\t&checkpoint.ManagementThreatIndicatorObservableArgs{\n\t\t\t\t\tName:       pulumi.String(\"My_Observable\"),\n\t\t\t\t\tMailTo:     pulumi.String(\"someone@somewhere.com\"),\n\t\t\t\t\tConfidence: pulumi.String(\"medium\"),\n\t\t\t\t\tSeverity:   pulumi.String(\"low\"),\n\t\t\t\t\tProduct:    pulumi.String(\"AV\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAction: pulumi.String(\"ask\"),\n\t\t\tProfileOverrides: checkpoint.ManagementThreatIndicatorProfileOverrideArray{\n\t\t\t\t&checkpoint.ManagementThreatIndicatorProfileOverrideArgs{\n\t\t\t\t\tProfile: pulumi.String(\"My_Profile\"),\n\t\t\t\t\tAction:  pulumi.String(\"detect\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tIgnoreWarnings: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatIndicator;\nimport com.pulumi.checkpoint.ManagementThreatIndicatorArgs;\nimport com.pulumi.checkpoint.inputs.ManagementThreatIndicatorObservableArgs;\nimport com.pulumi.checkpoint.inputs.ManagementThreatIndicatorProfileOverrideArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementThreatIndicator(\"example\", ManagementThreatIndicatorArgs.builder()\n            .name(\"My_Indicator\")\n            .observables(ManagementThreatIndicatorObservableArgs.builder()\n                .name(\"My_Observable\")\n                .mailTo(\"someone@somewhere.com\")\n                .confidence(\"medium\")\n                .severity(\"low\")\n                .product(\"AV\")\n                .build())\n            .action(\"ask\")\n            .profileOverrides(ManagementThreatIndicatorProfileOverrideArgs.builder()\n                .profile(\"My_Profile\")\n                .action(\"detect\")\n                .build())\n            .ignoreWarnings(true)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementThreatIndicator\n    properties:\n      name: My_Indicator\n      observables:\n        - name: My_Observable\n          mailTo: someone@somewhere.com\n          confidence: medium\n          severity: low\n          product: AV\n      action: ask\n      profileOverrides:\n        - profile: My_Profile\n          action: detect\n      ignoreWarnings: true\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "The indicator's action.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementThreatIndicatorId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "observables": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatIndicatorObservable:ManagementThreatIndicatorObservable"
          },
          "description": "The indicator's observables. Indicator's observables blocks are documented below.\n"
        },
        "profileOverrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatIndicatorProfileOverride:ManagementThreatIndicatorProfileOverride"
          },
          "description": "Profiles in which to override the indicator's default action. Profile Overrides blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementThreatIndicatorId",
        "name"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "The indicator's action.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementThreatIndicatorId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "observables": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatIndicatorObservable:ManagementThreatIndicatorObservable"
          },
          "description": "The indicator's observables. Indicator's observables blocks are documented below.\n"
        },
        "profileOverrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatIndicatorProfileOverride:ManagementThreatIndicatorProfileOverride"
          },
          "description": "Profiles in which to override the indicator's default action. Profile Overrides blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementThreatIndicator resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "The indicator's action.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementThreatIndicatorId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "observables": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatIndicatorObservable:ManagementThreatIndicatorObservable"
            },
            "description": "The indicator's observables. Indicator's observables blocks are documented below.\n"
          },
          "profileOverrides": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatIndicatorProfileOverride:ManagementThreatIndicatorProfileOverride"
            },
            "description": "Profiles in which to override the indicator's default action. Profile Overrides blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementThreatIocFeed:ManagementThreatIocFeed": {
      "description": "This resource allows you to execute Check Point Threat Ioc Feed.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementThreatIocFeed(\"example\", {\n    name: \"ioc_feed\",\n    feedUrl: \"https://www.feedsresource.com/resource\",\n    action: \"Prevent\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementThreatIocFeed(\"example\",\n    name=\"ioc_feed\",\n    feed_url=\"https://www.feedsresource.com/resource\",\n    action=\"Prevent\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementThreatIocFeed(\"example\", new()\n    {\n        Name = \"ioc_feed\",\n        FeedUrl = \"https://www.feedsresource.com/resource\",\n        Action = \"Prevent\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementThreatIocFeed(ctx, \"example\", &checkpoint.ManagementThreatIocFeedArgs{\n\t\t\tName:    pulumi.String(\"ioc_feed\"),\n\t\t\tFeedUrl: pulumi.String(\"https://www.feedsresource.com/resource\"),\n\t\t\tAction:  pulumi.String(\"Prevent\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatIocFeed;\nimport com.pulumi.checkpoint.ManagementThreatIocFeedArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementThreatIocFeed(\"example\", ManagementThreatIocFeedArgs.builder()\n            .name(\"ioc_feed\")\n            .feedUrl(\"https://www.feedsresource.com/resource\")\n            .action(\"Prevent\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementThreatIocFeed\n    properties:\n      name: ioc_feed\n      feedUrl: https://www.feedsresource.com/resource\n      action: Prevent\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "The feed indicator's action.\n"
        },
        "certificateId": {
          "type": "string",
          "description": "Certificate SHA-1 fingerprint to access the feed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customComment": {
          "type": "number",
          "description": "Custom IOC feed - the column number of comment.\n"
        },
        "customConfidence": {
          "type": "number",
          "description": "Custom IOC feed - the column number of confidence.\n"
        },
        "customHeaders": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatIocFeedCustomHeader:ManagementThreatIocFeedCustomHeader"
          },
          "description": "Custom HTTP headers.custom_header blocks are documented below.\n"
        },
        "customName": {
          "type": "number",
          "description": "Custom IOC feed - the column number of name.\n"
        },
        "customSeverity": {
          "type": "number",
          "description": "Custom IOC feed - the column number of severity.\n"
        },
        "customType": {
          "type": "number",
          "description": "Custom IOC feed - the column number of type in case a specific type is not chosen.\n"
        },
        "customValue": {
          "type": "number",
          "description": "Custom IOC feed - the column number of value in case a specific type is chosen.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Sets whether this indicator feed is enabled.\n"
        },
        "feedType": {
          "type": "string",
          "description": "Feed type to be enforced.\n"
        },
        "feedUrl": {
          "type": "string",
          "description": "URL of the feed.\nURL should be written as http or https.\n"
        },
        "fieldsDelimiter": {
          "type": "string",
          "description": "The delimiter that separates between the columns in the feed.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreLinesThatStartWith": {
          "type": "string",
          "description": "A prefix that will determine which lines to ignore.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementThreatIocFeedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "password for authenticating with the URL.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "useCustomFeedSettings": {
          "type": "boolean",
          "description": "Set in order to configure a custom indicator feed.\n"
        },
        "useGatewayProxy": {
          "type": "boolean",
          "description": "Use the gateway's proxy for retrieving the feed.\n"
        },
        "username": {
          "type": "string",
          "description": "username for authenticating with the URL.\n"
        }
      },
      "type": "object",
      "required": [
        "managementThreatIocFeedId",
        "name"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "The feed indicator's action.\n"
        },
        "certificateId": {
          "type": "string",
          "description": "Certificate SHA-1 fingerprint to access the feed.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "customComment": {
          "type": "number",
          "description": "Custom IOC feed - the column number of comment.\n"
        },
        "customConfidence": {
          "type": "number",
          "description": "Custom IOC feed - the column number of confidence.\n"
        },
        "customHeaders": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatIocFeedCustomHeader:ManagementThreatIocFeedCustomHeader"
          },
          "description": "Custom HTTP headers.custom_header blocks are documented below.\n"
        },
        "customName": {
          "type": "number",
          "description": "Custom IOC feed - the column number of name.\n"
        },
        "customSeverity": {
          "type": "number",
          "description": "Custom IOC feed - the column number of severity.\n"
        },
        "customType": {
          "type": "number",
          "description": "Custom IOC feed - the column number of type in case a specific type is not chosen.\n"
        },
        "customValue": {
          "type": "number",
          "description": "Custom IOC feed - the column number of value in case a specific type is chosen.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Sets whether this indicator feed is enabled.\n"
        },
        "feedType": {
          "type": "string",
          "description": "Feed type to be enforced.\n"
        },
        "feedUrl": {
          "type": "string",
          "description": "URL of the feed.\nURL should be written as http or https.\n"
        },
        "fieldsDelimiter": {
          "type": "string",
          "description": "The delimiter that separates between the columns in the feed.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreLinesThatStartWith": {
          "type": "string",
          "description": "A prefix that will determine which lines to ignore.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementThreatIocFeedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "password for authenticating with the URL.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "useCustomFeedSettings": {
          "type": "boolean",
          "description": "Set in order to configure a custom indicator feed.\n"
        },
        "useGatewayProxy": {
          "type": "boolean",
          "description": "Use the gateway's proxy for retrieving the feed.\n"
        },
        "username": {
          "type": "string",
          "description": "username for authenticating with the URL.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementThreatIocFeed resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "The feed indicator's action.\n"
          },
          "certificateId": {
            "type": "string",
            "description": "Certificate SHA-1 fingerprint to access the feed.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "customComment": {
            "type": "number",
            "description": "Custom IOC feed - the column number of comment.\n"
          },
          "customConfidence": {
            "type": "number",
            "description": "Custom IOC feed - the column number of confidence.\n"
          },
          "customHeaders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatIocFeedCustomHeader:ManagementThreatIocFeedCustomHeader"
            },
            "description": "Custom HTTP headers.custom_header blocks are documented below.\n"
          },
          "customName": {
            "type": "number",
            "description": "Custom IOC feed - the column number of name.\n"
          },
          "customSeverity": {
            "type": "number",
            "description": "Custom IOC feed - the column number of severity.\n"
          },
          "customType": {
            "type": "number",
            "description": "Custom IOC feed - the column number of type in case a specific type is not chosen.\n"
          },
          "customValue": {
            "type": "number",
            "description": "Custom IOC feed - the column number of value in case a specific type is chosen.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Sets whether this indicator feed is enabled.\n"
          },
          "feedType": {
            "type": "string",
            "description": "Feed type to be enforced.\n"
          },
          "feedUrl": {
            "type": "string",
            "description": "URL of the feed.\nURL should be written as http or https.\n"
          },
          "fieldsDelimiter": {
            "type": "string",
            "description": "The delimiter that separates between the columns in the feed.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreLinesThatStartWith": {
            "type": "string",
            "description": "A prefix that will determine which lines to ignore.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementThreatIocFeedId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "password for authenticating with the URL.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "useCustomFeedSettings": {
            "type": "boolean",
            "description": "Set in order to configure a custom indicator feed.\n"
          },
          "useGatewayProxy": {
            "type": "boolean",
            "description": "Use the gateway's proxy for retrieving the feed.\n"
          },
          "username": {
            "type": "string",
            "description": "username for authenticating with the URL.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementThreatLayer:ManagementThreatLayer": {
      "description": "This resource allows you to add/update/delete Check Point Threat Layer.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementThreatLayer(\"example\", {name: \"New Layer 1\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementThreatLayer(\"example\", name=\"New Layer 1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementThreatLayer(\"example\", new()\n    {\n        Name = \"New Layer 1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementThreatLayer(ctx, \"example\", &checkpoint.ManagementThreatLayerArgs{\n\t\t\tName: pulumi.String(\"New Layer 1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatLayer;\nimport com.pulumi.checkpoint.ManagementThreatLayerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementThreatLayer(\"example\", ManagementThreatLayerArgs.builder()\n            .name(\"New Layer 1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementThreatLayer\n    properties:\n      name: New Layer 1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "addDefaultRule": {
          "type": "boolean",
          "description": "Indicates whether to include a default rule in the new layer.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipsLayer": {
          "type": "boolean",
          "description": "N/A"
        },
        "managementThreatLayerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "parentLayer": {
          "type": "string",
          "description": "N/A"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "ipsLayer",
        "managementThreatLayerId",
        "name",
        "parentLayer"
      ],
      "inputProperties": {
        "addDefaultRule": {
          "type": "boolean",
          "description": "Indicates whether to include a default rule in the new layer.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementThreatLayerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementThreatLayer resources.\n",
        "properties": {
          "addDefaultRule": {
            "type": "boolean",
            "description": "Indicates whether to include a default rule in the new layer.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipsLayer": {
            "type": "boolean",
            "description": "N/A"
          },
          "managementThreatLayerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "parentLayer": {
            "type": "string",
            "description": "N/A"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementThreatProfile:ManagementThreatProfile": {
      "description": "This resource allows you to add/update/delete Check Point Threat Profile.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementThreatProfile(\"example\", {\n    name: \"my theat profile\",\n    activeProtectionsPerformanceImpact: \"high\",\n    activeProtectionsSeverity: \"Critical\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementThreatProfile(\"example\",\n    name=\"my theat profile\",\n    active_protections_performance_impact=\"high\",\n    active_protections_severity=\"Critical\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementThreatProfile(\"example\", new()\n    {\n        Name = \"my theat profile\",\n        ActiveProtectionsPerformanceImpact = \"high\",\n        ActiveProtectionsSeverity = \"Critical\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementThreatProfile(ctx, \"example\", &checkpoint.ManagementThreatProfileArgs{\n\t\t\tName:                               pulumi.String(\"my theat profile\"),\n\t\t\tActiveProtectionsPerformanceImpact: pulumi.String(\"high\"),\n\t\t\tActiveProtectionsSeverity:          pulumi.String(\"Critical\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatProfile;\nimport com.pulumi.checkpoint.ManagementThreatProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementThreatProfile(\"example\", ManagementThreatProfileArgs.builder()\n            .name(\"my theat profile\")\n            .activeProtectionsPerformanceImpact(\"high\")\n            .activeProtectionsSeverity(\"Critical\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementThreatProfile\n    properties:\n      name: my theat profile\n      activeProtectionsPerformanceImpact: high\n      activeProtectionsSeverity: Critical\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "activateProtectionsByExtendedAttributes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileActivateProtectionsByExtendedAttribute:ManagementThreatProfileActivateProtectionsByExtendedAttribute"
          },
          "description": "Activate protections by these extended attributes.<span pulumi-lang-nodejs=\" activateProtectionsByExtendedAttributes \" pulumi-lang-dotnet=\" ActivateProtectionsByExtendedAttributes \" pulumi-lang-go=\" activateProtectionsByExtendedAttributes \" pulumi-lang-python=\" activate_protections_by_extended_attributes \" pulumi-lang-yaml=\" activateProtectionsByExtendedAttributes \" pulumi-lang-java=\" activateProtectionsByExtendedAttributes \"> activate_protections_by_extended_attributes </span>blocks are documented below.\n"
        },
        "activeProtectionsPerformanceImpact": {
          "type": "string",
          "description": "Protections with this performance impact only will be activated in the profile.\n"
        },
        "activeProtectionsSeverity": {
          "type": "string",
          "description": "Protections with this severity only will be activated in the profile.\n"
        },
        "antiBot": {
          "type": "boolean",
          "description": "Is Anti-Bot blade activated.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Is Anti-Virus blade activated.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "confidenceLevelHigh": {
          "type": "string",
          "description": "Action for protections with high confidence level.\n"
        },
        "confidenceLevelLow": {
          "type": "string",
          "description": "Action for protections with low confidence level.\n"
        },
        "confidenceLevelMedium": {
          "type": "string",
          "description": "Action for protections with medium confidence level.\n"
        },
        "deactivateProtectionsByExtendedAttributes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileDeactivateProtectionsByExtendedAttribute:ManagementThreatProfileDeactivateProtectionsByExtendedAttribute"
          },
          "description": "Deactivate protections by these extended attributes.<span pulumi-lang-nodejs=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-dotnet=\" DeactivateProtectionsByExtendedAttributes \" pulumi-lang-go=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-python=\" deactivate_protections_by_extended_attributes \" pulumi-lang-yaml=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-java=\" deactivateProtectionsByExtendedAttributes \"> deactivate_protections_by_extended_attributes </span>blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "indicatorOverrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileIndicatorOverride:ManagementThreatProfileIndicatorOverride"
          },
          "description": "Indicators whose action will be overridden in this profile.<span pulumi-lang-nodejs=\" indicatorOverrides \" pulumi-lang-dotnet=\" IndicatorOverrides \" pulumi-lang-go=\" indicatorOverrides \" pulumi-lang-python=\" indicator_overrides \" pulumi-lang-yaml=\" indicatorOverrides \" pulumi-lang-java=\" indicatorOverrides \"> indicator_overrides </span>blocks are documented below.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "Is IPS blade activated.\n"
        },
        "ipsSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "IPS blade settings.<span pulumi-lang-nodejs=\" ipsSettings \" pulumi-lang-dotnet=\" IpsSettings \" pulumi-lang-go=\" ipsSettings \" pulumi-lang-python=\" ips_settings \" pulumi-lang-yaml=\" ipsSettings \" pulumi-lang-java=\" ipsSettings \"> ips_settings </span>blocks are documented below.\n"
        },
        "maliciousMailPolicySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Malicious Mail Policy for MTA Gateways.<span pulumi-lang-nodejs=\" maliciousMailPolicySettings \" pulumi-lang-dotnet=\" MaliciousMailPolicySettings \" pulumi-lang-go=\" maliciousMailPolicySettings \" pulumi-lang-python=\" malicious_mail_policy_settings \" pulumi-lang-yaml=\" maliciousMailPolicySettings \" pulumi-lang-java=\" maliciousMailPolicySettings \"> malicious_mail_policy_settings </span>blocks are documented below.\n"
        },
        "managementThreatProfileId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileOverride:ManagementThreatProfileOverride"
          },
          "description": "Overrides per profile for this protection. overrides blocks are documented below.\n"
        },
        "scanMaliciousLinks": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Scans malicious links (URLs) inside email messages.<span pulumi-lang-nodejs=\" scanMaliciousLinks \" pulumi-lang-dotnet=\" ScanMaliciousLinks \" pulumi-lang-go=\" scanMaliciousLinks \" pulumi-lang-python=\" scan_malicious_links \" pulumi-lang-yaml=\" scanMaliciousLinks \" pulumi-lang-java=\" scanMaliciousLinks \"> scan_malicious_links </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Is Threat Emulation blade activated.\n"
        },
        "threatExtraction": {
          "type": "boolean",
          "description": "Is Threat-Extraction blade activated.\n"
        },
        "useExtendedAttributes": {
          "type": "boolean",
          "description": "Whether to activate/deactivate IPS protections according to the extended attributes.\n"
        },
        "useIndicators": {
          "type": "boolean",
          "description": "Indicates whether the profile should make use of indicators.\n"
        },
        "zeroPhishing": {
          "type": "boolean",
          "description": "Is Zero-Phishing blade activated.\n"
        }
      },
      "type": "object",
      "required": [
        "activateProtectionsByExtendedAttributes",
        "managementThreatProfileId",
        "name"
      ],
      "inputProperties": {
        "activeProtectionsPerformanceImpact": {
          "type": "string",
          "description": "Protections with this performance impact only will be activated in the profile.\n"
        },
        "activeProtectionsSeverity": {
          "type": "string",
          "description": "Protections with this severity only will be activated in the profile.\n"
        },
        "antiBot": {
          "type": "boolean",
          "description": "Is Anti-Bot blade activated.\n"
        },
        "antiVirus": {
          "type": "boolean",
          "description": "Is Anti-Virus blade activated.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "confidenceLevelHigh": {
          "type": "string",
          "description": "Action for protections with high confidence level.\n"
        },
        "confidenceLevelLow": {
          "type": "string",
          "description": "Action for protections with low confidence level.\n"
        },
        "confidenceLevelMedium": {
          "type": "string",
          "description": "Action for protections with medium confidence level.\n"
        },
        "deactivateProtectionsByExtendedAttributes": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileDeactivateProtectionsByExtendedAttribute:ManagementThreatProfileDeactivateProtectionsByExtendedAttribute"
          },
          "description": "Deactivate protections by these extended attributes.<span pulumi-lang-nodejs=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-dotnet=\" DeactivateProtectionsByExtendedAttributes \" pulumi-lang-go=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-python=\" deactivate_protections_by_extended_attributes \" pulumi-lang-yaml=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-java=\" deactivateProtectionsByExtendedAttributes \"> deactivate_protections_by_extended_attributes </span>blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "indicatorOverrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileIndicatorOverride:ManagementThreatProfileIndicatorOverride"
          },
          "description": "Indicators whose action will be overridden in this profile.<span pulumi-lang-nodejs=\" indicatorOverrides \" pulumi-lang-dotnet=\" IndicatorOverrides \" pulumi-lang-go=\" indicatorOverrides \" pulumi-lang-python=\" indicator_overrides \" pulumi-lang-yaml=\" indicatorOverrides \" pulumi-lang-java=\" indicatorOverrides \"> indicator_overrides </span>blocks are documented below.\n"
        },
        "ips": {
          "type": "boolean",
          "description": "Is IPS blade activated.\n"
        },
        "ipsSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "IPS blade settings.<span pulumi-lang-nodejs=\" ipsSettings \" pulumi-lang-dotnet=\" IpsSettings \" pulumi-lang-go=\" ipsSettings \" pulumi-lang-python=\" ips_settings \" pulumi-lang-yaml=\" ipsSettings \" pulumi-lang-java=\" ipsSettings \"> ips_settings </span>blocks are documented below.\n"
        },
        "maliciousMailPolicySettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Malicious Mail Policy for MTA Gateways.<span pulumi-lang-nodejs=\" maliciousMailPolicySettings \" pulumi-lang-dotnet=\" MaliciousMailPolicySettings \" pulumi-lang-go=\" maliciousMailPolicySettings \" pulumi-lang-python=\" malicious_mail_policy_settings \" pulumi-lang-yaml=\" maliciousMailPolicySettings \" pulumi-lang-java=\" maliciousMailPolicySettings \"> malicious_mail_policy_settings </span>blocks are documented below.\n"
        },
        "managementThreatProfileId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name. Should be unique in the domain.\n"
        },
        "overrides": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementThreatProfileOverride:ManagementThreatProfileOverride"
          },
          "description": "Overrides per profile for this protection. overrides blocks are documented below.\n"
        },
        "scanMaliciousLinks": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Scans malicious links (URLs) inside email messages.<span pulumi-lang-nodejs=\" scanMaliciousLinks \" pulumi-lang-dotnet=\" ScanMaliciousLinks \" pulumi-lang-go=\" scanMaliciousLinks \" pulumi-lang-python=\" scan_malicious_links \" pulumi-lang-yaml=\" scanMaliciousLinks \" pulumi-lang-java=\" scanMaliciousLinks \"> scan_malicious_links </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "threatEmulation": {
          "type": "boolean",
          "description": "Is Threat Emulation blade activated.\n"
        },
        "threatExtraction": {
          "type": "boolean",
          "description": "Is Threat-Extraction blade activated.\n"
        },
        "useExtendedAttributes": {
          "type": "boolean",
          "description": "Whether to activate/deactivate IPS protections according to the extended attributes.\n"
        },
        "useIndicators": {
          "type": "boolean",
          "description": "Indicates whether the profile should make use of indicators.\n"
        },
        "zeroPhishing": {
          "type": "boolean",
          "description": "Is Zero-Phishing blade activated.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementThreatProfile resources.\n",
        "properties": {
          "activateProtectionsByExtendedAttributes": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatProfileActivateProtectionsByExtendedAttribute:ManagementThreatProfileActivateProtectionsByExtendedAttribute"
            },
            "description": "Activate protections by these extended attributes.<span pulumi-lang-nodejs=\" activateProtectionsByExtendedAttributes \" pulumi-lang-dotnet=\" ActivateProtectionsByExtendedAttributes \" pulumi-lang-go=\" activateProtectionsByExtendedAttributes \" pulumi-lang-python=\" activate_protections_by_extended_attributes \" pulumi-lang-yaml=\" activateProtectionsByExtendedAttributes \" pulumi-lang-java=\" activateProtectionsByExtendedAttributes \"> activate_protections_by_extended_attributes </span>blocks are documented below.\n"
          },
          "activeProtectionsPerformanceImpact": {
            "type": "string",
            "description": "Protections with this performance impact only will be activated in the profile.\n"
          },
          "activeProtectionsSeverity": {
            "type": "string",
            "description": "Protections with this severity only will be activated in the profile.\n"
          },
          "antiBot": {
            "type": "boolean",
            "description": "Is Anti-Bot blade activated.\n"
          },
          "antiVirus": {
            "type": "boolean",
            "description": "Is Anti-Virus blade activated.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "confidenceLevelHigh": {
            "type": "string",
            "description": "Action for protections with high confidence level.\n"
          },
          "confidenceLevelLow": {
            "type": "string",
            "description": "Action for protections with low confidence level.\n"
          },
          "confidenceLevelMedium": {
            "type": "string",
            "description": "Action for protections with medium confidence level.\n"
          },
          "deactivateProtectionsByExtendedAttributes": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatProfileDeactivateProtectionsByExtendedAttribute:ManagementThreatProfileDeactivateProtectionsByExtendedAttribute"
            },
            "description": "Deactivate protections by these extended attributes.<span pulumi-lang-nodejs=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-dotnet=\" DeactivateProtectionsByExtendedAttributes \" pulumi-lang-go=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-python=\" deactivate_protections_by_extended_attributes \" pulumi-lang-yaml=\" deactivateProtectionsByExtendedAttributes \" pulumi-lang-java=\" deactivateProtectionsByExtendedAttributes \"> deactivate_protections_by_extended_attributes </span>blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "indicatorOverrides": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatProfileIndicatorOverride:ManagementThreatProfileIndicatorOverride"
            },
            "description": "Indicators whose action will be overridden in this profile.<span pulumi-lang-nodejs=\" indicatorOverrides \" pulumi-lang-dotnet=\" IndicatorOverrides \" pulumi-lang-go=\" indicatorOverrides \" pulumi-lang-python=\" indicator_overrides \" pulumi-lang-yaml=\" indicatorOverrides \" pulumi-lang-java=\" indicatorOverrides \"> indicator_overrides </span>blocks are documented below.\n"
          },
          "ips": {
            "type": "boolean",
            "description": "Is IPS blade activated.\n"
          },
          "ipsSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "IPS blade settings.<span pulumi-lang-nodejs=\" ipsSettings \" pulumi-lang-dotnet=\" IpsSettings \" pulumi-lang-go=\" ipsSettings \" pulumi-lang-python=\" ips_settings \" pulumi-lang-yaml=\" ipsSettings \" pulumi-lang-java=\" ipsSettings \"> ips_settings </span>blocks are documented below.\n"
          },
          "maliciousMailPolicySettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Malicious Mail Policy for MTA Gateways.<span pulumi-lang-nodejs=\" maliciousMailPolicySettings \" pulumi-lang-dotnet=\" MaliciousMailPolicySettings \" pulumi-lang-go=\" maliciousMailPolicySettings \" pulumi-lang-python=\" malicious_mail_policy_settings \" pulumi-lang-yaml=\" maliciousMailPolicySettings \" pulumi-lang-java=\" maliciousMailPolicySettings \"> malicious_mail_policy_settings </span>blocks are documented below.\n"
          },
          "managementThreatProfileId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "overrides": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementThreatProfileOverride:ManagementThreatProfileOverride"
            },
            "description": "Overrides per profile for this protection. overrides blocks are documented below.\n"
          },
          "scanMaliciousLinks": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Scans malicious links (URLs) inside email messages.<span pulumi-lang-nodejs=\" scanMaliciousLinks \" pulumi-lang-dotnet=\" ScanMaliciousLinks \" pulumi-lang-go=\" scanMaliciousLinks \" pulumi-lang-python=\" scan_malicious_links \" pulumi-lang-yaml=\" scanMaliciousLinks \" pulumi-lang-java=\" scanMaliciousLinks \"> scan_malicious_links </span>blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "threatEmulation": {
            "type": "boolean",
            "description": "Is Threat Emulation blade activated.\n"
          },
          "threatExtraction": {
            "type": "boolean",
            "description": "Is Threat-Extraction blade activated.\n"
          },
          "useExtendedAttributes": {
            "type": "boolean",
            "description": "Whether to activate/deactivate IPS protections according to the extended attributes.\n"
          },
          "useIndicators": {
            "type": "boolean",
            "description": "Indicates whether the profile should make use of indicators.\n"
          },
          "zeroPhishing": {
            "type": "boolean",
            "description": "Is Zero-Phishing blade activated.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementThreatRule:ManagementThreatRule": {
      "description": "This resource allows you to add/update/delete Check Point Threat Rule.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst test = new checkpoint.ManagementThreatRule(\"test\", {\n    name: \"threat rule\",\n    layer: \"Standard Threat Prevention\",\n    position: {\n        top: \"top\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest = checkpoint.ManagementThreatRule(\"test\",\n    name=\"threat rule\",\n    layer=\"Standard Threat Prevention\",\n    position={\n        \"top\": \"top\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var test = new Checkpoint.ManagementThreatRule(\"test\", new()\n    {\n        Name = \"threat rule\",\n        Layer = \"Standard Threat Prevention\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementThreatRule(ctx, \"test\", &checkpoint.ManagementThreatRuleArgs{\n\t\t\tName:  pulumi.String(\"threat rule\"),\n\t\t\tLayer: pulumi.String(\"Standard Threat Prevention\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatRule;\nimport com.pulumi.checkpoint.ManagementThreatRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var test = new ManagementThreatRule(\"test\", ManagementThreatRuleArgs.builder()\n            .name(\"threat rule\")\n            .layer(\"Standard Threat Prevention\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  test:\n    type: checkpoint:ManagementThreatRule\n    properties:\n      name: threat rule\n      layer: Standard Threat Prevention\n      position:\n        top: top\n```\n<!--End PulumiCodeChooser -->\n\n## Import\n\n`checkpoint_management_threat_rule` can be imported by using the following format: LAYER_NAME;RULE_UID\n\n```sh\n$ pulumi import checkpoint:index/managementThreatRule:ManagementThreatRule example \"Layer_Name;9423d36f-2d66-4754-b9e2-e9f4493751d3\"\n```\n",
      "properties": {
        "action": {
          "type": "string",
          "description": "Action-the enforced profile.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "exceptions": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of the rule's exceptions identified by UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementThreatRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Rule name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "protectedScopeNegate": {
          "type": "boolean",
          "description": "True if negate is set for Protected Scope.\n"
        },
        "protectedScopes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "track": {
          "type": "string",
          "description": "Packet tracking.\n"
        },
        "trackSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Threat rule track settings.<span pulumi-lang-nodejs=\" trackSettings \" pulumi-lang-dotnet=\" TrackSettings \" pulumi-lang-go=\" trackSettings \" pulumi-lang-python=\" track_settings \" pulumi-lang-yaml=\" trackSettings \" pulumi-lang-java=\" trackSettings \"> track_settings </span>block are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "exceptions",
        "layer",
        "managementThreatRuleId",
        "name",
        "position"
      ],
      "inputProperties": {
        "action": {
          "type": "string",
          "description": "Action-the enforced profile.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "destinationNegate": {
          "type": "boolean",
          "description": "True if negate is set for destination.\n"
        },
        "destinations": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Enable/Disable the rule.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installOns": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Which Gateways identified by the name or UID to install the policy on.\n"
        },
        "layer": {
          "type": "string",
          "description": "Layer that the rule belongs to identified by the name or UID.\n"
        },
        "managementThreatRuleId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Rule name.\n"
        },
        "position": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Position in the rulebase. Position blocks are documented below.\n"
        },
        "protectedScopeNegate": {
          "type": "boolean",
          "description": "True if negate is set for Protected Scope.\n"
        },
        "protectedScopes": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
        },
        "serviceNegate": {
          "type": "boolean",
          "description": "True if negate is set for service.\n"
        },
        "services": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "sourceNegate": {
          "type": "boolean",
          "description": "True if negate is set for source.\n"
        },
        "sources": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Network objects identified by the name or UID.\n"
        },
        "track": {
          "type": "string",
          "description": "Packet tracking.\n"
        },
        "trackSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Threat rule track settings.<span pulumi-lang-nodejs=\" trackSettings \" pulumi-lang-dotnet=\" TrackSettings \" pulumi-lang-go=\" trackSettings \" pulumi-lang-python=\" track_settings \" pulumi-lang-yaml=\" trackSettings \" pulumi-lang-java=\" trackSettings \"> track_settings </span>block are documented below.\n"
        }
      },
      "requiredInputs": [
        "layer",
        "position"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementThreatRule resources.\n",
        "properties": {
          "action": {
            "type": "string",
            "description": "Action-the enforced profile.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "destinationNegate": {
            "type": "boolean",
            "description": "True if negate is set for destination.\n"
          },
          "destinations": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Enable/Disable the rule.\n"
          },
          "exceptions": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of the rule's exceptions identified by UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installOns": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Which Gateways identified by the name or UID to install the policy on.\n"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "managementThreatRuleId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Rule name.\n"
          },
          "position": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Position in the rulebase. Position blocks are documented below.\n"
          },
          "protectedScopeNegate": {
            "type": "boolean",
            "description": "True if negate is set for Protected Scope.\n"
          },
          "protectedScopes": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of objects defining Protected Scope identified by the name or UID.\n"
          },
          "serviceNegate": {
            "type": "boolean",
            "description": "True if negate is set for service.\n"
          },
          "services": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "sourceNegate": {
            "type": "boolean",
            "description": "True if negate is set for source.\n"
          },
          "sources": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Network objects identified by the name or UID.\n"
          },
          "track": {
            "type": "string",
            "description": "Packet tracking.\n"
          },
          "trackSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Threat rule track settings.<span pulumi-lang-nodejs=\" trackSettings \" pulumi-lang-dotnet=\" TrackSettings \" pulumi-lang-go=\" trackSettings \" pulumi-lang-python=\" track_settings \" pulumi-lang-yaml=\" trackSettings \" pulumi-lang-java=\" trackSettings \"> track_settings </span>block are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTime:ManagementTime": {
      "description": "This resource allows you to execute Check Point Time.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementApplicationSite(\"example\", {name: \"time1\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementApplicationSite(\"example\", name=\"time1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementApplicationSite(\"example\", new()\n    {\n        Name = \"time1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementApplicationSite(ctx, \"example\", &checkpoint.ManagementApplicationSiteArgs{\n\t\t\tName: pulumi.String(\"time1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSite;\nimport com.pulumi.checkpoint.ManagementApplicationSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementApplicationSite(\"example\", ManagementApplicationSiteArgs.builder()\n            .name(\"time1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementApplicationSite\n    properties:\n      name: time1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "end": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "End time. Note: Each gateway may interpret this time differently according to its time zone.\n"
        },
        "endNever": {
          "type": "boolean",
          "description": "End never.\n"
        },
        "hoursRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementTimeHoursRange:ManagementTimeHoursRange"
          },
          "description": "Hours recurrence. Note: Each gateway may interpret this time differently according to its time zone.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTimeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Time object name. Cannot be more than 11 characters. Should be unique in the domain.\n"
        },
        "recurrence": {
          "$ref": "#/types/checkpoint:index%2FManagementTimeRecurrence:ManagementTimeRecurrence",
          "description": "Days recurrence.\n"
        },
        "start": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Starting time. Note: Each gateway may interpret this time differently according to its time zone.\n"
        },
        "startNow": {
          "type": "boolean",
          "description": "Start immediately.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementTimeId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "end": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "End time. Note: Each gateway may interpret this time differently according to its time zone.\n"
        },
        "endNever": {
          "type": "boolean",
          "description": "End never.\n"
        },
        "hoursRanges": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementTimeHoursRange:ManagementTimeHoursRange"
          },
          "description": "Hours recurrence. Note: Each gateway may interpret this time differently according to its time zone.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTimeId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Time object name. Cannot be more than 11 characters. Should be unique in the domain.\n"
        },
        "recurrence": {
          "$ref": "#/types/checkpoint:index%2FManagementTimeRecurrence:ManagementTimeRecurrence",
          "description": "Days recurrence.\n"
        },
        "start": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Starting time. Note: Each gateway may interpret this time differently according to its time zone.\n"
        },
        "startNow": {
          "type": "boolean",
          "description": "Start immediately.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTime resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "end": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "End time. Note: Each gateway may interpret this time differently according to its time zone.\n"
          },
          "endNever": {
            "type": "boolean",
            "description": "End never.\n"
          },
          "hoursRanges": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementTimeHoursRange:ManagementTimeHoursRange"
            },
            "description": "Hours recurrence. Note: Each gateway may interpret this time differently according to its time zone.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementTimeId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Time object name. Cannot be more than 11 characters. Should be unique in the domain.\n"
          },
          "recurrence": {
            "$ref": "#/types/checkpoint:index%2FManagementTimeRecurrence:ManagementTimeRecurrence",
            "description": "Days recurrence.\n"
          },
          "start": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Starting time. Note: Each gateway may interpret this time differently according to its time zone.\n"
          },
          "startNow": {
            "type": "boolean",
            "description": "Start immediately.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTimeGroup:ManagementTimeGroup": {
      "description": "This resource allows you to execute Check Point Time Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementTimeGroup(\"example\", {name: \"timeGroup-1\"});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementTimeGroup(\"example\", name=\"timeGroup-1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementTimeGroup(\"example\", new()\n    {\n        Name = \"timeGroup-1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementTimeGroup(ctx, \"example\", &checkpoint.ManagementTimeGroupArgs{\n\t\t\tName: pulumi.String(\"timeGroup-1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTimeGroup;\nimport com.pulumi.checkpoint.ManagementTimeGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementTimeGroup(\"example\", ManagementTimeGroupArgs.builder()\n            .name(\"timeGroup-1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementTimeGroup\n    properties:\n      name: timeGroup-1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTimeGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Time Group objects identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementTimeGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementTimeGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Time Group objects identified by the name or UID.members blocks are documented below.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTimeGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementTimeGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Time Group objects identified by the name or UID.members blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementTrustedClient:ManagementTrustedClient": {
      "description": "This resource allows you to execute Check Point Trusted Client.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementTrustedClient(\"example\", {\n    name: \"New TrustedClient 1\",\n    ipv4Address: \"192.168.2.1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementTrustedClient(\"example\",\n    name=\"New TrustedClient 1\",\n    ipv4_address=\"192.168.2.1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementTrustedClient(\"example\", new()\n    {\n        Name = \"New TrustedClient 1\",\n        Ipv4Address = \"192.168.2.1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementTrustedClient(ctx, \"example\", &checkpoint.ManagementTrustedClientArgs{\n\t\t\tName:        pulumi.String(\"New TrustedClient 1\"),\n\t\t\tIpv4Address: pulumi.String(\"192.168.2.1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTrustedClient;\nimport com.pulumi.checkpoint.ManagementTrustedClientArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementTrustedClient(\"example\", ManagementTrustedClientArgs.builder()\n            .name(\"New TrustedClient 1\")\n            .ipv4Address(\"192.168.2.1\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementTrustedClient\n    properties:\n      name: New TrustedClient 1\n      ipv4Address: 192.168.2.1\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsAssignments": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Domains to be added to this profile. Use domain name only. See example below: \"add-trusted-client (with domain)\".\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4AddressFirst": {
          "type": "string",
          "description": "First IPv4 address in the range.\n"
        },
        "ipv4AddressLast": {
          "type": "string",
          "description": "Last IPv4 address in the range.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6AddressFirst": {
          "type": "string",
          "description": "First IPv6 address in the range.\n"
        },
        "ipv6AddressLast": {
          "type": "string",
          "description": "Last IPv6 address in the range.\n"
        },
        "managementTrustedClientId": {
          "type": "string"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 mask length.\n"
        },
        "multiDomainServerTrustedClient": {
          "type": "boolean",
          "description": "Let this trusted client connect to all Multi-Domain Servers in the deployment.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "type": {
          "type": "string",
          "description": "Trusted client type.\n"
        },
        "wildCard": {
          "type": "string",
          "description": "IP wild card (e.g. 192.0.2.*).\n"
        }
      },
      "type": "object",
      "required": [
        "managementTrustedClientId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "domainsAssignments": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Domains to be added to this profile. Use domain name only. See example below: \"add-trusted-client (with domain)\".\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4AddressFirst": {
          "type": "string",
          "description": "First IPv4 address in the range.\n"
        },
        "ipv4AddressLast": {
          "type": "string",
          "description": "Last IPv4 address in the range.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6AddressFirst": {
          "type": "string",
          "description": "First IPv6 address in the range.\n"
        },
        "ipv6AddressLast": {
          "type": "string",
          "description": "Last IPv6 address in the range.\n"
        },
        "managementTrustedClientId": {
          "type": "string"
        },
        "maskLength4": {
          "type": "number",
          "description": "IPv4 mask length.\n"
        },
        "maskLength6": {
          "type": "number",
          "description": "IPv6 mask length.\n"
        },
        "multiDomainServerTrustedClient": {
          "type": "boolean",
          "description": "Let this trusted client connect to all Multi-Domain Servers in the deployment.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "type": {
          "type": "string",
          "description": "Trusted client type.\n"
        },
        "wildCard": {
          "type": "string",
          "description": "IP wild card (e.g. 192.0.2.*).\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementTrustedClient resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "domainsAssignments": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Domains to be added to this profile. Use domain name only. See example below: \"add-trusted-client (with domain)\".\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv4AddressFirst": {
            "type": "string",
            "description": "First IPv4 address in the range.\n"
          },
          "ipv4AddressLast": {
            "type": "string",
            "description": "Last IPv4 address in the range.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "ipv6AddressFirst": {
            "type": "string",
            "description": "First IPv6 address in the range.\n"
          },
          "ipv6AddressLast": {
            "type": "string",
            "description": "Last IPv6 address in the range.\n"
          },
          "managementTrustedClientId": {
            "type": "string"
          },
          "maskLength4": {
            "type": "number",
            "description": "IPv4 mask length.\n"
          },
          "maskLength6": {
            "type": "number",
            "description": "IPv6 mask length.\n"
          },
          "multiDomainServerTrustedClient": {
            "type": "boolean",
            "description": "Let this trusted client connect to all Multi-Domain Servers in the deployment.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "type": {
            "type": "string",
            "description": "Trusted client type.\n"
          },
          "wildCard": {
            "type": "string",
            "description": "IP wild card (e.g. 192.0.2.*).\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUninstallSoftwarePackage:ManagementUninstallSoftwarePackage": {
      "properties": {
        "clusterInstallationSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Installation settings for cluster.cluster_installation_settings blocks are documented below.\n"
        },
        "concurrencyLimit": {
          "type": "number",
          "description": "The number of targets, on which the same package is installed at the same time.\n"
        },
        "managementUninstallSoftwarePackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUninstallSoftwarePackageId",
        "name",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "clusterInstallationSettings": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Installation settings for cluster.cluster_installation_settings blocks are documented below.\n"
        },
        "concurrencyLimit": {
          "type": "number",
          "description": "The number of targets, on which the same package is installed at the same time.\n"
        },
        "managementUninstallSoftwarePackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUninstallSoftwarePackage resources.\n",
        "properties": {
          "clusterInstallationSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Installation settings for cluster.cluster_installation_settings blocks are documented below.\n"
          },
          "concurrencyLimit": {
            "type": "number",
            "description": "The number of targets, on which the same package is installed at the same time.\n"
          },
          "managementUninstallSoftwarePackageId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the software package.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUnlockAdministrator:ManagementUnlockAdministrator": {
      "properties": {
        "managementUnlockAdministratorId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUnlockAdministratorId",
        "name"
      ],
      "inputProperties": {
        "managementUnlockAdministratorId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUnlockAdministrator resources.\n",
        "properties": {
          "managementUnlockAdministratorId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUpdateProvisionedSatellites:ManagementUpdateProvisionedSatellites": {
      "properties": {
        "managementUpdateProvisionedSatellitesId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Command asynchronous task unique identifier."
        },
        "vpnCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier. The targets should be a corporate gateways.vpn_center_gateways blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUpdateProvisionedSatellitesId",
        "taskId",
        "vpnCenterGateways"
      ],
      "inputProperties": {
        "managementUpdateProvisionedSatellitesId": {
          "type": "string"
        },
        "vpnCenterGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier. The targets should be a corporate gateways.vpn_center_gateways blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "vpnCenterGateways"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUpdateProvisionedSatellites resources.\n",
        "properties": {
          "managementUpdateProvisionedSatellitesId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Command asynchronous task unique identifier."
          },
          "vpnCenterGateways": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier. The targets should be a corporate gateways.vpn_center_gateways blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUpdateUpdatableObjectsRepositoryContent:ManagementUpdateUpdatableObjectsRepositoryContent": {
      "properties": {
        "managementUpdateUpdatableObjectsRepositoryContentId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUpdateUpdatableObjectsRepositoryContentId",
        "taskId"
      ],
      "inputProperties": {
        "managementUpdateUpdatableObjectsRepositoryContentId": {
          "type": "string"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUpdateUpdatableObjectsRepositoryContent resources.\n",
        "properties": {
          "managementUpdateUpdatableObjectsRepositoryContentId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUser:ManagementUser": {
      "description": "This resource allows you to execute Check Point User.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementUser(\"example\", {\n    name: \"myuser\",\n    email: \"myuser@email.com\",\n    expirationDate: \"2030-05-30\",\n    phoneNumber: \"0501112233\",\n    authenticationMethod: \"securid\",\n    connectDaily: true,\n    fromHour: \"08:00\",\n    toHour: \"17:00\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementUser(\"example\",\n    name=\"myuser\",\n    email=\"myuser@email.com\",\n    expiration_date=\"2030-05-30\",\n    phone_number=\"0501112233\",\n    authentication_method=\"securid\",\n    connect_daily=True,\n    from_hour=\"08:00\",\n    to_hour=\"17:00\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementUser(\"example\", new()\n    {\n        Name = \"myuser\",\n        Email = \"myuser@email.com\",\n        ExpirationDate = \"2030-05-30\",\n        PhoneNumber = \"0501112233\",\n        AuthenticationMethod = \"securid\",\n        ConnectDaily = true,\n        FromHour = \"08:00\",\n        ToHour = \"17:00\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementUser(ctx, \"example\", &checkpoint.ManagementUserArgs{\n\t\t\tName:                 pulumi.String(\"myuser\"),\n\t\t\tEmail:                pulumi.String(\"myuser@email.com\"),\n\t\t\tExpirationDate:       pulumi.String(\"2030-05-30\"),\n\t\t\tPhoneNumber:          pulumi.String(\"0501112233\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"securid\"),\n\t\t\tConnectDaily:         pulumi.Bool(true),\n\t\t\tFromHour:             pulumi.String(\"08:00\"),\n\t\t\tToHour:               pulumi.String(\"17:00\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementUser;\nimport com.pulumi.checkpoint.ManagementUserArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementUser(\"example\", ManagementUserArgs.builder()\n            .name(\"myuser\")\n            .email(\"myuser@email.com\")\n            .expirationDate(\"2030-05-30\")\n            .phoneNumber(\"0501112233\")\n            .authenticationMethod(\"securid\")\n            .connectDaily(true)\n            .fromHour(\"08:00\")\n            .toHour(\"17:00\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementUser\n    properties:\n      name: myuser\n      email: myuser@email.com\n      expirationDate: 2030-05-30\n      phoneNumber: '0501112233'\n      authenticationMethod: securid\n      connectDaily: true\n      fromHour: 08:00\n      toHour: 17:00\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowedLocations": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User allowed locations.<span pulumi-lang-nodejs=\" allowedLocations \" pulumi-lang-dotnet=\" AllowedLocations \" pulumi-lang-go=\" allowedLocations \" pulumi-lang-python=\" allowed_locations \" pulumi-lang-yaml=\" allowedLocations \" pulumi-lang-java=\" allowedLocations \"> allowed_locations </span>blocks are documented below.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "connectDaily": {
          "type": "boolean",
          "description": "Connect every day.\n"
        },
        "connectOnDays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days users allow to connect.\n"
        },
        "email": {
          "type": "string",
          "description": "User email.\n"
        },
        "encryption": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User encryption. encryption blocks are documented below.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Expiration date in format: yyyy-MM-dd.\n"
        },
        "fromHour": {
          "type": "string",
          "description": "Allow users connect from hour.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementUserId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Checkpoint password authentication method identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"Check Point Password\".\n",
          "secret": true
        },
        "phoneNumber": {
          "type": "string",
          "description": "User phone number.\n"
        },
        "radiusServer": {
          "type": "string",
          "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
        },
        "tacacsServer": {
          "type": "string",
          "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "template": {
          "type": "string",
          "description": "User template name or UID.\n"
        },
        "toHour": {
          "type": "string",
          "description": "Allow users connect until hour.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUserId",
        "name"
      ],
      "inputProperties": {
        "allowedLocations": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User allowed locations.<span pulumi-lang-nodejs=\" allowedLocations \" pulumi-lang-dotnet=\" AllowedLocations \" pulumi-lang-go=\" allowedLocations \" pulumi-lang-python=\" allowed_locations \" pulumi-lang-yaml=\" allowedLocations \" pulumi-lang-java=\" allowedLocations \"> allowed_locations </span>blocks are documented below.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "connectDaily": {
          "type": "boolean",
          "description": "Connect every day.\n"
        },
        "connectOnDays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days users allow to connect.\n"
        },
        "email": {
          "type": "string",
          "description": "User email.\n"
        },
        "encryption": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User encryption. encryption blocks are documented below.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Expiration date in format: yyyy-MM-dd.\n"
        },
        "fromHour": {
          "type": "string",
          "description": "Allow users connect from hour.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementUserId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Checkpoint password authentication method identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"Check Point Password\".\n",
          "secret": true
        },
        "phoneNumber": {
          "type": "string",
          "description": "User phone number.\n"
        },
        "radiusServer": {
          "type": "string",
          "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
        },
        "tacacsServer": {
          "type": "string",
          "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "template": {
          "type": "string",
          "description": "User template name or UID.\n"
        },
        "toHour": {
          "type": "string",
          "description": "Allow users connect until hour.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUser resources.\n",
        "properties": {
          "allowedLocations": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "User allowed locations.<span pulumi-lang-nodejs=\" allowedLocations \" pulumi-lang-dotnet=\" AllowedLocations \" pulumi-lang-go=\" allowedLocations \" pulumi-lang-python=\" allowed_locations \" pulumi-lang-yaml=\" allowedLocations \" pulumi-lang-java=\" allowedLocations \"> allowed_locations </span>blocks are documented below.\n"
          },
          "authenticationMethod": {
            "type": "string",
            "description": "Authentication method.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "connectDaily": {
            "type": "boolean",
            "description": "Connect every day.\n"
          },
          "connectOnDays": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Days users allow to connect.\n"
          },
          "email": {
            "type": "string",
            "description": "User email.\n"
          },
          "encryption": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "User encryption. encryption blocks are documented below.\n"
          },
          "expirationDate": {
            "type": "string",
            "description": "Expiration date in format: yyyy-MM-dd.\n"
          },
          "fromHour": {
            "type": "string",
            "description": "Allow users connect from hour.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementUserId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Checkpoint password authentication method identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"Check Point Password\".\n",
            "secret": true
          },
          "phoneNumber": {
            "type": "string",
            "description": "User phone number.\n"
          },
          "radiusServer": {
            "type": "string",
            "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
          },
          "tacacsServer": {
            "type": "string",
            "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "template": {
            "type": "string",
            "description": "User template name or UID.\n"
          },
          "toHour": {
            "type": "string",
            "description": "Allow users connect until hour.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUserGroup:ManagementUserGroup": {
      "description": "This resource allows you to execute Check Point User Group.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementUserGroup(\"example\", {\n    name: \"myusergroup\",\n    email: \"myusergroup@email.com\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementUserGroup(\"example\",\n    name=\"myusergroup\",\n    email=\"myusergroup@email.com\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementUserGroup(\"example\", new()\n    {\n        Name = \"myusergroup\",\n        Email = \"myusergroup@email.com\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementUserGroup(ctx, \"example\", &checkpoint.ManagementUserGroupArgs{\n\t\t\tName:  pulumi.String(\"myusergroup\"),\n\t\t\tEmail: pulumi.String(\"myusergroup@email.com\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementUserGroup;\nimport com.pulumi.checkpoint.ManagementUserGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementUserGroup(\"example\", ManagementUserGroupArgs.builder()\n            .name(\"myusergroup\")\n            .email(\"myusergroup@email.com\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementUserGroup\n    properties:\n      name: myusergroup\n      email: myusergroup@email.com\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "email": {
          "type": "string",
          "description": "Email Address.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementUserGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of User Group objects identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUserGroupId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "email": {
          "type": "string",
          "description": "Email Address.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementUserGroupId": {
          "type": "string"
        },
        "members": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of User Group objects identified by the name or UID.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUserGroup resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "email": {
            "type": "string",
            "description": "Email Address.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementUserGroupId": {
            "type": "string"
          },
          "members": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of User Group objects identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementUserTemplate:ManagementUserTemplate": {
      "description": "This resource allows you to execute Check Point User Template.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementUserTemplate(\"example\", {\n    name: \"myusertemplate\",\n    expirationDate: \"2030-05-30\",\n    expirationByGlobalProperties: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementUserTemplate(\"example\",\n    name=\"myusertemplate\",\n    expiration_date=\"2030-05-30\",\n    expiration_by_global_properties=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementUserTemplate(\"example\", new()\n    {\n        Name = \"myusertemplate\",\n        ExpirationDate = \"2030-05-30\",\n        ExpirationByGlobalProperties = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementUserTemplate(ctx, \"example\", &checkpoint.ManagementUserTemplateArgs{\n\t\t\tName:                         pulumi.String(\"myusertemplate\"),\n\t\t\tExpirationDate:               pulumi.String(\"2030-05-30\"),\n\t\t\tExpirationByGlobalProperties: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementUserTemplate;\nimport com.pulumi.checkpoint.ManagementUserTemplateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementUserTemplate(\"example\", ManagementUserTemplateArgs.builder()\n            .name(\"myusertemplate\")\n            .expirationDate(\"2030-05-30\")\n            .expirationByGlobalProperties(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementUserTemplate\n    properties:\n      name: myusertemplate\n      expirationDate: 2030-05-30\n      expirationByGlobalProperties: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "allowedLocations": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User allowed locations.<span pulumi-lang-nodejs=\" allowedLocations \" pulumi-lang-dotnet=\" AllowedLocations \" pulumi-lang-go=\" allowedLocations \" pulumi-lang-python=\" allowed_locations \" pulumi-lang-yaml=\" allowedLocations \" pulumi-lang-java=\" allowedLocations \"> allowed_locations </span>blocks are documented below.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "connectDaily": {
          "type": "boolean",
          "description": "Connect every day.\n"
        },
        "connectOnDays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days users allow to connect.\n"
        },
        "encryption": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User encryption. encryption blocks are documented below.\n"
        },
        "expirationByGlobalProperties": {
          "type": "boolean",
          "description": "Expiration date according to global properties.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Expiration date in format: yyyy-MM-dd.\n"
        },
        "fromHour": {
          "type": "string",
          "description": "Allow users connect from hour.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementUserTemplateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "radiusServer": {
          "type": "string",
          "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
        },
        "tacacsServer": {
          "type": "string",
          "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "toHour": {
          "type": "string",
          "description": "Allow users connect until hour.\n"
        }
      },
      "type": "object",
      "required": [
        "managementUserTemplateId",
        "name"
      ],
      "inputProperties": {
        "allowedLocations": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User allowed locations.<span pulumi-lang-nodejs=\" allowedLocations \" pulumi-lang-dotnet=\" AllowedLocations \" pulumi-lang-go=\" allowedLocations \" pulumi-lang-python=\" allowed_locations \" pulumi-lang-yaml=\" allowedLocations \" pulumi-lang-java=\" allowedLocations \"> allowed_locations </span>blocks are documented below.\n"
        },
        "authenticationMethod": {
          "type": "string",
          "description": "Authentication method.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "connectDaily": {
          "type": "boolean",
          "description": "Connect every day.\n"
        },
        "connectOnDays": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Days users allow to connect.\n"
        },
        "encryption": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "User encryption. encryption blocks are documented below.\n"
        },
        "expirationByGlobalProperties": {
          "type": "boolean",
          "description": "Expiration date according to global properties.\n"
        },
        "expirationDate": {
          "type": "string",
          "description": "Expiration date in format: yyyy-MM-dd.\n"
        },
        "fromHour": {
          "type": "string",
          "description": "Allow users connect from hour.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementUserTemplateId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "radiusServer": {
          "type": "string",
          "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
        },
        "tacacsServer": {
          "type": "string",
          "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "toHour": {
          "type": "string",
          "description": "Allow users connect until hour.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementUserTemplate resources.\n",
        "properties": {
          "allowedLocations": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "User allowed locations.<span pulumi-lang-nodejs=\" allowedLocations \" pulumi-lang-dotnet=\" AllowedLocations \" pulumi-lang-go=\" allowedLocations \" pulumi-lang-python=\" allowed_locations \" pulumi-lang-yaml=\" allowedLocations \" pulumi-lang-java=\" allowedLocations \"> allowed_locations </span>blocks are documented below.\n"
          },
          "authenticationMethod": {
            "type": "string",
            "description": "Authentication method.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "connectDaily": {
            "type": "boolean",
            "description": "Connect every day.\n"
          },
          "connectOnDays": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Days users allow to connect.\n"
          },
          "encryption": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "User encryption. encryption blocks are documented below.\n"
          },
          "expirationByGlobalProperties": {
            "type": "boolean",
            "description": "Expiration date according to global properties.\n"
          },
          "expirationDate": {
            "type": "string",
            "description": "Expiration date in format: yyyy-MM-dd.\n"
          },
          "fromHour": {
            "type": "string",
            "description": "Allow users connect from hour.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementUserTemplateId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "radiusServer": {
            "type": "string",
            "description": "RADIUS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"RADIUS\".\n"
          },
          "tacacsServer": {
            "type": "string",
            "description": "TACACS server object identified by the name or UID. Must be set when \"authentication-method\" was selected to be \"TACACS\".\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "toHour": {
            "type": "string",
            "description": "Allow users connect until hour.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVerifyPolicy:ManagementVerifyPolicy": {
      "properties": {
        "managementVerifyPolicyId": {
          "type": "string"
        },
        "policyPackage": {
          "type": "string",
          "description": "Policy package identified by the name or UID.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVerifyPolicyId",
        "policyPackage",
        "taskId"
      ],
      "inputProperties": {
        "managementVerifyPolicyId": {
          "type": "string"
        },
        "policyPackage": {
          "type": "string",
          "description": "Policy package identified by the name or UID.\n"
        }
      },
      "requiredInputs": [
        "policyPackage"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVerifyPolicy resources.\n",
        "properties": {
          "managementVerifyPolicyId": {
            "type": "string"
          },
          "policyPackage": {
            "type": "string",
            "description": "Policy package identified by the name or UID.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVerifyRevert:ManagementVerifyRevert": {
      "properties": {
        "managementVerifyRevertId": {
          "type": "string"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        },
        "toSession": {
          "type": "string",
          "description": "Session unique identifier. Specify the session you would like to verify a revert operation to.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVerifyRevertId",
        "taskId",
        "toSession"
      ],
      "inputProperties": {
        "managementVerifyRevertId": {
          "type": "string"
        },
        "toSession": {
          "type": "string",
          "description": "Session unique identifier. Specify the session you would like to verify a revert operation to.\n"
        }
      },
      "requiredInputs": [
        "toSession"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVerifyRevert resources.\n",
        "properties": {
          "managementVerifyRevertId": {
            "type": "string"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          },
          "toSession": {
            "type": "string",
            "description": "Session unique identifier. Specify the session you would like to verify a revert operation to.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVerifySoftwarePackage:ManagementVerifySoftwarePackage": {
      "properties": {
        "concurrencyLimit": {
          "type": "number",
          "description": "The number of targets, on which the same package is installed at the same time.\n"
        },
        "managementVerifySoftwarePackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Asynchronous task unique identifier.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVerifySoftwarePackageId",
        "name",
        "targets",
        "taskId"
      ],
      "inputProperties": {
        "concurrencyLimit": {
          "type": "number",
          "description": "The number of targets, on which the same package is installed at the same time.\n"
        },
        "managementVerifySoftwarePackageId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "The name of the software package.\n"
        },
        "targets": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "targets"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVerifySoftwarePackage resources.\n",
        "properties": {
          "concurrencyLimit": {
            "type": "number",
            "description": "The number of targets, on which the same package is installed at the same time.\n"
          },
          "managementVerifySoftwarePackageId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the software package.\n"
          },
          "targets": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "On what targets to execute this command. Targets may be identified by their name, or object unique identifier.targets blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Asynchronous task unique identifier.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVmwareDataCenterServer:ManagementVmwareDataCenterServer": {
      "description": "This resource allows you to execute Check Point VMware Data Center Server.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testVMware = new checkpoint.ManagementVmwareDataCenterServer(\"testVMware\", {\n    name: \"MyVMware\",\n    type: \"vcenter\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_v_mware = checkpoint.ManagementVmwareDataCenterServer(\"testVMware\",\n    name=\"MyVMware\",\n    type=\"vcenter\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testVMware = new Checkpoint.ManagementVmwareDataCenterServer(\"testVMware\", new()\n    {\n        Name = \"MyVMware\",\n        Type = \"vcenter\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVmwareDataCenterServer(ctx, \"testVMware\", &checkpoint.ManagementVmwareDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyVMware\"),\n\t\t\tType:     pulumi.String(\"vcenter\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tHostname: pulumi.String(\"HOSTNAME\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVmwareDataCenterServer;\nimport com.pulumi.checkpoint.ManagementVmwareDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testVMware = new ManagementVmwareDataCenterServer(\"testVMware\", ManagementVmwareDataCenterServerArgs.builder()\n            .name(\"MyVMware\")\n            .type(\"vcenter\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testVMware:\n    type: checkpoint:ManagementVmwareDataCenterServer\n    properties:\n      name: MyVMware\n      type: vcenter\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\n```\n<!--End PulumiCodeChooser -->\n<br><br>\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testNsxt = new checkpoint.ManagementVmwareDataCenterServer(\"testNsxt\", {\n    name: \"MyNSXT\",\n    type: \"nsxt\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n    policyMode: false,\n    importVms: false,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_nsxt = checkpoint.ManagementVmwareDataCenterServer(\"testNsxt\",\n    name=\"MyNSXT\",\n    type=\"nsxt\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\",\n    policy_mode=False,\n    import_vms=False)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var testNsxt = new Checkpoint.ManagementVmwareDataCenterServer(\"testNsxt\", new()\n    {\n        Name = \"MyNSXT\",\n        Type = \"nsxt\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n        PolicyMode = false,\n        ImportVms = false,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVmwareDataCenterServer(ctx, \"testNsxt\", &checkpoint.ManagementVmwareDataCenterServerArgs{\n\t\t\tName:       pulumi.String(\"MyNSXT\"),\n\t\t\tType:       pulumi.String(\"nsxt\"),\n\t\t\tUsername:   pulumi.String(\"USERNAME\"),\n\t\t\tPassword:   pulumi.String(\"PASSWORD\"),\n\t\t\tHostname:   pulumi.String(\"HOSTNAME\"),\n\t\t\tPolicyMode: pulumi.Bool(false),\n\t\t\tImportVms:  pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVmwareDataCenterServer;\nimport com.pulumi.checkpoint.ManagementVmwareDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testNsxt = new ManagementVmwareDataCenterServer(\"testNsxt\", ManagementVmwareDataCenterServerArgs.builder()\n            .name(\"MyNSXT\")\n            .type(\"nsxt\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .policyMode(false)\n            .importVms(false)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testNsxt:\n    type: checkpoint:ManagementVmwareDataCenterServer\n    properties:\n      name: MyNSXT\n      type: nsxt\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\n      policyMode: false\n      importVms: false\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP Address or hostname of the VMware server.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "importVms": {
          "type": "boolean",
          "description": "for **NSX-T** only and false at default.<br>When set to true, the Data Center Server will import Virtual Machines as well.<br>This feature will create additional API requests toward NSX-T manager.<br><u>Note</u>: importing Virtual Machines can only be enabled while using Policy Mode APIs.\n"
        },
        "managementVmwareDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the VMware server.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the VMware server encoded in Base64.\n",
          "secret": true
        },
        "policyMode": {
          "type": "boolean",
          "description": "for **NSX-T** only and false at default.<br>When set to false, the Data Center Server will use Manager Mode APIs. <br>When set to true, the Data Center Server will use Policy Mode APIs.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type. nsx or nsxt or globalnsxt or vcenter.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the VMware server.\n",
          "secret": true
        }
      },
      "type": "object",
      "required": [
        "hostname",
        "managementVmwareDataCenterServerId",
        "name",
        "type",
        "username"
      ],
      "inputProperties": {
        "certificateFingerprint": {
          "type": "string",
          "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "hostname": {
          "type": "string",
          "description": "IP Address or hostname of the VMware server.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "importVms": {
          "type": "boolean",
          "description": "for **NSX-T** only and false at default.<br>When set to true, the Data Center Server will import Virtual Machines as well.<br>This feature will create additional API requests toward NSX-T manager.<br><u>Note</u>: importing Virtual Machines can only be enabled while using Policy Mode APIs.\n"
        },
        "managementVmwareDataCenterServerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "password": {
          "type": "string",
          "description": "Password of the VMware server.\n",
          "secret": true
        },
        "passwordBase64": {
          "type": "string",
          "description": "Password of the VMware server encoded in Base64.\n",
          "secret": true
        },
        "policyMode": {
          "type": "boolean",
          "description": "for **NSX-T** only and false at default.<br>When set to false, the Data Center Server will use Manager Mode APIs. <br>When set to true, the Data Center Server will use Policy Mode APIs.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers. tags blocks are documented below.\n"
        },
        "type": {
          "type": "string",
          "description": "Object type. nsx or nsxt or globalnsxt or vcenter.\n"
        },
        "unsafeAutoAccept": {
          "type": "boolean",
          "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
        },
        "username": {
          "type": "string",
          "description": "Username of the VMware server.\n",
          "secret": true
        }
      },
      "requiredInputs": [
        "hostname",
        "type",
        "username"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVmwareDataCenterServer resources.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string",
            "description": "Specify the SHA-1 or SHA-256 fingerprint of the Data Center Server's certificate.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "hostname": {
            "type": "string",
            "description": "IP Address or hostname of the VMware server.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "importVms": {
            "type": "boolean",
            "description": "for **NSX-T** only and false at default.<br>When set to true, the Data Center Server will import Virtual Machines as well.<br>This feature will create additional API requests toward NSX-T manager.<br><u>Note</u>: importing Virtual Machines can only be enabled while using Policy Mode APIs.\n"
          },
          "managementVmwareDataCenterServerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "password": {
            "type": "string",
            "description": "Password of the VMware server.\n",
            "secret": true
          },
          "passwordBase64": {
            "type": "string",
            "description": "Password of the VMware server encoded in Base64.\n",
            "secret": true
          },
          "policyMode": {
            "type": "boolean",
            "description": "for **NSX-T** only and false at default.<br>When set to false, the Data Center Server will use Manager Mode APIs. <br>When set to true, the Data Center Server will use Policy Mode APIs.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers. tags blocks are documented below.\n"
          },
          "type": {
            "type": "string",
            "description": "Object type. nsx or nsxt or globalnsxt or vcenter.\n"
          },
          "unsafeAutoAccept": {
            "type": "boolean",
            "description": "When set to false, the current Data Center Server's certificate should be trusted, either by providing the certificate-fingerprint argument or by relying on a previously trusted certificate of this hostname. When set to true, trust the current Data Center Server's certificate as-is.\n"
          },
          "username": {
            "type": "string",
            "description": "Username of the VMware server.\n",
            "secret": true
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVoipDomainH323Gatekeeper:ManagementVoipDomainH323Gatekeeper": {
      "description": "This resource allows you to execute Check Point Voip Domain H323 Gatekeeper.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVoipDomainH323Gatekeeper(\"example\", {\n    name: \"vdhg1\",\n    endpointsDomain: \"new_group\",\n    installedAt: \"test_host\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVoipDomainH323Gatekeeper(\"example\",\n    name=\"vdhg1\",\n    endpoints_domain=\"new_group\",\n    installed_at=\"test_host\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVoipDomainH323Gatekeeper(\"example\", new()\n    {\n        Name = \"vdhg1\",\n        EndpointsDomain = \"new_group\",\n        InstalledAt = \"test_host\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVoipDomainH323Gatekeeper(ctx, \"example\", &checkpoint.ManagementVoipDomainH323GatekeeperArgs{\n\t\t\tName:            pulumi.String(\"vdhg1\"),\n\t\t\tEndpointsDomain: pulumi.String(\"new_group\"),\n\t\t\tInstalledAt:     pulumi.String(\"test_host\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVoipDomainH323Gatekeeper;\nimport com.pulumi.checkpoint.ManagementVoipDomainH323GatekeeperArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVoipDomainH323Gatekeeper(\"example\", ManagementVoipDomainH323GatekeeperArgs.builder()\n            .name(\"vdhg1\")\n            .endpointsDomain(\"new_group\")\n            .installedAt(\"test_host\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVoipDomainH323Gatekeeper\n    properties:\n      name: vdhg1\n      endpointsDomain: new_group\n      installedAt: test_host\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainH323GatekeeperId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "routingMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVoipDomainH323GatekeeperRoutingMode:ManagementVoipDomainH323GatekeeperRoutingMode",
          "description": "The routing mode of the VoIP Domain H323 gatekeeper.<span pulumi-lang-nodejs=\" routingMode \" pulumi-lang-dotnet=\" RoutingMode \" pulumi-lang-go=\" routingMode \" pulumi-lang-python=\" routing_mode \" pulumi-lang-yaml=\" routingMode \" pulumi-lang-java=\" routingMode \"> routing_mode </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVoipDomainH323GatekeeperId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainH323GatekeeperId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "routingMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVoipDomainH323GatekeeperRoutingMode:ManagementVoipDomainH323GatekeeperRoutingMode",
          "description": "The routing mode of the VoIP Domain H323 gatekeeper.<span pulumi-lang-nodejs=\" routingMode \" pulumi-lang-dotnet=\" RoutingMode \" pulumi-lang-go=\" routingMode \" pulumi-lang-python=\" routing_mode \" pulumi-lang-yaml=\" routingMode \" pulumi-lang-java=\" routingMode \"> routing_mode </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVoipDomainH323Gatekeeper resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "endpointsDomain": {
            "type": "string",
            "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installedAt": {
            "type": "string",
            "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
          },
          "managementVoipDomainH323GatekeeperId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "routingMode": {
            "$ref": "#/types/checkpoint:index%2FManagementVoipDomainH323GatekeeperRoutingMode:ManagementVoipDomainH323GatekeeperRoutingMode",
            "description": "The routing mode of the VoIP Domain H323 gatekeeper.<span pulumi-lang-nodejs=\" routingMode \" pulumi-lang-dotnet=\" RoutingMode \" pulumi-lang-go=\" routingMode \" pulumi-lang-python=\" routing_mode \" pulumi-lang-yaml=\" routingMode \" pulumi-lang-java=\" routingMode \"> routing_mode </span>blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVoipDomainH323Gateway:ManagementVoipDomainH323Gateway": {
      "description": "This resource allows you to execute Check Point Voip Domain H323 Gateway.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVoipDomainH323Gateway(\"example\", {\n    name: \"vdhgw1\",\n    endpointsDomain: \"new_group\",\n    installedAt: \"test_host\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVoipDomainH323Gateway(\"example\",\n    name=\"vdhgw1\",\n    endpoints_domain=\"new_group\",\n    installed_at=\"test_host\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVoipDomainH323Gateway(\"example\", new()\n    {\n        Name = \"vdhgw1\",\n        EndpointsDomain = \"new_group\",\n        InstalledAt = \"test_host\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVoipDomainH323Gateway(ctx, \"example\", &checkpoint.ManagementVoipDomainH323GatewayArgs{\n\t\t\tName:            pulumi.String(\"vdhgw1\"),\n\t\t\tEndpointsDomain: pulumi.String(\"new_group\"),\n\t\t\tInstalledAt:     pulumi.String(\"test_host\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVoipDomainH323Gateway;\nimport com.pulumi.checkpoint.ManagementVoipDomainH323GatewayArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVoipDomainH323Gateway(\"example\", ManagementVoipDomainH323GatewayArgs.builder()\n            .name(\"vdhgw1\")\n            .endpointsDomain(\"new_group\")\n            .installedAt(\"test_host\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVoipDomainH323Gateway\n    properties:\n      name: vdhgw1\n      endpointsDomain: new_group\n      installedAt: test_host\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainH323GatewayId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "routingMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVoipDomainH323GatewayRoutingMode:ManagementVoipDomainH323GatewayRoutingMode",
          "description": "The routing mode of the VoIP Domain H323 gateway.routing_mode blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVoipDomainH323GatewayId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainH323GatewayId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "routingMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVoipDomainH323GatewayRoutingMode:ManagementVoipDomainH323GatewayRoutingMode",
          "description": "The routing mode of the VoIP Domain H323 gateway.routing_mode blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVoipDomainH323Gateway resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "endpointsDomain": {
            "type": "string",
            "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installedAt": {
            "type": "string",
            "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
          },
          "managementVoipDomainH323GatewayId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "routingMode": {
            "$ref": "#/types/checkpoint:index%2FManagementVoipDomainH323GatewayRoutingMode:ManagementVoipDomainH323GatewayRoutingMode",
            "description": "The routing mode of the VoIP Domain H323 gateway.routing_mode blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVoipDomainMgcpCallAgent:ManagementVoipDomainMgcpCallAgent": {
      "description": "This resource allows you to execute Check Point Voip Domain Mgcp Call Agent.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVoipDomainMgcpCallAgent(\"example\", {\n    name: \"mgcp1\",\n    endpointsDomain: \"new_group\",\n    installedAt: \"test_host\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVoipDomainMgcpCallAgent(\"example\",\n    name=\"mgcp1\",\n    endpoints_domain=\"new_group\",\n    installed_at=\"test_host\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVoipDomainMgcpCallAgent(\"example\", new()\n    {\n        Name = \"mgcp1\",\n        EndpointsDomain = \"new_group\",\n        InstalledAt = \"test_host\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVoipDomainMgcpCallAgent(ctx, \"example\", &checkpoint.ManagementVoipDomainMgcpCallAgentArgs{\n\t\t\tName:            pulumi.String(\"mgcp1\"),\n\t\t\tEndpointsDomain: pulumi.String(\"new_group\"),\n\t\t\tInstalledAt:     pulumi.String(\"test_host\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVoipDomainMgcpCallAgent;\nimport com.pulumi.checkpoint.ManagementVoipDomainMgcpCallAgentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVoipDomainMgcpCallAgent(\"example\", ManagementVoipDomainMgcpCallAgentArgs.builder()\n            .name(\"mgcp1\")\n            .endpointsDomain(\"new_group\")\n            .installedAt(\"test_host\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVoipDomainMgcpCallAgent\n    properties:\n      name: mgcp1\n      endpointsDomain: new_group\n      installedAt: test_host\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainMgcpCallAgentId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVoipDomainMgcpCallAgentId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainMgcpCallAgentId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVoipDomainMgcpCallAgent resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "endpointsDomain": {
            "type": "string",
            "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installedAt": {
            "type": "string",
            "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
          },
          "managementVoipDomainMgcpCallAgentId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVoipDomainSccpCallManager:ManagementVoipDomainSccpCallManager": {
      "description": "This resource allows you to execute Check Point Voip Domain Sccp Call Manager.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVoipDomainSccpCallManager(\"example\", {\n    name: \"sccp1\",\n    endpointsDomain: \"new_group\",\n    installedAt: \"test_host\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVoipDomainSccpCallManager(\"example\",\n    name=\"sccp1\",\n    endpoints_domain=\"new_group\",\n    installed_at=\"test_host\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVoipDomainSccpCallManager(\"example\", new()\n    {\n        Name = \"sccp1\",\n        EndpointsDomain = \"new_group\",\n        InstalledAt = \"test_host\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVoipDomainSccpCallManager(ctx, \"example\", &checkpoint.ManagementVoipDomainSccpCallManagerArgs{\n\t\t\tName:            pulumi.String(\"sccp1\"),\n\t\t\tEndpointsDomain: pulumi.String(\"new_group\"),\n\t\t\tInstalledAt:     pulumi.String(\"test_host\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVoipDomainSccpCallManager;\nimport com.pulumi.checkpoint.ManagementVoipDomainSccpCallManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVoipDomainSccpCallManager(\"example\", ManagementVoipDomainSccpCallManagerArgs.builder()\n            .name(\"sccp1\")\n            .endpointsDomain(\"new_group\")\n            .installedAt(\"test_host\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVoipDomainSccpCallManager\n    properties:\n      name: sccp1\n      endpointsDomain: new_group\n      installedAt: test_host\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainSccpCallManagerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVoipDomainSccpCallManagerId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainSccpCallManagerId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVoipDomainSccpCallManager resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "endpointsDomain": {
            "type": "string",
            "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installedAt": {
            "type": "string",
            "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
          },
          "managementVoipDomainSccpCallManagerId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVoipDomainSipProxy:ManagementVoipDomainSipProxy": {
      "description": "This resource allows you to execute Check Point Voip Domain Sip Proxy.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVoipDomainSipProxy(\"example\", {\n    name: \"sip1\",\n    endpointsDomain: \"new_group\",\n    installedAt: \"test_host\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVoipDomainSipProxy(\"example\",\n    name=\"sip1\",\n    endpoints_domain=\"new_group\",\n    installed_at=\"test_host\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVoipDomainSipProxy(\"example\", new()\n    {\n        Name = \"sip1\",\n        EndpointsDomain = \"new_group\",\n        InstalledAt = \"test_host\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVoipDomainSipProxy(ctx, \"example\", &checkpoint.ManagementVoipDomainSipProxyArgs{\n\t\t\tName:            pulumi.String(\"sip1\"),\n\t\t\tEndpointsDomain: pulumi.String(\"new_group\"),\n\t\t\tInstalledAt:     pulumi.String(\"test_host\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVoipDomainSipProxy;\nimport com.pulumi.checkpoint.ManagementVoipDomainSipProxyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVoipDomainSipProxy(\"example\", ManagementVoipDomainSipProxyArgs.builder()\n            .name(\"sip1\")\n            .endpointsDomain(\"new_group\")\n            .installedAt(\"test_host\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVoipDomainSipProxy\n    properties:\n      name: sip1\n      endpointsDomain: new_group\n      installedAt: test_host\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainSipProxyId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVoipDomainSipProxyId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "endpointsDomain": {
          "type": "string",
          "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "installedAt": {
          "type": "string",
          "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
        },
        "managementVoipDomainSipProxyId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVoipDomainSipProxy resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "endpointsDomain": {
            "type": "string",
            "description": "The related endpoints domain to which the VoIP domain will connect. \nIdentified by name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "installedAt": {
            "type": "string",
            "description": "The machine the VoIP is installed at. \nIdentified by name or UID.\n"
          },
          "managementVoipDomainSipProxyId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVpnCommunityMeshed:ManagementVpnCommunityMeshed": {
      "description": "This resource allows you to execute Check Point Vpn Community Meshed.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVpnCommunityMeshed(\"example\", {\n    name: \"New_VPN_Community_Meshed_1\",\n    encryptionMethod: \"prefer ikev2 but support ikev1\",\n    encryptionSuite: \"custom\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVpnCommunityMeshed(\"example\",\n    name=\"New_VPN_Community_Meshed_1\",\n    encryption_method=\"prefer ikev2 but support ikev1\",\n    encryption_suite=\"custom\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVpnCommunityMeshed(\"example\", new()\n    {\n        Name = \"New_VPN_Community_Meshed_1\",\n        EncryptionMethod = \"prefer ikev2 but support ikev1\",\n        EncryptionSuite = \"custom\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVpnCommunityMeshed(ctx, \"example\", &checkpoint.ManagementVpnCommunityMeshedArgs{\n\t\t\tName:             pulumi.String(\"New_VPN_Community_Meshed_1\"),\n\t\t\tEncryptionMethod: pulumi.String(\"prefer ikev2 but support ikev1\"),\n\t\t\tEncryptionSuite:  pulumi.String(\"custom\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVpnCommunityMeshed;\nimport com.pulumi.checkpoint.ManagementVpnCommunityMeshedArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVpnCommunityMeshed(\"example\", ManagementVpnCommunityMeshedArgs.builder()\n            .name(\"New_VPN_Community_Meshed_1\")\n            .encryptionMethod(\"prefer ikev2 but support ikev1\")\n            .encryptionSuite(\"custom\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVpnCommunityMeshed\n    properties:\n      name: New_VPN_Community_Meshed_1\n      encryptionMethod: prefer ikev2 but support ikev1\n      encryptionSuite: custom\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "advancedProperties": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedAdvancedProperties:ManagementVpnCommunityMeshedAdvancedProperties",
          "description": "Advanced properties.advanced_properties blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "disableNat": {
          "type": "boolean",
          "description": "Indicates whether to disable NAT inside the VPN Community.\n"
        },
        "encryptedTraffic": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedEncryptedTraffic:ManagementVpnCommunityMeshedEncryptedTraffic",
          "description": "Encrypted traffic settings.<span pulumi-lang-nodejs=\" encryptedTraffic \" pulumi-lang-dotnet=\" EncryptedTraffic \" pulumi-lang-go=\" encryptedTraffic \" pulumi-lang-python=\" encrypted_traffic \" pulumi-lang-yaml=\" encryptedTraffic \" pulumi-lang-java=\" encryptedTraffic \"> encrypted_traffic </span>blocks are documented below.\n"
        },
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "excludedServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of services that are excluded from the community identified by the name or UID.<br> Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.excluded_services blocks are documented below.\n"
        },
        "gateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects identified by the name or UID.gateways blocks are documented below.\n"
        },
        "granularEncryptions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedGranularEncryption:ManagementVpnCommunityMeshedGranularEncryption"
          },
          "description": "VPN granular encryption settings.<span pulumi-lang-nodejs=\" granularEncryptions \" pulumi-lang-dotnet=\" GranularEncryptions \" pulumi-lang-go=\" granularEncryptions \" pulumi-lang-python=\" granular_encryptions \" pulumi-lang-yaml=\" granularEncryptions \" pulumi-lang-java=\" granularEncryptions \"> granular_encryptions </span>blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "linkSelectionMode": {
          "type": "string",
          "description": "Link Selection Mode."
        },
        "managementVpnCommunityMeshedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideInterfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideInterface:ManagementVpnCommunityMeshedOverrideInterface"
          },
          "description": "Override the Enhanced Link Selection interfaces for each participant VPN peer."
        },
        "overrideVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideVpnDomain:ManagementVpnCommunityMeshedOverrideVpnDomain"
          },
          "description": "The Overrides VPN Domains of the participants GWs.<span pulumi-lang-nodejs=\" overrideVpnDomains \" pulumi-lang-dotnet=\" OverrideVpnDomains \" pulumi-lang-go=\" overrideVpnDomains \" pulumi-lang-python=\" override_vpn_domains \" pulumi-lang-yaml=\" overrideVpnDomains \" pulumi-lang-java=\" overrideVpnDomains \"> override_vpn_domains </span>blocks are documented below.\n"
        },
        "permanentTunnels": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedPermanentTunnels:ManagementVpnCommunityMeshedPermanentTunnels",
          "description": "Permanent tunnels properties.permanent_tunnels blocks are documented below.\n"
        },
        "routingMode": {
          "type": "string",
          "description": "VPN Community Routing Mode.\n"
        },
        "sharedSecrets": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedSharedSecret:ManagementVpnCommunityMeshedSharedSecret"
          },
          "description": "Shared secrets for external gateways.<span pulumi-lang-nodejs=\" sharedSecrets \" pulumi-lang-dotnet=\" SharedSecrets \" pulumi-lang-go=\" sharedSecrets \" pulumi-lang-python=\" shared_secrets \" pulumi-lang-yaml=\" sharedSecrets \" pulumi-lang-java=\" sharedSecrets \"> shared_secrets </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "tunnelGranularity": {
          "type": "string",
          "description": "VPN tunnel sharing option to be used.\n"
        },
        "useSharedSecret": {
          "type": "boolean",
          "description": "Indicates whether the shared secret should be used for all external gateways.\n"
        },
        "wireMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedWireMode:ManagementVpnCommunityMeshedWireMode",
          "description": "VPN Community Wire mode properties.wire_mode blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVpnCommunityMeshedId",
        "name"
      ],
      "inputProperties": {
        "advancedProperties": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedAdvancedProperties:ManagementVpnCommunityMeshedAdvancedProperties",
          "description": "Advanced properties.advanced_properties blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "disableNat": {
          "type": "boolean",
          "description": "Indicates whether to disable NAT inside the VPN Community.\n"
        },
        "encryptedTraffic": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedEncryptedTraffic:ManagementVpnCommunityMeshedEncryptedTraffic",
          "description": "Encrypted traffic settings.<span pulumi-lang-nodejs=\" encryptedTraffic \" pulumi-lang-dotnet=\" EncryptedTraffic \" pulumi-lang-go=\" encryptedTraffic \" pulumi-lang-python=\" encrypted_traffic \" pulumi-lang-yaml=\" encryptedTraffic \" pulumi-lang-java=\" encryptedTraffic \"> encrypted_traffic </span>blocks are documented below.\n"
        },
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "excludedServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of services that are excluded from the community identified by the name or UID.<br> Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.excluded_services blocks are documented below.\n"
        },
        "gateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects identified by the name or UID.gateways blocks are documented below.\n"
        },
        "granularEncryptions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedGranularEncryption:ManagementVpnCommunityMeshedGranularEncryption"
          },
          "description": "VPN granular encryption settings.<span pulumi-lang-nodejs=\" granularEncryptions \" pulumi-lang-dotnet=\" GranularEncryptions \" pulumi-lang-go=\" granularEncryptions \" pulumi-lang-python=\" granular_encryptions \" pulumi-lang-yaml=\" granularEncryptions \" pulumi-lang-java=\" granularEncryptions \"> granular_encryptions </span>blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "linkSelectionMode": {
          "type": "string",
          "description": "Link Selection Mode."
        },
        "managementVpnCommunityMeshedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideInterfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideInterface:ManagementVpnCommunityMeshedOverrideInterface"
          },
          "description": "Override the Enhanced Link Selection interfaces for each participant VPN peer."
        },
        "overrideVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideVpnDomain:ManagementVpnCommunityMeshedOverrideVpnDomain"
          },
          "description": "The Overrides VPN Domains of the participants GWs.<span pulumi-lang-nodejs=\" overrideVpnDomains \" pulumi-lang-dotnet=\" OverrideVpnDomains \" pulumi-lang-go=\" overrideVpnDomains \" pulumi-lang-python=\" override_vpn_domains \" pulumi-lang-yaml=\" overrideVpnDomains \" pulumi-lang-java=\" overrideVpnDomains \"> override_vpn_domains </span>blocks are documented below.\n"
        },
        "permanentTunnels": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedPermanentTunnels:ManagementVpnCommunityMeshedPermanentTunnels",
          "description": "Permanent tunnels properties.permanent_tunnels blocks are documented below.\n"
        },
        "routingMode": {
          "type": "string",
          "description": "VPN Community Routing Mode.\n"
        },
        "sharedSecrets": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedSharedSecret:ManagementVpnCommunityMeshedSharedSecret"
          },
          "description": "Shared secrets for external gateways.<span pulumi-lang-nodejs=\" sharedSecrets \" pulumi-lang-dotnet=\" SharedSecrets \" pulumi-lang-go=\" sharedSecrets \" pulumi-lang-python=\" shared_secrets \" pulumi-lang-yaml=\" sharedSecrets \" pulumi-lang-java=\" sharedSecrets \"> shared_secrets </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "tunnelGranularity": {
          "type": "string",
          "description": "VPN tunnel sharing option to be used.\n"
        },
        "useSharedSecret": {
          "type": "boolean",
          "description": "Indicates whether the shared secret should be used for all external gateways.\n"
        },
        "wireMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedWireMode:ManagementVpnCommunityMeshedWireMode",
          "description": "VPN Community Wire mode properties.wire_mode blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVpnCommunityMeshed resources.\n",
        "properties": {
          "advancedProperties": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedAdvancedProperties:ManagementVpnCommunityMeshedAdvancedProperties",
            "description": "Advanced properties.advanced_properties blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "disableNat": {
            "type": "boolean",
            "description": "Indicates whether to disable NAT inside the VPN Community.\n"
          },
          "encryptedTraffic": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedEncryptedTraffic:ManagementVpnCommunityMeshedEncryptedTraffic",
            "description": "Encrypted traffic settings.<span pulumi-lang-nodejs=\" encryptedTraffic \" pulumi-lang-dotnet=\" EncryptedTraffic \" pulumi-lang-go=\" encryptedTraffic \" pulumi-lang-python=\" encrypted_traffic \" pulumi-lang-yaml=\" encryptedTraffic \" pulumi-lang-java=\" encryptedTraffic \"> encrypted_traffic </span>blocks are documented below.\n"
          },
          "encryptionMethod": {
            "type": "string",
            "description": "The encryption method to be used.\n"
          },
          "encryptionSuite": {
            "type": "string",
            "description": "The encryption suite to be used.\n"
          },
          "excludedServices": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of services that are excluded from the community identified by the name or UID.<br> Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.excluded_services blocks are documented below.\n"
          },
          "gateways": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Gateway objects identified by the name or UID.gateways blocks are documented below.\n"
          },
          "granularEncryptions": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedGranularEncryption:ManagementVpnCommunityMeshedGranularEncryption"
            },
            "description": "VPN granular encryption settings.<span pulumi-lang-nodejs=\" granularEncryptions \" pulumi-lang-dotnet=\" GranularEncryptions \" pulumi-lang-go=\" granularEncryptions \" pulumi-lang-python=\" granular_encryptions \" pulumi-lang-yaml=\" granularEncryptions \" pulumi-lang-java=\" granularEncryptions \"> granular_encryptions </span>blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ikePhase1": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
          },
          "ikePhase2": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
          },
          "linkSelectionMode": {
            "type": "string",
            "description": "Link Selection Mode."
          },
          "managementVpnCommunityMeshedId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "overrideInterfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideInterface:ManagementVpnCommunityMeshedOverrideInterface"
            },
            "description": "Override the Enhanced Link Selection interfaces for each participant VPN peer."
          },
          "overrideVpnDomains": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedOverrideVpnDomain:ManagementVpnCommunityMeshedOverrideVpnDomain"
            },
            "description": "The Overrides VPN Domains of the participants GWs.<span pulumi-lang-nodejs=\" overrideVpnDomains \" pulumi-lang-dotnet=\" OverrideVpnDomains \" pulumi-lang-go=\" overrideVpnDomains \" pulumi-lang-python=\" override_vpn_domains \" pulumi-lang-yaml=\" overrideVpnDomains \" pulumi-lang-java=\" overrideVpnDomains \"> override_vpn_domains </span>blocks are documented below.\n"
          },
          "permanentTunnels": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedPermanentTunnels:ManagementVpnCommunityMeshedPermanentTunnels",
            "description": "Permanent tunnels properties.permanent_tunnels blocks are documented below.\n"
          },
          "routingMode": {
            "type": "string",
            "description": "VPN Community Routing Mode.\n"
          },
          "sharedSecrets": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedSharedSecret:ManagementVpnCommunityMeshedSharedSecret"
            },
            "description": "Shared secrets for external gateways.<span pulumi-lang-nodejs=\" sharedSecrets \" pulumi-lang-dotnet=\" SharedSecrets \" pulumi-lang-go=\" sharedSecrets \" pulumi-lang-python=\" shared_secrets \" pulumi-lang-yaml=\" sharedSecrets \" pulumi-lang-java=\" sharedSecrets \"> shared_secrets </span>blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "tunnelGranularity": {
            "type": "string",
            "description": "VPN tunnel sharing option to be used.\n"
          },
          "useSharedSecret": {
            "type": "boolean",
            "description": "Indicates whether the shared secret should be used for all external gateways.\n"
          },
          "wireMode": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityMeshedWireMode:ManagementVpnCommunityMeshedWireMode",
            "description": "VPN Community Wire mode properties.wire_mode blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVpnCommunityRemoteAccess:ManagementVpnCommunityRemoteAccess": {
      "description": "This resource allows you to execute Check Point VPN Community Remote Access.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVpnCommunityRemoteAccess(\"example\", {\n    name: \"RemoteAccess\",\n    userGroups: [\"All Users\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVpnCommunityRemoteAccess(\"example\",\n    name=\"RemoteAccess\",\n    user_groups=[\"All Users\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVpnCommunityRemoteAccess(\"example\", new()\n    {\n        Name = \"RemoteAccess\",\n        UserGroups = new[]\n        {\n            \"All Users\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVpnCommunityRemoteAccess(ctx, \"example\", &checkpoint.ManagementVpnCommunityRemoteAccessArgs{\n\t\t\tName: pulumi.String(\"RemoteAccess\"),\n\t\t\tUserGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"All Users\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVpnCommunityRemoteAccess;\nimport com.pulumi.checkpoint.ManagementVpnCommunityRemoteAccessArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVpnCommunityRemoteAccess(\"example\", ManagementVpnCommunityRemoteAccessArgs.builder()\n            .name(\"RemoteAccess\")\n            .userGroups(\"All Users\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVpnCommunityRemoteAccess\n    properties:\n      name: RemoteAccess\n      userGroups:\n        - All Users\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "gateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects identified by the name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementVpnCommunityRemoteAccessId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityRemoteAccessOverrideVpnDomain:ManagementVpnCommunityRemoteAccessOverrideVpnDomain"
          },
          "description": "The Overrides VPN Domains of the participants GWs.<span pulumi-lang-nodejs=\" overrideVpnDomains \" pulumi-lang-dotnet=\" OverrideVpnDomains \" pulumi-lang-go=\" overrideVpnDomains \" pulumi-lang-python=\" override_vpn_domains \" pulumi-lang-yaml=\" overrideVpnDomains \" pulumi-lang-java=\" overrideVpnDomains \"> override_vpn_domains </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "userGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of User group objects identified by the name or UID.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVpnCommunityRemoteAccessId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "gateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects identified by the name or UID.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "managementVpnCommunityRemoteAccessId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityRemoteAccessOverrideVpnDomain:ManagementVpnCommunityRemoteAccessOverrideVpnDomain"
          },
          "description": "The Overrides VPN Domains of the participants GWs.<span pulumi-lang-nodejs=\" overrideVpnDomains \" pulumi-lang-dotnet=\" OverrideVpnDomains \" pulumi-lang-go=\" overrideVpnDomains \" pulumi-lang-python=\" override_vpn_domains \" pulumi-lang-yaml=\" overrideVpnDomains \" pulumi-lang-java=\" overrideVpnDomains \"> override_vpn_domains </span>blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.\n"
        },
        "userGroups": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of User group objects identified by the name or UID.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVpnCommunityRemoteAccess resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "gateways": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Gateway objects identified by the name or UID.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "managementVpnCommunityRemoteAccessId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "overrideVpnDomains": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityRemoteAccessOverrideVpnDomain:ManagementVpnCommunityRemoteAccessOverrideVpnDomain"
            },
            "description": "The Overrides VPN Domains of the participants GWs.<span pulumi-lang-nodejs=\" overrideVpnDomains \" pulumi-lang-dotnet=\" OverrideVpnDomains \" pulumi-lang-go=\" overrideVpnDomains \" pulumi-lang-python=\" override_vpn_domains \" pulumi-lang-yaml=\" overrideVpnDomains \" pulumi-lang-java=\" overrideVpnDomains \"> override_vpn_domains </span>blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.\n"
          },
          "userGroups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of User group objects identified by the name or UID.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVpnCommunityStar:ManagementVpnCommunityStar": {
      "description": "This resource allows you to execute Check Point Vpn Community Star.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementVpnCommunityStar(\"example\", {\n    name: \"New_VPN_Community_Star_1\",\n    encryptionMethod: \"prefer ikev2 but support ikev1\",\n    encryptionSuite: \"custom\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementVpnCommunityStar(\"example\",\n    name=\"New_VPN_Community_Star_1\",\n    encryption_method=\"prefer ikev2 but support ikev1\",\n    encryption_suite=\"custom\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementVpnCommunityStar(\"example\", new()\n    {\n        Name = \"New_VPN_Community_Star_1\",\n        EncryptionMethod = \"prefer ikev2 but support ikev1\",\n        EncryptionSuite = \"custom\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementVpnCommunityStar(ctx, \"example\", &checkpoint.ManagementVpnCommunityStarArgs{\n\t\t\tName:             pulumi.String(\"New_VPN_Community_Star_1\"),\n\t\t\tEncryptionMethod: pulumi.String(\"prefer ikev2 but support ikev1\"),\n\t\t\tEncryptionSuite:  pulumi.String(\"custom\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVpnCommunityStar;\nimport com.pulumi.checkpoint.ManagementVpnCommunityStarArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementVpnCommunityStar(\"example\", ManagementVpnCommunityStarArgs.builder()\n            .name(\"New_VPN_Community_Star_1\")\n            .encryptionMethod(\"prefer ikev2 but support ikev1\")\n            .encryptionSuite(\"custom\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementVpnCommunityStar\n    properties:\n      name: New_VPN_Community_Star_1\n      encryptionMethod: prefer ikev2 but support ikev1\n      encryptionSuite: custom\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "advancedProperties": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarAdvancedProperties:ManagementVpnCommunityStarAdvancedProperties",
          "description": "Advanced properties.advanced_properties blocks are documented below.\n"
        },
        "centerGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects representing center gateways identified by the name or UID.center_gateways blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "disableNat": {
          "type": "boolean",
          "description": "Indicates whether to disable NAT inside the VPN Community.\n"
        },
        "disableNatOn": {
          "type": "string",
          "description": "Indicates on which gateways to disable NAT inside the VPN Community.\n"
        },
        "encryptedTraffic": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarEncryptedTraffic:ManagementVpnCommunityStarEncryptedTraffic",
          "description": "Encrypted traffic settings.<span pulumi-lang-nodejs=\" encryptedTraffic \" pulumi-lang-dotnet=\" EncryptedTraffic \" pulumi-lang-go=\" encryptedTraffic \" pulumi-lang-python=\" encrypted_traffic \" pulumi-lang-yaml=\" encryptedTraffic \" pulumi-lang-java=\" encryptedTraffic \"> encrypted_traffic </span>blocks are documented below.\n"
        },
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "excludedServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of services that are excluded from the community identified by the name or UID.<br> Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.<span pulumi-lang-nodejs=\" excludedServices \" pulumi-lang-dotnet=\" ExcludedServices \" pulumi-lang-go=\" excludedServices \" pulumi-lang-python=\" excluded_services \" pulumi-lang-yaml=\" excludedServices \" pulumi-lang-java=\" excludedServices \"> excluded_services </span>blocks are documented below.\n"
        },
        "granularEncryptions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarGranularEncryption:ManagementVpnCommunityStarGranularEncryption"
          },
          "description": "VPN granular encryption settings.<span pulumi-lang-nodejs=\" granularEncryptions \" pulumi-lang-dotnet=\" GranularEncryptions \" pulumi-lang-go=\" granularEncryptions \" pulumi-lang-python=\" granular_encryptions \" pulumi-lang-yaml=\" granularEncryptions \" pulumi-lang-java=\" granularEncryptions \"> granular_encryptions </span>blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "linkSelectionMode": {
          "type": "string",
          "description": "Link Selection Mode."
        },
        "managementVpnCommunityStarId": {
          "type": "string"
        },
        "mep": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarMep:ManagementVpnCommunityStarMep",
          "description": "Multiple Entry Point properties. mep blocks are documented below.\n"
        },
        "meshCenterGateways": {
          "type": "boolean",
          "description": "Indicates whether the meshed community is in center.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideInterfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideInterface:ManagementVpnCommunityStarOverrideInterface"
          },
          "description": "Override the Enhanced Link Selection interfaces for each participant VPN peer."
        },
        "overrideVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideVpnDomain:ManagementVpnCommunityStarOverrideVpnDomain"
          },
          "description": "The Overrides VPN Domains of the participants GWs.override_vpn_domains blocks are documented below.\n"
        },
        "permanentTunnels": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarPermanentTunnels:ManagementVpnCommunityStarPermanentTunnels",
          "description": "Permanent tunnels properties.<span pulumi-lang-nodejs=\" permanentTunnels \" pulumi-lang-dotnet=\" PermanentTunnels \" pulumi-lang-go=\" permanentTunnels \" pulumi-lang-python=\" permanent_tunnels \" pulumi-lang-yaml=\" permanentTunnels \" pulumi-lang-java=\" permanentTunnels \"> permanent_tunnels </span>blocks are documented below.\n"
        },
        "routingMode": {
          "type": "string",
          "description": "VPN Community Routing Mode.\n"
        },
        "satelliteGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects representing satellite gateways identified by the name or UID.satellite_gateways blocks are documented below.\n"
        },
        "sharedSecrets": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarSharedSecret:ManagementVpnCommunityStarSharedSecret"
          },
          "description": "Shared secrets for external gateways.shared_secrets blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "tunnelGranularity": {
          "type": "string",
          "description": "VPN tunnel sharing option to be used.\n"
        },
        "useSharedSecret": {
          "type": "boolean",
          "description": "Indicates whether the shared secret should be used for all external gateways.\n"
        },
        "vpnRouting": {
          "type": "string",
          "description": "Enable VPN routing to satellites.\n"
        },
        "wireMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarWireMode:ManagementVpnCommunityStarWireMode",
          "description": "VPN Community Wire mode properties.<span pulumi-lang-nodejs=\" wireMode \" pulumi-lang-dotnet=\" WireMode \" pulumi-lang-go=\" wireMode \" pulumi-lang-python=\" wire_mode \" pulumi-lang-yaml=\" wireMode \" pulumi-lang-java=\" wireMode \"> wire_mode </span>blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVpnCommunityStarId",
        "name"
      ],
      "inputProperties": {
        "advancedProperties": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarAdvancedProperties:ManagementVpnCommunityStarAdvancedProperties",
          "description": "Advanced properties.advanced_properties blocks are documented below.\n"
        },
        "centerGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects representing center gateways identified by the name or UID.center_gateways blocks are documented below.\n"
        },
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "disableNat": {
          "type": "boolean",
          "description": "Indicates whether to disable NAT inside the VPN Community.\n"
        },
        "disableNatOn": {
          "type": "string",
          "description": "Indicates on which gateways to disable NAT inside the VPN Community.\n"
        },
        "encryptedTraffic": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarEncryptedTraffic:ManagementVpnCommunityStarEncryptedTraffic",
          "description": "Encrypted traffic settings.<span pulumi-lang-nodejs=\" encryptedTraffic \" pulumi-lang-dotnet=\" EncryptedTraffic \" pulumi-lang-go=\" encryptedTraffic \" pulumi-lang-python=\" encrypted_traffic \" pulumi-lang-yaml=\" encryptedTraffic \" pulumi-lang-java=\" encryptedTraffic \"> encrypted_traffic </span>blocks are documented below.\n"
        },
        "encryptionMethod": {
          "type": "string",
          "description": "The encryption method to be used.\n"
        },
        "encryptionSuite": {
          "type": "string",
          "description": "The encryption suite to be used.\n"
        },
        "excludedServices": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of services that are excluded from the community identified by the name or UID.<br> Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.<span pulumi-lang-nodejs=\" excludedServices \" pulumi-lang-dotnet=\" ExcludedServices \" pulumi-lang-go=\" excludedServices \" pulumi-lang-python=\" excluded_services \" pulumi-lang-yaml=\" excludedServices \" pulumi-lang-java=\" excludedServices \"> excluded_services </span>blocks are documented below.\n"
        },
        "granularEncryptions": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarGranularEncryption:ManagementVpnCommunityStarGranularEncryption"
          },
          "description": "VPN granular encryption settings.<span pulumi-lang-nodejs=\" granularEncryptions \" pulumi-lang-dotnet=\" GranularEncryptions \" pulumi-lang-go=\" granularEncryptions \" pulumi-lang-python=\" granular_encryptions \" pulumi-lang-yaml=\" granularEncryptions \" pulumi-lang-java=\" granularEncryptions \"> granular_encryptions </span>blocks are documented below.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ikePhase1": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
        },
        "ikePhase2": {
          "type": "object",
          "additionalProperties": {
            "type": "string"
          },
          "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
        },
        "linkSelectionMode": {
          "type": "string",
          "description": "Link Selection Mode."
        },
        "managementVpnCommunityStarId": {
          "type": "string"
        },
        "mep": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarMep:ManagementVpnCommunityStarMep",
          "description": "Multiple Entry Point properties. mep blocks are documented below.\n"
        },
        "meshCenterGateways": {
          "type": "boolean",
          "description": "Indicates whether the meshed community is in center.\n"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "overrideInterfaces": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideInterface:ManagementVpnCommunityStarOverrideInterface"
          },
          "description": "Override the Enhanced Link Selection interfaces for each participant VPN peer."
        },
        "overrideVpnDomains": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideVpnDomain:ManagementVpnCommunityStarOverrideVpnDomain"
          },
          "description": "The Overrides VPN Domains of the participants GWs.override_vpn_domains blocks are documented below.\n"
        },
        "permanentTunnels": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarPermanentTunnels:ManagementVpnCommunityStarPermanentTunnels",
          "description": "Permanent tunnels properties.<span pulumi-lang-nodejs=\" permanentTunnels \" pulumi-lang-dotnet=\" PermanentTunnels \" pulumi-lang-go=\" permanentTunnels \" pulumi-lang-python=\" permanent_tunnels \" pulumi-lang-yaml=\" permanentTunnels \" pulumi-lang-java=\" permanentTunnels \"> permanent_tunnels </span>blocks are documented below.\n"
        },
        "routingMode": {
          "type": "string",
          "description": "VPN Community Routing Mode.\n"
        },
        "satelliteGateways": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of Gateway objects representing satellite gateways identified by the name or UID.satellite_gateways blocks are documented below.\n"
        },
        "sharedSecrets": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarSharedSecret:ManagementVpnCommunityStarSharedSecret"
          },
          "description": "Shared secrets for external gateways.shared_secrets blocks are documented below.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        },
        "tunnelGranularity": {
          "type": "string",
          "description": "VPN tunnel sharing option to be used.\n"
        },
        "useSharedSecret": {
          "type": "boolean",
          "description": "Indicates whether the shared secret should be used for all external gateways.\n"
        },
        "vpnRouting": {
          "type": "string",
          "description": "Enable VPN routing to satellites.\n"
        },
        "wireMode": {
          "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarWireMode:ManagementVpnCommunityStarWireMode",
          "description": "VPN Community Wire mode properties.<span pulumi-lang-nodejs=\" wireMode \" pulumi-lang-dotnet=\" WireMode \" pulumi-lang-go=\" wireMode \" pulumi-lang-python=\" wire_mode \" pulumi-lang-yaml=\" wireMode \" pulumi-lang-java=\" wireMode \"> wire_mode </span>blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVpnCommunityStar resources.\n",
        "properties": {
          "advancedProperties": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarAdvancedProperties:ManagementVpnCommunityStarAdvancedProperties",
            "description": "Advanced properties.advanced_properties blocks are documented below.\n"
          },
          "centerGateways": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Gateway objects representing center gateways identified by the name or UID.center_gateways blocks are documented below.\n"
          },
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "disableNat": {
            "type": "boolean",
            "description": "Indicates whether to disable NAT inside the VPN Community.\n"
          },
          "disableNatOn": {
            "type": "string",
            "description": "Indicates on which gateways to disable NAT inside the VPN Community.\n"
          },
          "encryptedTraffic": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarEncryptedTraffic:ManagementVpnCommunityStarEncryptedTraffic",
            "description": "Encrypted traffic settings.<span pulumi-lang-nodejs=\" encryptedTraffic \" pulumi-lang-dotnet=\" EncryptedTraffic \" pulumi-lang-go=\" encryptedTraffic \" pulumi-lang-python=\" encrypted_traffic \" pulumi-lang-yaml=\" encryptedTraffic \" pulumi-lang-java=\" encryptedTraffic \"> encrypted_traffic </span>blocks are documented below.\n"
          },
          "encryptionMethod": {
            "type": "string",
            "description": "The encryption method to be used.\n"
          },
          "encryptionSuite": {
            "type": "string",
            "description": "The encryption suite to be used.\n"
          },
          "excludedServices": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of services that are excluded from the community identified by the name or UID.<br> Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.<span pulumi-lang-nodejs=\" excludedServices \" pulumi-lang-dotnet=\" ExcludedServices \" pulumi-lang-go=\" excludedServices \" pulumi-lang-python=\" excluded_services \" pulumi-lang-yaml=\" excludedServices \" pulumi-lang-java=\" excludedServices \"> excluded_services </span>blocks are documented below.\n"
          },
          "granularEncryptions": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarGranularEncryption:ManagementVpnCommunityStarGranularEncryption"
            },
            "description": "VPN granular encryption settings.<span pulumi-lang-nodejs=\" granularEncryptions \" pulumi-lang-dotnet=\" GranularEncryptions \" pulumi-lang-go=\" granularEncryptions \" pulumi-lang-python=\" granular_encryptions \" pulumi-lang-yaml=\" granularEncryptions \" pulumi-lang-java=\" granularEncryptions \"> granular_encryptions </span>blocks are documented below.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ikePhase1": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Ike Phase 1 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase1 \" pulumi-lang-dotnet=\" IkePhase1 \" pulumi-lang-go=\" ikePhase1 \" pulumi-lang-python=\" ike_phase_1 \" pulumi-lang-yaml=\" ikePhase1 \" pulumi-lang-java=\" ikePhase1 \"> ike_phase_1 </span>blocks are documented below.\n"
          },
          "ikePhase2": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Ike Phase 2 settings. Only applicable when the encryption-suite is set to [custom].<span pulumi-lang-nodejs=\" ikePhase2 \" pulumi-lang-dotnet=\" IkePhase2 \" pulumi-lang-go=\" ikePhase2 \" pulumi-lang-python=\" ike_phase_2 \" pulumi-lang-yaml=\" ikePhase2 \" pulumi-lang-java=\" ikePhase2 \"> ike_phase_2 </span>blocks are documented below.\n"
          },
          "linkSelectionMode": {
            "type": "string",
            "description": "Link Selection Mode."
          },
          "managementVpnCommunityStarId": {
            "type": "string"
          },
          "mep": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarMep:ManagementVpnCommunityStarMep",
            "description": "Multiple Entry Point properties. mep blocks are documented below.\n"
          },
          "meshCenterGateways": {
            "type": "boolean",
            "description": "Indicates whether the meshed community is in center.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "overrideInterfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideInterface:ManagementVpnCommunityStarOverrideInterface"
            },
            "description": "Override the Enhanced Link Selection interfaces for each participant VPN peer."
          },
          "overrideVpnDomains": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarOverrideVpnDomain:ManagementVpnCommunityStarOverrideVpnDomain"
            },
            "description": "The Overrides VPN Domains of the participants GWs.override_vpn_domains blocks are documented below.\n"
          },
          "permanentTunnels": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarPermanentTunnels:ManagementVpnCommunityStarPermanentTunnels",
            "description": "Permanent tunnels properties.<span pulumi-lang-nodejs=\" permanentTunnels \" pulumi-lang-dotnet=\" PermanentTunnels \" pulumi-lang-go=\" permanentTunnels \" pulumi-lang-python=\" permanent_tunnels \" pulumi-lang-yaml=\" permanentTunnels \" pulumi-lang-java=\" permanentTunnels \"> permanent_tunnels </span>blocks are documented below.\n"
          },
          "routingMode": {
            "type": "string",
            "description": "VPN Community Routing Mode.\n"
          },
          "satelliteGateways": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of Gateway objects representing satellite gateways identified by the name or UID.satellite_gateways blocks are documented below.\n"
          },
          "sharedSecrets": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarSharedSecret:ManagementVpnCommunityStarSharedSecret"
            },
            "description": "Shared secrets for external gateways.shared_secrets blocks are documented below.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "tunnelGranularity": {
            "type": "string",
            "description": "VPN tunnel sharing option to be used.\n"
          },
          "useSharedSecret": {
            "type": "boolean",
            "description": "Indicates whether the shared secret should be used for all external gateways.\n"
          },
          "vpnRouting": {
            "type": "string",
            "description": "Enable VPN routing to satellites.\n"
          },
          "wireMode": {
            "$ref": "#/types/checkpoint:index%2FManagementVpnCommunityStarWireMode:ManagementVpnCommunityStarWireMode",
            "description": "VPN Community Wire mode properties.<span pulumi-lang-nodejs=\" wireMode \" pulumi-lang-dotnet=\" WireMode \" pulumi-lang-go=\" wireMode \" pulumi-lang-python=\" wire_mode \" pulumi-lang-yaml=\" wireMode \" pulumi-lang-java=\" wireMode \"> wire_mode </span>blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementVsxProvisioningTool:ManagementVsxProvisioningTool": {
      "properties": {
        "addPhysicalInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddPhysicalInterfaceParams:ManagementVsxProvisioningToolAddPhysicalInterfaceParams",
          "description": "Parameters for the operation to add a physical interface to a VSX gateway or VSX Cluster.add_physical_interface_params blocks are documented below.\n"
        },
        "addRouteParams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddRouteParam:ManagementVsxProvisioningToolAddRouteParam"
          },
          "description": "Parameters for the operation to add a route to a Virtual System or Virtual Router.add_route_params blocks are documented below.\n"
        },
        "addVdInterfaceParams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdInterfaceParam:ManagementVsxProvisioningToolAddVdInterfaceParam"
          },
          "description": "Parameters for the operation to add a new interface to a Virtual Device.add_vd_interface_params blocks are documented below.\n"
        },
        "addVdParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdParams:ManagementVsxProvisioningToolAddVdParams",
          "description": "Parameters for the operation to add a new Virtual Device (VS/VSB/VSW/VR).add_vd_params blocks are documented below.\n"
        },
        "addVsxClusterParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxClusterParams:ManagementVsxProvisioningToolAddVsxClusterParams",
          "description": "Parameters for the operation to add a new VSX Cluster.add_vsx_cluster_params blocks are documented below.\n"
        },
        "addVsxGatewayParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxGatewayParams:ManagementVsxProvisioningToolAddVsxGatewayParams",
          "description": "Parameters for the operation to add a new VSX Gateway.add_vsx_gateway_params blocks are documented below.\n"
        },
        "attachBridgeParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAttachBridgeParams:ManagementVsxProvisioningToolAttachBridgeParams",
          "description": "Parameters for the operation to attach a new bridge interface to a Virtual System.attach_bridge_params blocks are documented below.\n"
        },
        "managementVsxProvisioningToolId": {
          "type": "string"
        },
        "operation": {
          "type": "string",
          "description": "The name of the provisioning operation to run. Each operation has its own specific parameters.<br> The available operations are:<ul><li><i>add-vsx-gateway</i> - Adds a new VSX gateway</li><li><i>add-vsx-cluster</i> - Adds a new VSX cluster*</li><li><i>add-vsx-cluster-member</i> - Adds a new VSX cluster member*</li><li><i>add-vd</i> - Adds a new Virtual Device (VS/VSB/VSW/VR) to a VSX gateway or VSX cluster</li><li><i>add-vd-interface</i> - Adds a new virtual interface to a Virtual Device</li><li><i>add-physical-interface</i> - Adds a physical interface to a VSX gateway or VSX cluster</li><li><i>add-route</i> - Adds a route to a Virtual Device</li><li><i>attach-bridge</i> - Attaches a bridge interface to a Virtual System</li><li><i>remove-vsx</i> - Removes a VSX gateway or VSX cluster</li><li><i>remove-vd</i> - Removes a Virtual Device</li><li><i>remove-vd-interface</i> - Removes an interface from a Virtual Device</li><li><i>remove-physical-interface</i> - Removes a physical interface from a VSX gateway or VSX cluster</li><li><i>remove-route</i> - Removes a route from a Virtual Device</li><li><i>set-vd</i> - Modifies a Virtual Device</li><li><i>set-vd-interface</i> - Modifies an interface on a Virtual Device</li><li><i>set-physical-interface</i> - Modifies a physical interface on a VSX cluster or VSX gateway</li></ul><br> * When adding a VSX Cluster, you must also add at least 2 cluster members<br> * Adding cluster members is only allowed when adding a new VSX cluster<br> * To add members to an existing cluster, use vsx-run-operation.\n"
        },
        "removePhysicalInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemovePhysicalInterfaceParams:ManagementVsxProvisioningToolRemovePhysicalInterfaceParams",
          "description": "Parameters for the operation to remove a physical interface from a VSX (Gateway or Cluster).remove_physical_interface_params blocks are documented below.\n"
        },
        "removeRouteParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveRouteParams:ManagementVsxProvisioningToolRemoveRouteParams",
          "description": "Parameters for the operation to remove a route from a Virtual System or Virtual Router.remove_route_params blocks are documented below.\n"
        },
        "removeVdInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVdInterfaceParams:ManagementVsxProvisioningToolRemoveVdInterfaceParams",
          "description": "Parameters for the operation to remove a logical interface from a Virtual Device.remove_vd_interface_params blocks are documented below.\n"
        },
        "removeVdParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVdParams:ManagementVsxProvisioningToolRemoveVdParams",
          "description": "Parameters for the operation to remove a Virtual Device.remove_vd_params blocks are documented below.\n"
        },
        "removeVsxParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVsxParams:ManagementVsxProvisioningToolRemoveVsxParams",
          "description": "Parameters for the operation to remove a VSX Gateway or VSX Cluster.remove_vsx_params blocks are documented below.\n"
        },
        "setPhysicalInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetPhysicalInterfaceParams:ManagementVsxProvisioningToolSetPhysicalInterfaceParams",
          "description": "Parameters for the operation to change the configuration of a physical interface.set_physical_interface_params blocks are documented below.\n"
        },
        "setVdInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetVdInterfaceParams:ManagementVsxProvisioningToolSetVdInterfaceParams",
          "description": "Parameters for the operation to change the configuration of a logical interface.set_vd_interface_params blocks are documented below.\n"
        },
        "setVdParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetVdParams:ManagementVsxProvisioningToolSetVdParams",
          "description": "Parameters for the operation to change the configuration of a Virtual Device.set_vd_params blocks are documented below.\n"
        },
        "taskId": {
          "type": "string",
          "description": "Operation Task UID.\n"
        }
      },
      "type": "object",
      "required": [
        "managementVsxProvisioningToolId",
        "operation",
        "taskId"
      ],
      "inputProperties": {
        "addPhysicalInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddPhysicalInterfaceParams:ManagementVsxProvisioningToolAddPhysicalInterfaceParams",
          "description": "Parameters for the operation to add a physical interface to a VSX gateway or VSX Cluster.add_physical_interface_params blocks are documented below.\n"
        },
        "addRouteParams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddRouteParam:ManagementVsxProvisioningToolAddRouteParam"
          },
          "description": "Parameters for the operation to add a route to a Virtual System or Virtual Router.add_route_params blocks are documented below.\n"
        },
        "addVdInterfaceParams": {
          "type": "array",
          "items": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdInterfaceParam:ManagementVsxProvisioningToolAddVdInterfaceParam"
          },
          "description": "Parameters for the operation to add a new interface to a Virtual Device.add_vd_interface_params blocks are documented below.\n"
        },
        "addVdParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdParams:ManagementVsxProvisioningToolAddVdParams",
          "description": "Parameters for the operation to add a new Virtual Device (VS/VSB/VSW/VR).add_vd_params blocks are documented below.\n"
        },
        "addVsxClusterParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxClusterParams:ManagementVsxProvisioningToolAddVsxClusterParams",
          "description": "Parameters for the operation to add a new VSX Cluster.add_vsx_cluster_params blocks are documented below.\n"
        },
        "addVsxGatewayParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxGatewayParams:ManagementVsxProvisioningToolAddVsxGatewayParams",
          "description": "Parameters for the operation to add a new VSX Gateway.add_vsx_gateway_params blocks are documented below.\n"
        },
        "attachBridgeParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAttachBridgeParams:ManagementVsxProvisioningToolAttachBridgeParams",
          "description": "Parameters for the operation to attach a new bridge interface to a Virtual System.attach_bridge_params blocks are documented below.\n"
        },
        "managementVsxProvisioningToolId": {
          "type": "string"
        },
        "operation": {
          "type": "string",
          "description": "The name of the provisioning operation to run. Each operation has its own specific parameters.<br> The available operations are:<ul><li><i>add-vsx-gateway</i> - Adds a new VSX gateway</li><li><i>add-vsx-cluster</i> - Adds a new VSX cluster*</li><li><i>add-vsx-cluster-member</i> - Adds a new VSX cluster member*</li><li><i>add-vd</i> - Adds a new Virtual Device (VS/VSB/VSW/VR) to a VSX gateway or VSX cluster</li><li><i>add-vd-interface</i> - Adds a new virtual interface to a Virtual Device</li><li><i>add-physical-interface</i> - Adds a physical interface to a VSX gateway or VSX cluster</li><li><i>add-route</i> - Adds a route to a Virtual Device</li><li><i>attach-bridge</i> - Attaches a bridge interface to a Virtual System</li><li><i>remove-vsx</i> - Removes a VSX gateway or VSX cluster</li><li><i>remove-vd</i> - Removes a Virtual Device</li><li><i>remove-vd-interface</i> - Removes an interface from a Virtual Device</li><li><i>remove-physical-interface</i> - Removes a physical interface from a VSX gateway or VSX cluster</li><li><i>remove-route</i> - Removes a route from a Virtual Device</li><li><i>set-vd</i> - Modifies a Virtual Device</li><li><i>set-vd-interface</i> - Modifies an interface on a Virtual Device</li><li><i>set-physical-interface</i> - Modifies a physical interface on a VSX cluster or VSX gateway</li></ul><br> * When adding a VSX Cluster, you must also add at least 2 cluster members<br> * Adding cluster members is only allowed when adding a new VSX cluster<br> * To add members to an existing cluster, use vsx-run-operation.\n"
        },
        "removePhysicalInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemovePhysicalInterfaceParams:ManagementVsxProvisioningToolRemovePhysicalInterfaceParams",
          "description": "Parameters for the operation to remove a physical interface from a VSX (Gateway or Cluster).remove_physical_interface_params blocks are documented below.\n"
        },
        "removeRouteParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveRouteParams:ManagementVsxProvisioningToolRemoveRouteParams",
          "description": "Parameters for the operation to remove a route from a Virtual System or Virtual Router.remove_route_params blocks are documented below.\n"
        },
        "removeVdInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVdInterfaceParams:ManagementVsxProvisioningToolRemoveVdInterfaceParams",
          "description": "Parameters for the operation to remove a logical interface from a Virtual Device.remove_vd_interface_params blocks are documented below.\n"
        },
        "removeVdParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVdParams:ManagementVsxProvisioningToolRemoveVdParams",
          "description": "Parameters for the operation to remove a Virtual Device.remove_vd_params blocks are documented below.\n"
        },
        "removeVsxParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVsxParams:ManagementVsxProvisioningToolRemoveVsxParams",
          "description": "Parameters for the operation to remove a VSX Gateway or VSX Cluster.remove_vsx_params blocks are documented below.\n"
        },
        "setPhysicalInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetPhysicalInterfaceParams:ManagementVsxProvisioningToolSetPhysicalInterfaceParams",
          "description": "Parameters for the operation to change the configuration of a physical interface.set_physical_interface_params blocks are documented below.\n"
        },
        "setVdInterfaceParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetVdInterfaceParams:ManagementVsxProvisioningToolSetVdInterfaceParams",
          "description": "Parameters for the operation to change the configuration of a logical interface.set_vd_interface_params blocks are documented below.\n"
        },
        "setVdParams": {
          "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetVdParams:ManagementVsxProvisioningToolSetVdParams",
          "description": "Parameters for the operation to change the configuration of a Virtual Device.set_vd_params blocks are documented below.\n"
        }
      },
      "requiredInputs": [
        "operation"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementVsxProvisioningTool resources.\n",
        "properties": {
          "addPhysicalInterfaceParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddPhysicalInterfaceParams:ManagementVsxProvisioningToolAddPhysicalInterfaceParams",
            "description": "Parameters for the operation to add a physical interface to a VSX gateway or VSX Cluster.add_physical_interface_params blocks are documented below.\n"
          },
          "addRouteParams": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddRouteParam:ManagementVsxProvisioningToolAddRouteParam"
            },
            "description": "Parameters for the operation to add a route to a Virtual System or Virtual Router.add_route_params blocks are documented below.\n"
          },
          "addVdInterfaceParams": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdInterfaceParam:ManagementVsxProvisioningToolAddVdInterfaceParam"
            },
            "description": "Parameters for the operation to add a new interface to a Virtual Device.add_vd_interface_params blocks are documented below.\n"
          },
          "addVdParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVdParams:ManagementVsxProvisioningToolAddVdParams",
            "description": "Parameters for the operation to add a new Virtual Device (VS/VSB/VSW/VR).add_vd_params blocks are documented below.\n"
          },
          "addVsxClusterParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxClusterParams:ManagementVsxProvisioningToolAddVsxClusterParams",
            "description": "Parameters for the operation to add a new VSX Cluster.add_vsx_cluster_params blocks are documented below.\n"
          },
          "addVsxGatewayParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAddVsxGatewayParams:ManagementVsxProvisioningToolAddVsxGatewayParams",
            "description": "Parameters for the operation to add a new VSX Gateway.add_vsx_gateway_params blocks are documented below.\n"
          },
          "attachBridgeParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolAttachBridgeParams:ManagementVsxProvisioningToolAttachBridgeParams",
            "description": "Parameters for the operation to attach a new bridge interface to a Virtual System.attach_bridge_params blocks are documented below.\n"
          },
          "managementVsxProvisioningToolId": {
            "type": "string"
          },
          "operation": {
            "type": "string",
            "description": "The name of the provisioning operation to run. Each operation has its own specific parameters.<br> The available operations are:<ul><li><i>add-vsx-gateway</i> - Adds a new VSX gateway</li><li><i>add-vsx-cluster</i> - Adds a new VSX cluster*</li><li><i>add-vsx-cluster-member</i> - Adds a new VSX cluster member*</li><li><i>add-vd</i> - Adds a new Virtual Device (VS/VSB/VSW/VR) to a VSX gateway or VSX cluster</li><li><i>add-vd-interface</i> - Adds a new virtual interface to a Virtual Device</li><li><i>add-physical-interface</i> - Adds a physical interface to a VSX gateway or VSX cluster</li><li><i>add-route</i> - Adds a route to a Virtual Device</li><li><i>attach-bridge</i> - Attaches a bridge interface to a Virtual System</li><li><i>remove-vsx</i> - Removes a VSX gateway or VSX cluster</li><li><i>remove-vd</i> - Removes a Virtual Device</li><li><i>remove-vd-interface</i> - Removes an interface from a Virtual Device</li><li><i>remove-physical-interface</i> - Removes a physical interface from a VSX gateway or VSX cluster</li><li><i>remove-route</i> - Removes a route from a Virtual Device</li><li><i>set-vd</i> - Modifies a Virtual Device</li><li><i>set-vd-interface</i> - Modifies an interface on a Virtual Device</li><li><i>set-physical-interface</i> - Modifies a physical interface on a VSX cluster or VSX gateway</li></ul><br> * When adding a VSX Cluster, you must also add at least 2 cluster members<br> * Adding cluster members is only allowed when adding a new VSX cluster<br> * To add members to an existing cluster, use vsx-run-operation.\n"
          },
          "removePhysicalInterfaceParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemovePhysicalInterfaceParams:ManagementVsxProvisioningToolRemovePhysicalInterfaceParams",
            "description": "Parameters for the operation to remove a physical interface from a VSX (Gateway or Cluster).remove_physical_interface_params blocks are documented below.\n"
          },
          "removeRouteParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveRouteParams:ManagementVsxProvisioningToolRemoveRouteParams",
            "description": "Parameters for the operation to remove a route from a Virtual System or Virtual Router.remove_route_params blocks are documented below.\n"
          },
          "removeVdInterfaceParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVdInterfaceParams:ManagementVsxProvisioningToolRemoveVdInterfaceParams",
            "description": "Parameters for the operation to remove a logical interface from a Virtual Device.remove_vd_interface_params blocks are documented below.\n"
          },
          "removeVdParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVdParams:ManagementVsxProvisioningToolRemoveVdParams",
            "description": "Parameters for the operation to remove a Virtual Device.remove_vd_params blocks are documented below.\n"
          },
          "removeVsxParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolRemoveVsxParams:ManagementVsxProvisioningToolRemoveVsxParams",
            "description": "Parameters for the operation to remove a VSX Gateway or VSX Cluster.remove_vsx_params blocks are documented below.\n"
          },
          "setPhysicalInterfaceParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetPhysicalInterfaceParams:ManagementVsxProvisioningToolSetPhysicalInterfaceParams",
            "description": "Parameters for the operation to change the configuration of a physical interface.set_physical_interface_params blocks are documented below.\n"
          },
          "setVdInterfaceParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetVdInterfaceParams:ManagementVsxProvisioningToolSetVdInterfaceParams",
            "description": "Parameters for the operation to change the configuration of a logical interface.set_vd_interface_params blocks are documented below.\n"
          },
          "setVdParams": {
            "$ref": "#/types/checkpoint:index%2FManagementVsxProvisioningToolSetVdParams:ManagementVsxProvisioningToolSetVdParams",
            "description": "Parameters for the operation to change the configuration of a Virtual Device.set_vd_params blocks are documented below.\n"
          },
          "taskId": {
            "type": "string",
            "description": "Operation Task UID.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementWhereUsed:ManagementWhereUsed": {
      "properties": {
        "dereferenceGroupMembers": {
          "type": "boolean",
          "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
        },
        "indirect": {
          "type": "boolean",
          "description": "Search for indirect usage.\n"
        },
        "indirectMaxDepth": {
          "type": "number",
          "description": "Maximum nesting level during indirect usage search.\n"
        },
        "managementWhereUsedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "showMembership": {
          "type": "boolean",
          "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
        }
      },
      "type": "object",
      "required": [
        "managementWhereUsedId",
        "name"
      ],
      "inputProperties": {
        "dereferenceGroupMembers": {
          "type": "boolean",
          "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
        },
        "indirect": {
          "type": "boolean",
          "description": "Search for indirect usage.\n"
        },
        "indirectMaxDepth": {
          "type": "number",
          "description": "Maximum nesting level during indirect usage search.\n"
        },
        "managementWhereUsedId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "showMembership": {
          "type": "boolean",
          "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementWhereUsed resources.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
          },
          "indirect": {
            "type": "boolean",
            "description": "Search for indirect usage.\n"
          },
          "indirectMaxDepth": {
            "type": "number",
            "description": "Maximum nesting level during indirect usage search.\n"
          },
          "managementWhereUsedId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/managementWildcard:ManagementWildcard": {
      "description": "This resource allows you to execute Check Point Wildcard.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementWildcard(\"example\", {\n    name: \"New Wildcard 1\",\n    ipv4Address: \"192.168.2.1\",\n    ipv4MaskWildcard: \"0.0.0.128\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementWildcard(\"example\",\n    name=\"New Wildcard 1\",\n    ipv4_address=\"192.168.2.1\",\n    ipv4_mask_wildcard=\"0.0.0.128\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var example = new Checkpoint.ManagementWildcard(\"example\", new()\n    {\n        Name = \"New Wildcard 1\",\n        Ipv4Address = \"192.168.2.1\",\n        Ipv4MaskWildcard = \"0.0.0.128\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementWildcard(ctx, \"example\", &checkpoint.ManagementWildcardArgs{\n\t\t\tName:             pulumi.String(\"New Wildcard 1\"),\n\t\t\tIpv4Address:      pulumi.String(\"192.168.2.1\"),\n\t\t\tIpv4MaskWildcard: pulumi.String(\"0.0.0.128\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementWildcard;\nimport com.pulumi.checkpoint.ManagementWildcardArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementWildcard(\"example\", ManagementWildcardArgs.builder()\n            .name(\"New Wildcard 1\")\n            .ipv4Address(\"192.168.2.1\")\n            .ipv4MaskWildcard(\"0.0.0.128\")\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementWildcard\n    properties:\n      name: New Wildcard 1\n      ipv4Address: 192.168.2.1\n      ipv4MaskWildcard: 0.0.0.128\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskWildcard": {
          "type": "string",
          "description": "IPv4 mask wildcard.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskWildcard": {
          "type": "string",
          "description": "IPv6 mask wildcard.\n"
        },
        "managementWildcardId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "type": "object",
      "required": [
        "managementWildcardId",
        "name"
      ],
      "inputProperties": {
        "color": {
          "type": "string",
          "description": "Color of the object. Should be one of existing colors.\n"
        },
        "comments": {
          "type": "string",
          "description": "Comments string.\n"
        },
        "ignoreErrors": {
          "type": "boolean",
          "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
        },
        "ignoreWarnings": {
          "type": "boolean",
          "description": "Apply changes ignoring warnings.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address.\n"
        },
        "ipv4MaskWildcard": {
          "type": "string",
          "description": "IPv4 mask wildcard.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address.\n"
        },
        "ipv6MaskWildcard": {
          "type": "string",
          "description": "IPv6 mask wildcard.\n"
        },
        "managementWildcardId": {
          "type": "string"
        },
        "name": {
          "type": "string",
          "description": "Object name.\n"
        },
        "tags": {
          "type": "array",
          "items": {
            "type": "string"
          },
          "description": "Collection of tag identifiers.tags blocks are documented below.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering ManagementWildcard resources.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "ignoreErrors": {
            "type": "boolean",
            "description": "Apply changes ignoring errors. You won't be able to publish such a changes. If ignore-warnings flag was omitted - warnings will also be ignored.\n"
          },
          "ignoreWarnings": {
            "type": "boolean",
            "description": "Apply changes ignoring warnings.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address.\n"
          },
          "ipv4MaskWildcard": {
            "type": "string",
            "description": "IPv4 mask wildcard.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address.\n"
          },
          "ipv6MaskWildcard": {
            "type": "string",
            "description": "IPv6 mask wildcard.\n"
          },
          "managementWildcardId": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/physicalInterface:PhysicalInterface": {
      "description": "This resource allows you to set a Physical interface.\n<br>NOTE: This is GAIA API resource and require set provider context to <span pulumi-lang-nodejs=\"`gaiaApi`\" pulumi-lang-dotnet=\"`GaiaApi`\" pulumi-lang-go=\"`gaiaApi`\" pulumi-lang-python=\"`gaia_api`\" pulumi-lang-yaml=\"`gaiaApi`\" pulumi-lang-java=\"`gaiaApi`\">`gaia_api`</span>.\n\n## Example Usage\n\n<!--Start PulumiCodeChooser -->\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst physicalInterface1 = new checkpoint.PhysicalInterface(\"physical_interface1\", {\n    name: \"eth1\",\n    enabled: true,\n    ipv4Address: \"20.30.1.10\",\n    ipv4MaskLength: 24,\n});\nconst physicalInterface2 = new checkpoint.PhysicalInterface(\"physical_interface2\", {\n    name: \"eth2\",\n    enabled: true,\n    speed: \"100M\",\n    duplex: \"full\",\n});\nconst physicalInterface3 = new checkpoint.PhysicalInterface(\"physical_interface3\", {\n    name: \"eth3\",\n    monitorMode: \"true\",\n    enabled: true,\n    ipv4Address: \"1.2.3.4\",\n    ipv4MaskLength: 24,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nphysical_interface1 = checkpoint.PhysicalInterface(\"physical_interface1\",\n    name=\"eth1\",\n    enabled=True,\n    ipv4_address=\"20.30.1.10\",\n    ipv4_mask_length=24)\nphysical_interface2 = checkpoint.PhysicalInterface(\"physical_interface2\",\n    name=\"eth2\",\n    enabled=True,\n    speed=\"100M\",\n    duplex=\"full\")\nphysical_interface3 = checkpoint.PhysicalInterface(\"physical_interface3\",\n    name=\"eth3\",\n    monitor_mode=\"true\",\n    enabled=True,\n    ipv4_address=\"1.2.3.4\",\n    ipv4_mask_length=24)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() => \n{\n    var physicalInterface1 = new Checkpoint.PhysicalInterface(\"physical_interface1\", new()\n    {\n        Name = \"eth1\",\n        Enabled = true,\n        Ipv4Address = \"20.30.1.10\",\n        Ipv4MaskLength = 24,\n    });\n\n    var physicalInterface2 = new Checkpoint.PhysicalInterface(\"physical_interface2\", new()\n    {\n        Name = \"eth2\",\n        Enabled = true,\n        Speed = \"100M\",\n        Duplex = \"full\",\n    });\n\n    var physicalInterface3 = new Checkpoint.PhysicalInterface(\"physical_interface3\", new()\n    {\n        Name = \"eth3\",\n        MonitorMode = \"true\",\n        Enabled = true,\n        Ipv4Address = \"1.2.3.4\",\n        Ipv4MaskLength = 24,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewPhysicalInterface(ctx, \"physical_interface1\", &checkpoint.PhysicalInterfaceArgs{\n\t\t\tName:           pulumi.String(\"eth1\"),\n\t\t\tEnabled:        pulumi.Bool(true),\n\t\t\tIpv4Address:    pulumi.String(\"20.30.1.10\"),\n\t\t\tIpv4MaskLength: pulumi.Float64(24),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewPhysicalInterface(ctx, \"physical_interface2\", &checkpoint.PhysicalInterfaceArgs{\n\t\t\tName:    pulumi.String(\"eth2\"),\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tSpeed:   pulumi.String(\"100M\"),\n\t\t\tDuplex:  pulumi.String(\"full\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.NewPhysicalInterface(ctx, \"physical_interface3\", &checkpoint.PhysicalInterfaceArgs{\n\t\t\tName:           pulumi.String(\"eth3\"),\n\t\t\tMonitorMode:    pulumi.String(\"true\"),\n\t\t\tEnabled:        pulumi.Bool(true),\n\t\t\tIpv4Address:    pulumi.String(\"1.2.3.4\"),\n\t\t\tIpv4MaskLength: pulumi.Float64(24),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.PhysicalInterface;\nimport com.pulumi.checkpoint.PhysicalInterfaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var physicalInterface1 = new PhysicalInterface(\"physicalInterface1\", PhysicalInterfaceArgs.builder()\n            .name(\"eth1\")\n            .enabled(true)\n            .ipv4Address(\"20.30.1.10\")\n            .ipv4MaskLength(24.0)\n            .build());\n\n        var physicalInterface2 = new PhysicalInterface(\"physicalInterface2\", PhysicalInterfaceArgs.builder()\n            .name(\"eth2\")\n            .enabled(true)\n            .speed(\"100M\")\n            .duplex(\"full\")\n            .build());\n\n        var physicalInterface3 = new PhysicalInterface(\"physicalInterface3\", PhysicalInterfaceArgs.builder()\n            .name(\"eth3\")\n            .monitorMode(\"true\")\n            .enabled(true)\n            .ipv4Address(\"1.2.3.4\")\n            .ipv4MaskLength(24.0)\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  physicalInterface1:\n    type: checkpoint:PhysicalInterface\n    name: physical_interface1\n    properties:\n      name: eth1\n      enabled: 'true'\n      ipv4Address: 20.30.1.10\n      ipv4MaskLength: 24\n  physicalInterface2:\n    type: checkpoint:PhysicalInterface\n    name: physical_interface2\n    properties:\n      name: eth2\n      enabled: 'true'\n      speed: 100M\n      duplex: full\n  physicalInterface3:\n    type: checkpoint:PhysicalInterface\n    name: physical_interface3\n    properties:\n      name: eth3\n      monitorMode: 'true'\n      enabled: 'true'\n      ipv4Address: 1.2.3.4\n      ipv4MaskLength: 24\n```\n<!--End PulumiCodeChooser -->\n",
      "properties": {
        "autoNegotiation": {
          "type": "string",
          "description": "Configure auto-negotiation. Activating Auto-Negotiation will skip the speed and duplex configuration.\n"
        },
        "comments": {
          "type": "string",
          "description": "interface Comments.\n"
        },
        "duplex": {
          "type": "string",
          "description": "duplex for the interface. Duplex is not relevant when 'auto_negotiation' is enabled.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Interface state.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address to set for the interface.\n"
        },
        "ipv4MaskLength": {
          "type": "number",
          "description": "Interface IPv4 address mask length.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address to set for the interface.\n"
        },
        "ipv6Autoconfig": {
          "type": "string",
          "description": "Configure IPv6 auto-configuration true/false.\n"
        },
        "ipv6MaskLength": {
          "type": "number",
          "description": "Interface IPv6 address mask length.\n"
        },
        "macAddr": {
          "type": "string",
          "description": "Configure hardware address.\n"
        },
        "monitorMode": {
          "type": "string",
          "description": "Set monitor mode for the interface true/false.\n"
        },
        "mtu": {
          "type": "number",
          "description": "Interface Mtu.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name.\n"
        },
        "physicalInterfaceId": {
          "type": "string"
        },
        "rxRingsize": {
          "type": "string",
          "description": "Set receive buffer size for the interface.\n"
        },
        "speed": {
          "type": "string",
          "description": "Interface link speed. Speed is not relevant when 'auto_negotiation' is enabled.\n"
        },
        "txRingsize": {
          "type": "string",
          "description": "Set transmit buffer size for the interface.\n"
        }
      },
      "type": "object",
      "required": [
        "name",
        "physicalInterfaceId"
      ],
      "inputProperties": {
        "autoNegotiation": {
          "type": "string",
          "description": "Configure auto-negotiation. Activating Auto-Negotiation will skip the speed and duplex configuration.\n"
        },
        "comments": {
          "type": "string",
          "description": "interface Comments.\n"
        },
        "duplex": {
          "type": "string",
          "description": "duplex for the interface. Duplex is not relevant when 'auto_negotiation' is enabled.\n"
        },
        "enabled": {
          "type": "boolean",
          "description": "Interface state.\n"
        },
        "ipv4Address": {
          "type": "string",
          "description": "IPv4 address to set for the interface.\n"
        },
        "ipv4MaskLength": {
          "type": "number",
          "description": "Interface IPv4 address mask length.\n"
        },
        "ipv6Address": {
          "type": "string",
          "description": "IPv6 address to set for the interface.\n"
        },
        "ipv6Autoconfig": {
          "type": "string",
          "description": "Configure IPv6 auto-configuration true/false.\n"
        },
        "ipv6MaskLength": {
          "type": "number",
          "description": "Interface IPv6 address mask length.\n"
        },
        "macAddr": {
          "type": "string",
          "description": "Configure hardware address.\n"
        },
        "monitorMode": {
          "type": "string",
          "description": "Set monitor mode for the interface true/false.\n"
        },
        "mtu": {
          "type": "number",
          "description": "Interface Mtu.\n"
        },
        "name": {
          "type": "string",
          "description": "Interface name.\n"
        },
        "physicalInterfaceId": {
          "type": "string"
        },
        "rxRingsize": {
          "type": "string",
          "description": "Set receive buffer size for the interface.\n"
        },
        "speed": {
          "type": "string",
          "description": "Interface link speed. Speed is not relevant when 'auto_negotiation' is enabled.\n"
        },
        "txRingsize": {
          "type": "string",
          "description": "Set transmit buffer size for the interface.\n"
        }
      },
      "stateInputs": {
        "description": "Input properties used for looking up and filtering PhysicalInterface resources.\n",
        "properties": {
          "autoNegotiation": {
            "type": "string",
            "description": "Configure auto-negotiation. Activating Auto-Negotiation will skip the speed and duplex configuration.\n"
          },
          "comments": {
            "type": "string",
            "description": "interface Comments.\n"
          },
          "duplex": {
            "type": "string",
            "description": "duplex for the interface. Duplex is not relevant when 'auto_negotiation' is enabled.\n"
          },
          "enabled": {
            "type": "boolean",
            "description": "Interface state.\n"
          },
          "ipv4Address": {
            "type": "string",
            "description": "IPv4 address to set for the interface.\n"
          },
          "ipv4MaskLength": {
            "type": "number",
            "description": "Interface IPv4 address mask length.\n"
          },
          "ipv6Address": {
            "type": "string",
            "description": "IPv6 address to set for the interface.\n"
          },
          "ipv6Autoconfig": {
            "type": "string",
            "description": "Configure IPv6 auto-configuration true/false.\n"
          },
          "ipv6MaskLength": {
            "type": "number",
            "description": "Interface IPv6 address mask length.\n"
          },
          "macAddr": {
            "type": "string",
            "description": "Configure hardware address.\n"
          },
          "monitorMode": {
            "type": "string",
            "description": "Set monitor mode for the interface true/false.\n"
          },
          "mtu": {
            "type": "number",
            "description": "Interface Mtu.\n"
          },
          "name": {
            "type": "string",
            "description": "Interface name.\n"
          },
          "physicalInterfaceId": {
            "type": "string"
          },
          "rxRingsize": {
            "type": "string",
            "description": "Set receive buffer size for the interface.\n"
          },
          "speed": {
            "type": "string",
            "description": "Interface link speed. Speed is not relevant when 'auto_negotiation' is enabled.\n"
          },
          "txRingsize": {
            "type": "string",
            "description": "Set transmit buffer size for the interface.\n"
          }
        },
        "type": "object"
      }
    },
    "checkpoint:index/putFile:PutFile": {
      "description": "This resource allows you to add a new file to a Check Point machine.\n<br>NOTE: This is GAIA API resource and require set provider context to <span pulumi-lang-nodejs=\"`gaiaApi`\" pulumi-lang-dotnet=\"`GaiaApi`\" pulumi-lang-go=\"`gaiaApi`\" pulumi-lang-python=\"`gaia_api`\" pulumi-lang-yaml=\"`gaiaApi`\" pulumi-lang-java=\"`gaiaApi`\">`gaia_api`</span>.\n\n",
      "properties": {
        "fileName": {
          "type": "string",
          "description": "Filename include the desired path. The file will be created in the user home directory if the full path wasn't provided.\n"
        },
        "override": {
          "type": "boolean",
          "description": "If the file already exists, indicates whether to overwrite it.\n"
        },
        "putFileId": {
          "type": "string"
        },
        "textContent": {
          "type": "string",
          "description": "Content to add to the new file.\n"
        }
      },
      "type": "object",
      "required": [
        "fileName",
        "putFileId",
        "textContent"
      ],
      "inputProperties": {
        "fileName": {
          "type": "string",
          "description": "Filename include the desired path. The file will be created in the user home directory if the full path wasn't provided.\n"
        },
        "override": {
          "type": "boolean",
          "description": "If the file already exists, indicates whether to overwrite it.\n"
        },
        "putFileId": {
          "type": "string"
        },
        "textContent": {
          "type": "string",
          "description": "Content to add to the new file.\n"
        }
      },
      "requiredInputs": [
        "fileName",
        "textContent"
      ],
      "stateInputs": {
        "description": "Input properties used for looking up and filtering PutFile resources.\n",
        "properties": {
          "fileName": {
            "type": "string",
            "description": "Filename include the desired path. The file will be created in the user home directory if the full path wasn't provided.\n"
          },
          "override": {
            "type": "boolean",
            "description": "If the file already exists, indicates whether to overwrite it.\n"
          },
          "putFileId": {
            "type": "string"
          },
          "textContent": {
            "type": "string",
            "description": "Content to add to the new file.\n"
          }
        },
        "type": "object"
      }
    }
  },
  "functions": {
    "checkpoint:index/getManagementAccessPointName:getManagementAccessPointName": {
      "description": "This resource allows you to execute Check Point Access Point Name.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accessPointName = new checkpoint.ManagementAccessPointName(\"access_point_name\", {\n    name: \"My Access Point Name\",\n    apn: \"apn name\",\n    enforceEndUserDomain: true,\n    endUserDomain: \"All_Internet\",\n});\nconst dataAccessPointName = checkpoint.getManagementAccessPointNameOutput({\n    name: accessPointName.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccess_point_name = checkpoint.ManagementAccessPointName(\"access_point_name\",\n    name=\"My Access Point Name\",\n    apn=\"apn name\",\n    enforce_end_user_domain=True,\n    end_user_domain=\"All_Internet\")\ndata_access_point_name = checkpoint.get_management_access_point_name_output(name=access_point_name.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accessPointName = new Checkpoint.ManagementAccessPointName(\"access_point_name\", new()\n    {\n        Name = \"My Access Point Name\",\n        Apn = \"apn name\",\n        EnforceEndUserDomain = true,\n        EndUserDomain = \"All_Internet\",\n    });\n\n    var dataAccessPointName = Checkpoint.GetManagementAccessPointName.Invoke(new()\n    {\n        Name = accessPointName.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taccessPointName, err := checkpoint.NewManagementAccessPointName(ctx, \"access_point_name\", \u0026checkpoint.ManagementAccessPointNameArgs{\n\t\t\tName:                 pulumi.String(\"My Access Point Name\"),\n\t\t\tApn:                  pulumi.String(\"apn name\"),\n\t\t\tEnforceEndUserDomain: pulumi.Bool(true),\n\t\t\tEndUserDomain:        pulumi.String(\"All_Internet\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementAccessPointNameOutput(ctx, checkpoint.GetManagementAccessPointNameOutputArgs{\n\t\t\tName: accessPointName.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessPointName;\nimport com.pulumi.checkpoint.ManagementAccessPointNameArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAccessPointNameArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accessPointName = new ManagementAccessPointName(\"accessPointName\", ManagementAccessPointNameArgs.builder()\n            .name(\"My Access Point Name\")\n            .apn(\"apn name\")\n            .enforceEndUserDomain(true)\n            .endUserDomain(\"All_Internet\")\n            .build());\n\n        final var dataAccessPointName = CheckpointFunctions.getManagementAccessPointName(GetManagementAccessPointNameArgs.builder()\n            .name(accessPointName.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accessPointName:\n    type: checkpoint:ManagementAccessPointName\n    name: access_point_name\n    properties:\n      name: My Access Point Name\n      apn: apn name\n      enforceEndUserDomain: true\n      endUserDomain: All_Internet\nvariables:\n  dataAccessPointName:\n    fn::invoke:\n      function: checkpoint:getManagementAccessPointName\n      arguments:\n        name: ${accessPointName.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAccessPointName.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAccessPointName.\n",
        "properties": {
          "apn": {
            "type": "string"
          },
          "blockTrafficOtherEndUserDomains": {
            "type": "boolean"
          },
          "blockTrafficThisEndUserDomain": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "endUserDomain": {
            "type": "string"
          },
          "enforceEndUserDomain": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "apn",
          "blockTrafficOtherEndUserDomains",
          "blockTrafficThisEndUserDomain",
          "color",
          "comments",
          "endUserDomain",
          "enforceEndUserDomain",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAccessRulebase:getManagementAccessRulebase": {
      "description": "Use this data source to get information on an existing access RuleBase.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accessRulebase = checkpoint.getManagementAccessRulebase({\n    name: \"Network\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccess_rulebase = checkpoint.get_management_access_rulebase(name=\"Network\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accessRulebase = Checkpoint.GetManagementAccessRulebase.Invoke(new()\n    {\n        Name = \"Network\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementAccessRulebase(ctx, \u0026checkpoint.GetManagementAccessRulebaseArgs{\n\t\t\tName: pulumi.StringRef(\"Network\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAccessRulebaseArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var accessRulebase = CheckpointFunctions.getManagementAccessRulebase(GetManagementAccessRulebaseArgs.builder()\n            .name(\"Network\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  accessRulebase:\n    fn::invoke:\n      function: checkpoint:getManagementAccessRulebase\n      arguments:\n        name: Network\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAccessRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
          },
          "filter": {
            "type": "string",
            "description": "APN name.\n"
          },
          "filterSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Enable enforce end user domain.\u003cspan pulumi-lang-nodejs=\" filterSettings \" pulumi-lang-dotnet=\" FilterSettings \" pulumi-lang-go=\" filterSettings \" pulumi-lang-python=\" filter_settings \" pulumi-lang-yaml=\" filterSettings \" pulumi-lang-java=\" filterSettings \"\u003e filter_settings \u003c/span\u003eblocks are documented below.\n"
          },
          "hitsSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "hits_settings blocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAccessRulebaseOrder:getManagementAccessRulebaseOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "showAsRanges": {
            "type": "boolean",
            "description": "When true, the source, destination and services \u0026 applications parameters are displayed as ranges of IP addresses and port numbers rather than network objects. Objects that are not represented using IP addresses or port numbers are presented as objects. In addition, the response of each rule does not contain the parameters: source, source-negate, destination, destination-negate, service and service-negate, but instead it contains the parameters:source-ranges, destination-ranges and service-ranges. Note: Requesting to show rules as ranges is limited up to 20 rules per request, otherwise an error is returned. If you wish to request more rules, use the offset and limit parameters to limit your request.\n"
          },
          "showHits": {
            "type": "boolean",
            "description": "show hits.\n"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAccessRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "filterSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "hitsSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAccessRulebaseOrder:getManagementAccessRulebaseOrder"
            },
            "type": "array"
          },
          "package": {
            "type": "string"
          },
          "rulebases": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAccessRulebaseRulebase:getManagementAccessRulebaseRulebase"
            },
            "type": "array"
          },
          "showAsRanges": {
            "type": "boolean"
          },
          "showHits": {
            "type": "boolean"
          },
          "showMembership": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "rulebases"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAciDataCenterServer:getManagementAciDataCenterServer": {
      "description": "Use this data source to get information on an existing Cisco APIC Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testAci = new checkpoint.ManagementAciDataCenterServer(\"testAci\", {\n    name: \"MyAci\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    urls: [\n        \"url1\",\n        \"url2\",\n    ],\n});\nconst dataAciDataCenterServer = checkpoint.getManagementAciDataCenterServerOutput({\n    name: testAci.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_aci = checkpoint.ManagementAciDataCenterServer(\"testAci\",\n    name=\"MyAci\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    urls=[\n        \"url1\",\n        \"url2\",\n    ])\ndata_aci_data_center_server = checkpoint.get_management_aci_data_center_server_output(name=test_aci.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testAci = new Checkpoint.ManagementAciDataCenterServer(\"testAci\", new()\n    {\n        Name = \"MyAci\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Urls = new[]\n        {\n            \"url1\",\n            \"url2\",\n        },\n    });\n\n    var dataAciDataCenterServer = Checkpoint.GetManagementAciDataCenterServer.Invoke(new()\n    {\n        Name = testAci.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestAci, err := checkpoint.NewManagementAciDataCenterServer(ctx, \"testAci\", \u0026checkpoint.ManagementAciDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyAci\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tUrls: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"url1\"),\n\t\t\t\tpulumi.String(\"url2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementAciDataCenterServerOutput(ctx, checkpoint.GetManagementAciDataCenterServerOutputArgs{\n\t\t\tName: testAci.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAciDataCenterServer;\nimport com.pulumi.checkpoint.ManagementAciDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAciDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testAci = new ManagementAciDataCenterServer(\"testAci\", ManagementAciDataCenterServerArgs.builder()\n            .name(\"MyAci\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .urls(            \n                \"url1\",\n                \"url2\")\n            .build());\n\n        final var dataAciDataCenterServer = CheckpointFunctions.getManagementAciDataCenterServer(GetManagementAciDataCenterServerArgs.builder()\n            .name(testAci.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testAci:\n    type: checkpoint:ManagementAciDataCenterServer\n    properties:\n      name: MyAci\n      username: USERNAME\n      password: PASSWORD\n      urls:\n        - url1\n        - url2\nvariables:\n  dataAciDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementAciDataCenterServer\n      arguments:\n        name: ${testAci.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAciDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAciDataCenterServer.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "unsafeAutoAccept": {
            "type": "boolean"
          },
          "urls": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "certificateFingerprint",
          "color",
          "comments",
          "id",
          "tags",
          "unsafeAutoAccept",
          "urls",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAdministrator:getManagementAdministrator": {
      "description": "Use this data source to get information on an existing Check Point Administrator.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst admin = new checkpoint.ManagementAdministrator(\"admin\", {\n    name: \"example\",\n    permissionsProfiles: [{\n        domain: \"domain1\",\n        profile: \"Read Only All\",\n    }],\n    multiDomainProfile: \"domain level only\",\n    password: \"1233\",\n});\nconst dataAdmin = checkpoint.getManagementAdministratorOutput({\n    name: admin.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nadmin = checkpoint.ManagementAdministrator(\"admin\",\n    name=\"example\",\n    permissions_profiles=[{\n        \"domain\": \"domain1\",\n        \"profile\": \"Read Only All\",\n    }],\n    multi_domain_profile=\"domain level only\",\n    password=\"1233\")\ndata_admin = checkpoint.get_management_administrator_output(name=admin.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var admin = new Checkpoint.ManagementAdministrator(\"admin\", new()\n    {\n        Name = \"example\",\n        PermissionsProfiles = new[]\n        {\n            new Checkpoint.Inputs.ManagementAdministratorPermissionsProfileArgs\n            {\n                Domain = \"domain1\",\n                Profile = \"Read Only All\",\n            },\n        },\n        MultiDomainProfile = \"domain level only\",\n        Password = \"1233\",\n    });\n\n    var dataAdmin = Checkpoint.GetManagementAdministrator.Invoke(new()\n    {\n        Name = admin.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tadmin, err := checkpoint.NewManagementAdministrator(ctx, \"admin\", \u0026checkpoint.ManagementAdministratorArgs{\n\t\t\tName: pulumi.String(\"example\"),\n\t\t\tPermissionsProfiles: checkpoint.ManagementAdministratorPermissionsProfileArray{\n\t\t\t\t\u0026checkpoint.ManagementAdministratorPermissionsProfileArgs{\n\t\t\t\t\tDomain:  pulumi.String(\"domain1\"),\n\t\t\t\t\tProfile: pulumi.String(\"Read Only All\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tMultiDomainProfile: pulumi.String(\"domain level only\"),\n\t\t\tPassword:           pulumi.String(\"1233\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementAdministratorOutput(ctx, checkpoint.GetManagementAdministratorOutputArgs{\n\t\t\tName: admin.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAdministrator;\nimport com.pulumi.checkpoint.ManagementAdministratorArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAdministratorPermissionsProfileArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAdministratorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var admin = new ManagementAdministrator(\"admin\", ManagementAdministratorArgs.builder()\n            .name(\"example\")\n            .permissionsProfiles(ManagementAdministratorPermissionsProfileArgs.builder()\n                .domain(\"domain1\")\n                .profile(\"Read Only All\")\n                .build())\n            .multiDomainProfile(\"domain level only\")\n            .password(\"1233\")\n            .build());\n\n        final var dataAdmin = CheckpointFunctions.getManagementAdministrator(GetManagementAdministratorArgs.builder()\n            .name(admin.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  admin:\n    type: checkpoint:ManagementAdministrator\n    properties:\n      name: example\n      permissionsProfiles:\n        - domain: domain1\n          profile: Read Only All\n      multiDomainProfile: domain level only\n      password: '1233'\nvariables:\n  dataAdmin:\n    fn::invoke:\n      function: checkpoint:getManagementAdministrator\n      arguments:\n        name: ${admin.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAdministrator.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "permissionsProfiles": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAdministratorPermissionsProfile:getManagementAdministratorPermissionsProfile"
            },
            "description": "Administrator permissions profile. Level of details in the output corresponds to the number of details for search. This table shows the level of details in the Standard level.\u003cspan pulumi-lang-nodejs=\" permissionsProfile \" pulumi-lang-dotnet=\" PermissionsProfile \" pulumi-lang-go=\" permissionsProfile \" pulumi-lang-python=\" permissions_profile \" pulumi-lang-yaml=\" permissionsProfile \" pulumi-lang-java=\" permissionsProfile \"\u003e permissions_profile \u003c/span\u003eblocks are documented below.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAdministrator.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "email": {
            "type": "string"
          },
          "expirationDate": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "multiDomainProfile": {
            "type": "string"
          },
          "mustChangePassword": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "permissionsProfiles": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAdministratorPermissionsProfile:getManagementAdministratorPermissionsProfile"
            },
            "type": "array"
          },
          "phoneNumber": {
            "type": "string"
          },
          "radiusServer": {
            "type": "string"
          },
          "sicName": {
            "type": "string"
          },
          "tacacsServer": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "authenticationMethod",
          "color",
          "comments",
          "email",
          "expirationDate",
          "id",
          "multiDomainProfile",
          "mustChangePassword",
          "phoneNumber",
          "radiusServer",
          "sicName",
          "tacacsServer",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAntiMalwareUpdateSchedule:getManagementAntiMalwareUpdateSchedule": {
      "description": "Use this data source to get information on an existing Anti Malware update schedule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst data = checkpoint.getManagementAntiMalwareUpdateSchedule({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata = checkpoint.get_management_anti_malware_update_schedule()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var data = Checkpoint.GetManagementAntiMalwareUpdateSchedule.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementAntiMalwareUpdateSchedule(ctx, \u0026checkpoint.GetManagementAntiMalwareUpdateScheduleArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAntiMalwareUpdateScheduleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var data = CheckpointFunctions.getManagementAntiMalwareUpdateSchedule(GetManagementAntiMalwareUpdateScheduleArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementAntiMalwareUpdateSchedule\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAntiMalwareUpdateSchedule.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAntiMalwareUpdateSchedule.\n",
        "properties": {
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "schedules": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAntiMalwareUpdateScheduleSchedule:getManagementAntiMalwareUpdateScheduleSchedule"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "enabled",
          "id",
          "schedules",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementApiSettings:getManagementApiSettings": {
      "description": "Use this data source to get information on an existing Check Point Api Settings.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataApiSettings = checkpoint.getManagementApiSettings({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_api_settings = checkpoint.get_management_api_settings()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataApiSettings = Checkpoint.GetManagementApiSettings.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementApiSettings(ctx, \u0026checkpoint.GetManagementApiSettingsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementApiSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataApiSettings = CheckpointFunctions.getManagementApiSettings(GetManagementApiSettingsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataApiSettings:\n    fn::invoke:\n      function: checkpoint:getManagementApiSettings\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementApiSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementApiSettings.\n",
        "properties": {
          "acceptedApiCallsFrom": {
            "type": "string"
          },
          "automaticStart": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "acceptedApiCallsFrom",
          "automaticStart",
          "color",
          "comments",
          "id",
          "name",
          "tags",
          "type",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAppControlAdvancedSettings:getManagementAppControlAdvancedSettings": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAppControlAdvancedSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAppControlAdvancedSettings.\n",
        "properties": {
          "blockRequestWhenWebServiceIsUnavailable": {
            "type": "boolean"
          },
          "categorizeSocialNetworkWidgets": {
            "type": "boolean"
          },
          "customCategorizationSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "domainLevelPermission": {
            "type": "boolean"
          },
          "enableWebBrowsing": {
            "type": "boolean"
          },
          "httpiNonStandardPorts": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "internalErrorFailMode": {
            "type": "string"
          },
          "matchApplicationOnAnyPort": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          },
          "urlFilteringSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAppControlAdvancedSettingsUrlFilteringSetting:getManagementAppControlAdvancedSettingsUrlFilteringSetting"
            },
            "type": "array"
          },
          "webBrowsingServices": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "websiteCategorizationMode": {
            "type": "string"
          }
        },
        "required": [
          "blockRequestWhenWebServiceIsUnavailable",
          "categorizeSocialNetworkWidgets",
          "customCategorizationSettings",
          "domainLevelPermission",
          "enableWebBrowsing",
          "httpiNonStandardPorts",
          "id",
          "internalErrorFailMode",
          "matchApplicationOnAnyPort",
          "uid",
          "urlFilteringSettings",
          "webBrowsingServices",
          "websiteCategorizationMode"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAppControlStatus:getManagementAppControlStatus": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAppControlStatus.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAppControlStatus.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "installedVersion": {
            "type": "string"
          },
          "installedVersionCreationTimes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAppControlStatusInstalledVersionCreationTime:getManagementAppControlStatusInstalledVersionCreationTime"
            },
            "type": "array"
          },
          "lastUpdateds": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAppControlStatusLastUpdated:getManagementAppControlStatusLastUpdated"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "installedVersion",
          "installedVersionCreationTimes",
          "lastUpdateds",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAppControlUpdateSchedule:getManagementAppControlUpdateSchedule": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAppControlUpdateSchedule.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAppControlUpdateSchedule.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "scheduleGatewayUpdates": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAppControlUpdateScheduleScheduleGatewayUpdate:getManagementAppControlUpdateScheduleScheduleGatewayUpdate"
            },
            "type": "array"
          },
          "scheduleManagementUpdates": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAppControlUpdateScheduleScheduleManagementUpdate:getManagementAppControlUpdateScheduleScheduleManagementUpdate"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "scheduleGatewayUpdates",
          "scheduleManagementUpdates",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAutomaticPurge:getManagementAutomaticPurge": {
      "description": "Use this data source to get information on an existing Check Point Automatic Purge.\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataAutomaticPurge = checkpoint.getManagementAutomaticPurge({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_automatic_purge = checkpoint.get_management_automatic_purge()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataAutomaticPurge = Checkpoint.GetManagementAutomaticPurge.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementAutomaticPurge(ctx, \u0026checkpoint.GetManagementAutomaticPurgeArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAutomaticPurgeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataAutomaticPurge = CheckpointFunctions.getManagementAutomaticPurge(GetManagementAutomaticPurgeArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataAutomaticPurge:\n    fn::invoke:\n      function: checkpoint:getManagementAutomaticPurge\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAutomaticPurge.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAutomaticPurge.\n",
        "properties": {
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "keepSessionsByCount": {
            "type": "boolean"
          },
          "keepSessionsByDays": {
            "type": "boolean"
          },
          "numberOfDaysToKeep": {
            "type": "number"
          },
          "numberOfSessionsToKeep": {
            "type": "number"
          },
          "schedulings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAutomaticPurgeScheduling:getManagementAutomaticPurgeScheduling"
            },
            "type": "array"
          }
        },
        "required": [
          "enabled",
          "id",
          "keepSessionsByCount",
          "keepSessionsByDays",
          "numberOfDaysToKeep",
          "numberOfSessionsToKeep",
          "schedulings"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAwsDataCenterServer:getManagementAwsDataCenterServer": {
      "description": "Use this data source to get information on an existing AWS Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testAws = new checkpoint.ManagementAwsDataCenterServer(\"testAws\", {\n    authenticationMethod: \"user-authentication\",\n    accessKeyId: \"MY-KEY-ID\",\n    secretAccessKey: \"MY-SECRET-KEY\",\n    region: \"us-east-1\",\n});\nconst dataAwsDataCenterServer = checkpoint.getManagementAwsDataCenterServerOutput({\n    name: testAws.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_aws = checkpoint.ManagementAwsDataCenterServer(\"testAws\",\n    authentication_method=\"user-authentication\",\n    access_key_id=\"MY-KEY-ID\",\n    secret_access_key=\"MY-SECRET-KEY\",\n    region=\"us-east-1\")\ndata_aws_data_center_server = checkpoint.get_management_aws_data_center_server_output(name=test_aws.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testAws = new Checkpoint.ManagementAwsDataCenterServer(\"testAws\", new()\n    {\n        AuthenticationMethod = \"user-authentication\",\n        AccessKeyId = \"MY-KEY-ID\",\n        SecretAccessKey = \"MY-SECRET-KEY\",\n        Region = \"us-east-1\",\n    });\n\n    var dataAwsDataCenterServer = Checkpoint.GetManagementAwsDataCenterServer.Invoke(new()\n    {\n        Name = testAws.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestAws, err := checkpoint.NewManagementAwsDataCenterServer(ctx, \"testAws\", \u0026checkpoint.ManagementAwsDataCenterServerArgs{\n\t\t\tAuthenticationMethod: pulumi.String(\"user-authentication\"),\n\t\t\tAccessKeyId:          pulumi.String(\"MY-KEY-ID\"),\n\t\t\tSecretAccessKey:      pulumi.String(\"MY-SECRET-KEY\"),\n\t\t\tRegion:               pulumi.String(\"us-east-1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementAwsDataCenterServerOutput(ctx, checkpoint.GetManagementAwsDataCenterServerOutputArgs{\n\t\t\tName: testAws.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAwsDataCenterServer;\nimport com.pulumi.checkpoint.ManagementAwsDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAwsDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testAws = new ManagementAwsDataCenterServer(\"testAws\", ManagementAwsDataCenterServerArgs.builder()\n            .authenticationMethod(\"user-authentication\")\n            .accessKeyId(\"MY-KEY-ID\")\n            .secretAccessKey(\"MY-SECRET-KEY\")\n            .region(\"us-east-1\")\n            .build());\n\n        final var dataAwsDataCenterServer = CheckpointFunctions.getManagementAwsDataCenterServer(GetManagementAwsDataCenterServerArgs.builder()\n            .name(testAws.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testAws:\n    type: checkpoint:ManagementAwsDataCenterServer\n    properties:\n      authenticationMethod: user-authentication\n      accessKeyId: MY-KEY-ID\n      secretAccessKey: MY-SECRET-KEY\n      region: us-east-1\nvariables:\n  dataAwsDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementAwsDataCenterServer\n      arguments:\n        name: ${testAws.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAwsDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAwsDataCenterServer.\n",
        "properties": {
          "accessKeyId": {
            "type": "string"
          },
          "authenticationMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "enableStsAssumeRole": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "region": {
            "type": "string"
          },
          "stsExternalId": {
            "type": "string"
          },
          "stsRole": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "accessKeyId",
          "authenticationMethod",
          "color",
          "comments",
          "enableStsAssumeRole",
          "id",
          "region",
          "stsExternalId",
          "stsRole",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAzureAd:getManagementAzureAd": {
      "description": "Use this data source to get information on an existing Check Point Azure Ad.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nresources:\n  azureAd:\n    type: checkpoint:ManagementAzureAd\n    name: azure_ad\n    properties:\n      name: example\n      password: '123'\n      userAuthentication: user-authentication\n      username: example\n      applicationId: a8662b33-306f-42ba-9ffb-a0ac27c8903f\n      applicationKey: EjdJ2JcNGpw3[GV8:PMN_s2KH]JhtlpO\n      directoryId: 19c063a8-3bee-4ea5-b984-e344asds37f7\nvariables:\n  dataAzureAd:\n    fn::invoke:\n      function: checkpoint:getManagementAzureAd\n      arguments:\n        name: ${azureAd.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAzureAd.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAzureAd.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "properties": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAzureAdProperty:getManagementAzureAdProperty"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "properties",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAzureAdContent:getManagementAzureAdContent": {
      "description": "This resource allows you to execute Check Point Azure Ad Content.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst azureAdContent = checkpoint.getManagementAzureAdContent({\n    azureAdName: \"my_azureAD\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nazure_ad_content = checkpoint.get_management_azure_ad_content(azure_ad_name=\"my_azureAD\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var azureAdContent = Checkpoint.GetManagementAzureAdContent.Invoke(new()\n    {\n        AzureAdName = \"my_azureAD\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementAzureAdContent(ctx, \u0026checkpoint.GetManagementAzureAdContentArgs{\n\t\t\tAzureAdName: pulumi.StringRef(\"my_azureAD\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAzureAdContentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var azureAdContent = CheckpointFunctions.getManagementAzureAdContent(GetManagementAzureAdContentArgs.builder()\n            .azureAdName(\"my_azureAD\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  azureAdContent:\n    fn::invoke:\n      function: checkpoint:getManagementAzureAdContent\n      arguments:\n        azureAdName: my_azureAD\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAzureAdContent.\n",
        "properties": {
          "azureAdName": {
            "type": "string",
            "description": "Name of the Azure AD Server where to search for objects.\n"
          },
          "azureAdUid": {
            "type": "string",
            "description": "Unique identifier of the Azure AD Server where to search for objects.\n"
          },
          "filter": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Return results matching the specified filter. filter blocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAzureAdContentOrder:getManagementAzureAdContentOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          },
          "uidInAzureAd": {
            "type": "string",
            "description": "Return result matching the unique identifier of the object on the Azure AD Server.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAzureAdContent.\n",
        "properties": {
          "azureAdName": {
            "type": "string"
          },
          "azureAdUid": {
            "type": "string"
          },
          "filter": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAzureAdContentObject:getManagementAzureAdContentObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementAzureAdContentOrder:getManagementAzureAdContentOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          },
          "uidInAzureAd": {
            "type": "string"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementAzureDataCenterServer:getManagementAzureDataCenterServer": {
      "description": "Use this data source to get information on an existing Microsoft Azure Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testAzure = new checkpoint.ManagementAzureDataCenterServer(\"testAzure\", {\n    name: \"myAzure\",\n    authenticationMethod: \"user-authentication\",\n    username: \"MY-KEY-ID\",\n    password: \"MY-SECRET-KEY\",\n});\nconst dataAzureDataCenterServer = checkpoint.getManagementAzureDataCenterServerOutput({\n    name: testAzure.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_azure = checkpoint.ManagementAzureDataCenterServer(\"testAzure\",\n    name=\"myAzure\",\n    authentication_method=\"user-authentication\",\n    username=\"MY-KEY-ID\",\n    password=\"MY-SECRET-KEY\")\ndata_azure_data_center_server = checkpoint.get_management_azure_data_center_server_output(name=test_azure.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testAzure = new Checkpoint.ManagementAzureDataCenterServer(\"testAzure\", new()\n    {\n        Name = \"myAzure\",\n        AuthenticationMethod = \"user-authentication\",\n        Username = \"MY-KEY-ID\",\n        Password = \"MY-SECRET-KEY\",\n    });\n\n    var dataAzureDataCenterServer = Checkpoint.GetManagementAzureDataCenterServer.Invoke(new()\n    {\n        Name = testAzure.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestAzure, err := checkpoint.NewManagementAzureDataCenterServer(ctx, \"testAzure\", \u0026checkpoint.ManagementAzureDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"myAzure\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"user-authentication\"),\n\t\t\tUsername:             pulumi.String(\"MY-KEY-ID\"),\n\t\t\tPassword:             pulumi.String(\"MY-SECRET-KEY\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementAzureDataCenterServerOutput(ctx, checkpoint.GetManagementAzureDataCenterServerOutputArgs{\n\t\t\tName: testAzure.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAzureDataCenterServer;\nimport com.pulumi.checkpoint.ManagementAzureDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementAzureDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testAzure = new ManagementAzureDataCenterServer(\"testAzure\", ManagementAzureDataCenterServerArgs.builder()\n            .name(\"myAzure\")\n            .authenticationMethod(\"user-authentication\")\n            .username(\"MY-KEY-ID\")\n            .password(\"MY-SECRET-KEY\")\n            .build());\n\n        final var dataAzureDataCenterServer = CheckpointFunctions.getManagementAzureDataCenterServer(GetManagementAzureDataCenterServerArgs.builder()\n            .name(testAzure.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testAzure:\n    type: checkpoint:ManagementAzureDataCenterServer\n    properties:\n      name: myAzure\n      authenticationMethod: user-authentication\n      username: MY-KEY-ID\n      password: MY-SECRET-KEY\nvariables:\n  dataAzureDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementAzureDataCenterServer\n      arguments:\n        name: ${testAzure.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementAzureDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementAzureDataCenterServer.\n",
        "properties": {
          "applicationId": {
            "type": "string"
          },
          "authenticationMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "directoryId": {
            "type": "string"
          },
          "environment": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "applicationId",
          "authenticationMethod",
          "color",
          "comments",
          "directoryId",
          "environment",
          "id",
          "tags",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementBestPractice:getManagementBestPractice": {
      "description": "Use this data source to get information on an existing Check Point Best Practice.\n\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementBestPractice.\n",
        "properties": {
          "bestPracticeId": {
            "type": "string",
            "description": "Best Practice ID.\n"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "showRegulations": {
            "type": "boolean",
            "description": "Show the applicable regulations of the Best Practice.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementBestPractice.\n",
        "properties": {
          "actionItem": {
            "type": "string"
          },
          "active": {
            "type": "boolean"
          },
          "bestPracticeId": {
            "type": "string"
          },
          "blade": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "dueDate": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "regulations": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeRegulation:getManagementBestPracticeRegulation"
            },
            "type": "array"
          },
          "relevantObjects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeRelevantObject:getManagementBestPracticeRelevantObject"
            },
            "type": "array"
          },
          "showRegulations": {
            "type": "boolean"
          },
          "status": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "userDefined": {
            "type": "boolean"
          },
          "userDefinedFirewalls": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedFirewall:getManagementBestPracticeUserDefinedFirewall"
            },
            "type": "array"
          },
          "userDefinedGaiaOs": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementBestPracticeUserDefinedGaiaO:getManagementBestPracticeUserDefinedGaiaO"
            },
            "type": "array"
          }
        },
        "required": [
          "actionItem",
          "active",
          "blade",
          "comments",
          "description",
          "dueDate",
          "id",
          "regulations",
          "relevantObjects",
          "status",
          "userDefined",
          "userDefinedFirewalls",
          "userDefinedGaiaOs"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCheckpointHost:getManagementCheckpointHost": {
      "description": "This resource allows you to execute Check Point Checkpoint Host.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst checkpointHost = new checkpoint.ManagementCheckpointHost(\"checkpoint_host\", {\n    name: \"checkpoint host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst dataCheckpointHost = checkpoint.getManagementCheckpointHostOutput({\n    name: checkpointHost.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ncheckpoint_host = checkpoint.ManagementCheckpointHost(\"checkpoint_host\",\n    name=\"checkpoint host\",\n    ipv4_address=\"1.2.3.4\")\ndata_checkpoint_host = checkpoint.get_management_checkpoint_host_output(name=checkpoint_host.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var checkpointHost = new Checkpoint.ManagementCheckpointHost(\"checkpoint_host\", new()\n    {\n        Name = \"checkpoint host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var dataCheckpointHost = Checkpoint.GetManagementCheckpointHost.Invoke(new()\n    {\n        Name = checkpointHost.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tcheckpointHost, err := checkpoint.NewManagementCheckpointHost(ctx, \"checkpoint_host\", \u0026checkpoint.ManagementCheckpointHostArgs{\n\t\t\tName:        pulumi.String(\"checkpoint host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementCheckpointHostOutput(ctx, checkpoint.GetManagementCheckpointHostOutputArgs{\n\t\t\tName: checkpointHost.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementCheckpointHost;\nimport com.pulumi.checkpoint.ManagementCheckpointHostArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCheckpointHostArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var checkpointHost = new ManagementCheckpointHost(\"checkpointHost\", ManagementCheckpointHostArgs.builder()\n            .name(\"checkpoint host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        final var dataCheckpointHost = CheckpointFunctions.getManagementCheckpointHost(GetManagementCheckpointHostArgs.builder()\n            .name(checkpointHost.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  checkpointHost:\n    type: checkpoint:ManagementCheckpointHost\n    name: checkpoint_host\n    properties:\n      name: checkpoint host\n      ipv4Address: 1.2.3.4\nvariables:\n  dataCheckpointHost:\n    fn::invoke:\n      function: checkpoint:getManagementCheckpointHost\n      arguments:\n        name: ${checkpointHost.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCheckpointHost.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "managementBlades": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Management blades.\u003cspan pulumi-lang-nodejs=\" managementBlades \" pulumi-lang-dotnet=\" ManagementBlades \" pulumi-lang-go=\" managementBlades \" pulumi-lang-python=\" management_blades \" pulumi-lang-yaml=\" managementBlades \" pulumi-lang-java=\" managementBlades \"\u003e management_blades \u003c/span\u003eblocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCheckpointHost.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "hardware": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCheckpointHostInterface:getManagementCheckpointHostInterface"
            },
            "type": "array"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "logsSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "managementBlades": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "os": {
            "type": "string"
          },
          "saveLogsLocally": {
            "type": "boolean"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sicName": {
            "type": "string"
          },
          "sicState": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "hardware",
          "id",
          "interfaces",
          "ipv4Address",
          "ipv6Address",
          "logsSettings",
          "natSettings",
          "os",
          "saveLogsLocally",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "sicName",
          "sicState",
          "tags",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCloudServices:getManagementCloudServices": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCloudServices.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCloudServices.\n",
        "properties": {
          "connectedAt": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "gatewaysOnboardingSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCloudServicesGatewaysOnboardingSetting:getManagementCloudServicesGatewaysOnboardingSetting"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "managementUrl": {
            "type": "string"
          },
          "status": {
            "type": "string"
          },
          "tenantId": {
            "type": "string"
          }
        },
        "required": [
          "connectedAt",
          "gatewaysOnboardingSettings",
          "id",
          "managementUrl",
          "status",
          "tenantId"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementClusterMember:getManagementClusterMember": {
      "description": "Use this data source to get information on an existing Check Point Cluster Member.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataClusterMember = checkpoint.getManagementClusterMember({\n    uid: \"CLUSTER_MEMBER_UID\",\n    limitInterfaces: \"20\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_cluster_member = checkpoint.get_management_cluster_member(uid=\"CLUSTER_MEMBER_UID\",\n    limit_interfaces=\"20\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataClusterMember = Checkpoint.GetManagementClusterMember.Invoke(new()\n    {\n        Uid = \"CLUSTER_MEMBER_UID\",\n        LimitInterfaces = \"20\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementClusterMember(ctx, \u0026checkpoint.GetManagementClusterMemberArgs{\n\t\t\tUid:             \"CLUSTER_MEMBER_UID\",\n\t\t\tLimitInterfaces: pulumi.StringRef(\"20\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementClusterMemberArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataClusterMember = CheckpointFunctions.getManagementClusterMember(GetManagementClusterMemberArgs.builder()\n            .uid(\"CLUSTER_MEMBER_UID\")\n            .limitInterfaces(\"20\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataClusterMember:\n    fn::invoke:\n      function: checkpoint:getManagementClusterMember\n      arguments:\n        uid: CLUSTER_MEMBER_UID\n        limitInterfaces: 20\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementClusterMember.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "limitInterfaces": {
            "type": "string",
            "description": "Limit number of cluster member interfaces to show.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "uid"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementClusterMember.\n",
        "properties": {
          "clusterUid": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementClusterMemberInterface:getManagementClusterMemberInterface"
            },
            "type": "array"
          },
          "ipAddress": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "limitInterfaces": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "priority": {
            "type": "number"
          },
          "sicMessage": {
            "type": "string"
          },
          "sicState": {
            "type": "string"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "clusterUid",
          "id",
          "interfaces",
          "ipAddress",
          "ipv6Address",
          "name",
          "natSettings",
          "priority",
          "sicMessage",
          "sicState",
          "type",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeAccounts:getManagementCmeAccounts": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accounts = checkpoint.getManagementCmeAccounts({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccounts = checkpoint.get_management_cme_accounts()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accounts = Checkpoint.GetManagementCmeAccounts.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeAccounts(ctx, \u0026checkpoint.LookupManagementCmeAccountsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeAccountsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var accounts = CheckpointFunctions.getManagementCmeAccounts(GetManagementCmeAccountsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  accounts:\n    fn::invoke:\n      function: checkpoint:getManagementCmeAccounts\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeAccounts.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeAccounts.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "results": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeAccountsResult:getManagementCmeAccountsResult"
            },
            "type": "array"
          }
        },
        "required": [
          "id",
          "results"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeAccountsAws:getManagementCmeAccountsAws": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst awsAccount = checkpoint.getManagementCmeAccountsAws({\n    name: \"awsAccount\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naws_account = checkpoint.get_management_cme_accounts_aws(name=\"awsAccount\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var awsAccount = Checkpoint.GetManagementCmeAccountsAws.Invoke(new()\n    {\n        Name = \"awsAccount\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeAccountsAws(ctx, \u0026checkpoint.LookupManagementCmeAccountsAwsArgs{\n\t\t\tName: \"awsAccount\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeAccountsAwsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var awsAccount = CheckpointFunctions.getManagementCmeAccountsAws(GetManagementCmeAccountsAwsArgs.builder()\n            .name(\"awsAccount\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  awsAccount:\n    fn::invoke:\n      function: checkpoint:getManagementCmeAccountsAws\n      arguments:\n        name: awsAccount\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeAccountsAws.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Unique account name for identification.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeAccountsAws.\n",
        "properties": {
          "accessKey": {
            "type": "string"
          },
          "communities": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "credentialsFile": {
            "type": "string"
          },
          "deletionTolerance": {
            "type": "number"
          },
          "domain": {
            "type": "string"
          },
          "gwConfigurations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "platform": {
            "type": "string"
          },
          "regions": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "scanGateways": {
            "type": "boolean"
          },
          "scanLoadBalancers": {
            "type": "boolean"
          },
          "scanSubnets": {
            "type": "boolean"
          },
          "scanSubnets6": {
            "type": "boolean"
          },
          "scanVpn": {
            "type": "boolean"
          },
          "secretKey": {
            "type": "string"
          },
          "stsExternalId": {
            "type": "string"
          },
          "stsRole": {
            "type": "string"
          },
          "subAccounts": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeAccountsAwsSubAccount:getManagementCmeAccountsAwsSubAccount"
            },
            "type": "array"
          }
        },
        "required": [
          "accessKey",
          "communities",
          "credentialsFile",
          "deletionTolerance",
          "domain",
          "gwConfigurations",
          "id",
          "name",
          "platform",
          "regions",
          "scanGateways",
          "scanLoadBalancers",
          "scanSubnets",
          "scanSubnets6",
          "scanVpn",
          "secretKey",
          "stsExternalId",
          "stsRole",
          "subAccounts"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeAccountsAzure:getManagementCmeAccountsAzure": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst azureAccount = checkpoint.getManagementCmeAccountsAzure({\n    name: \"azureAccount\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nazure_account = checkpoint.get_management_cme_accounts_azure(name=\"azureAccount\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var azureAccount = Checkpoint.GetManagementCmeAccountsAzure.Invoke(new()\n    {\n        Name = \"azureAccount\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeAccountsAzure(ctx, \u0026checkpoint.LookupManagementCmeAccountsAzureArgs{\n\t\t\tName: \"azureAccount\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeAccountsAzureArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var azureAccount = CheckpointFunctions.getManagementCmeAccountsAzure(GetManagementCmeAccountsAzureArgs.builder()\n            .name(\"azureAccount\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  azureAccount:\n    fn::invoke:\n      function: checkpoint:getManagementCmeAccountsAzure\n      arguments:\n        name: azureAccount\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeAccountsAzure.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Unique account name for identification.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeAccountsAzure.\n",
        "properties": {
          "applicationId": {
            "type": "string"
          },
          "clientSecret": {
            "type": "string"
          },
          "deletionTolerance": {
            "type": "number"
          },
          "directoryId": {
            "type": "string"
          },
          "domain": {
            "type": "string"
          },
          "environment": {
            "type": "string"
          },
          "gwConfigurations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "platform": {
            "type": "string"
          },
          "subscription": {
            "type": "string"
          }
        },
        "required": [
          "applicationId",
          "clientSecret",
          "deletionTolerance",
          "directoryId",
          "domain",
          "environment",
          "gwConfigurations",
          "id",
          "name",
          "platform",
          "subscription"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeAccountsGcp:getManagementCmeAccountsGcp": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gcpAccount = checkpoint.getManagementCmeAccountsGcp({\n    name: \"gcpAccount\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngcp_account = checkpoint.get_management_cme_accounts_gcp(name=\"gcpAccount\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var gcpAccount = Checkpoint.GetManagementCmeAccountsGcp.Invoke(new()\n    {\n        Name = \"gcpAccount\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeAccountsGcp(ctx, \u0026checkpoint.LookupManagementCmeAccountsGcpArgs{\n\t\t\tName: \"gcpAccount\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeAccountsGcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var gcpAccount = CheckpointFunctions.getManagementCmeAccountsGcp(GetManagementCmeAccountsGcpArgs.builder()\n            .name(\"gcpAccount\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  gcpAccount:\n    fn::invoke:\n      function: checkpoint:getManagementCmeAccountsGcp\n      arguments:\n        name: gcpAccount\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeAccountsGcp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Unique account name for identification.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeAccountsGcp.\n",
        "properties": {
          "credentialsData": {
            "type": "string"
          },
          "credentialsFile": {
            "type": "string"
          },
          "deletionTolerance": {
            "type": "number"
          },
          "domain": {
            "type": "string"
          },
          "gwConfigurations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "platform": {
            "type": "string"
          },
          "projectId": {
            "type": "string"
          }
        },
        "required": [
          "credentialsData",
          "credentialsFile",
          "deletionTolerance",
          "domain",
          "gwConfigurations",
          "id",
          "name",
          "platform",
          "projectId"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeApiVersions:getManagementCmeApiVersions": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst apiVersions = checkpoint.getManagementCmeApiVersions({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\napi_versions = checkpoint.get_management_cme_api_versions()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var apiVersions = Checkpoint.GetManagementCmeApiVersions.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementCmeApiVersions(ctx, \u0026checkpoint.GetManagementCmeApiVersionsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeApiVersionsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var apiVersions = CheckpointFunctions.getManagementCmeApiVersions(GetManagementCmeApiVersionsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  apiVersions:\n    fn::invoke:\n      function: checkpoint:getManagementCmeApiVersions\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeApiVersions.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeApiVersions.\n",
        "properties": {
          "currentVersion": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "supportedVersions": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "currentVersion",
          "id",
          "supportedVersions"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeDelayCycle:getManagementCmeDelayCycle": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst delayCycle = checkpoint.getManagementCmeDelayCycle({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndelay_cycle = checkpoint.get_management_cme_delay_cycle()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var delayCycle = Checkpoint.GetManagementCmeDelayCycle.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeDelayCycle(ctx, \u0026checkpoint.LookupManagementCmeDelayCycleArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeDelayCycleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var delayCycle = CheckpointFunctions.getManagementCmeDelayCycle(GetManagementCmeDelayCycleArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  delayCycle:\n    fn::invoke:\n      function: checkpoint:getManagementCmeDelayCycle\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeDelayCycle.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeDelayCycle.\n",
        "properties": {
          "delayCycle": {
            "type": "number"
          },
          "id": {
            "type": "string"
          }
        },
        "required": [
          "delayCycle",
          "id"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurations:getManagementCmeGwConfigurations": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigurations = checkpoint.getManagementCmeGwConfigurations({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_configurations = checkpoint.get_management_cme_gw_configurations()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var gwConfigurations = Checkpoint.GetManagementCmeGwConfigurations.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeGwConfigurations(ctx, \u0026checkpoint.LookupManagementCmeGwConfigurationsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeGwConfigurationsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var gwConfigurations = CheckpointFunctions.getManagementCmeGwConfigurations(GetManagementCmeGwConfigurationsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  gwConfigurations:\n    fn::invoke:\n      function: checkpoint:getManagementCmeGwConfigurations\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeGwConfigurations.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeGwConfigurations.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "results": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsResult:getManagementCmeGwConfigurationsResult"
            },
            "type": "array"
          }
        },
        "required": [
          "id",
          "results"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAws:getManagementCmeGwConfigurationsAws": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigAws = checkpoint.getManagementCmeGwConfigurationsAws({\n    name: \"awsGWConfigurations\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_config_aws = checkpoint.get_management_cme_gw_configurations_aws(name=\"awsGWConfigurations\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var gwConfigAws = Checkpoint.GetManagementCmeGwConfigurationsAws.Invoke(new()\n    {\n        Name = \"awsGWConfigurations\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeGwConfigurationsAws(ctx, \u0026checkpoint.LookupManagementCmeGwConfigurationsAwsArgs{\n\t\t\tName: \"awsGWConfigurations\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeGwConfigurationsAwsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var gwConfigAws = CheckpointFunctions.getManagementCmeGwConfigurationsAws(GetManagementCmeGwConfigurationsAwsArgs.builder()\n            .name(\"awsGWConfigurations\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  gwConfigAws:\n    fn::invoke:\n      function: checkpoint:getManagementCmeGwConfigurationsAws\n      arguments:\n        name: awsGWConfigurations\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeGwConfigurationsAws.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The Gateway configuration name.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeGwConfigurationsAws.\n",
        "properties": {
          "blades": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsAwsBlade:getManagementCmeGwConfigurationsAwsBlade"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "communicationWithServersBehindNat": {
            "type": "string"
          },
          "deploymentType": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "identityAwarenessSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsAwsIdentityAwarenessSetting:getManagementCmeGwConfigurationsAwsIdentityAwarenessSetting"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "policy": {
            "type": "string"
          },
          "relatedAccount": {
            "type": "string"
          },
          "repositoryGatewayScripts": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsAwsRepositoryGatewayScript:getManagementCmeGwConfigurationsAwsRepositoryGatewayScript"
            },
            "type": "array"
          },
          "sectionName": {
            "type": "string"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sicKey": {
            "type": "string"
          },
          "tgwSpokeRoutes": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tgwStaticRoutes": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "version": {
            "type": "string"
          },
          "vpnCommunity": {
            "type": "string"
          },
          "vpnDomain": {
            "type": "string"
          },
          "xForwardedFor": {
            "type": "boolean"
          }
        },
        "required": [
          "blades",
          "color",
          "communicationWithServersBehindNat",
          "deploymentType",
          "id",
          "identityAwarenessSettings",
          "name",
          "policy",
          "relatedAccount",
          "repositoryGatewayScripts",
          "sectionName",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "sicKey",
          "tgwSpokeRoutes",
          "tgwStaticRoutes",
          "version",
          "vpnCommunity",
          "vpnDomain",
          "xForwardedFor"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsAzure:getManagementCmeGwConfigurationsAzure": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigAzure = checkpoint.getManagementCmeGwConfigurationsAzure({\n    name: \"azureGWConfigurations\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_config_azure = checkpoint.get_management_cme_gw_configurations_azure(name=\"azureGWConfigurations\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var gwConfigAzure = Checkpoint.GetManagementCmeGwConfigurationsAzure.Invoke(new()\n    {\n        Name = \"azureGWConfigurations\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeGwConfigurationsAzure(ctx, \u0026checkpoint.LookupManagementCmeGwConfigurationsAzureArgs{\n\t\t\tName: \"azureGWConfigurations\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeGwConfigurationsAzureArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var gwConfigAzure = CheckpointFunctions.getManagementCmeGwConfigurationsAzure(GetManagementCmeGwConfigurationsAzureArgs.builder()\n            .name(\"azureGWConfigurations\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  gwConfigAzure:\n    fn::invoke:\n      function: checkpoint:getManagementCmeGwConfigurationsAzure\n      arguments:\n        name: azureGWConfigurations\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeGwConfigurationsAzure.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The Gateway configuration name.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeGwConfigurationsAzure.\n",
        "properties": {
          "blades": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsAzureBlade:getManagementCmeGwConfigurationsAzureBlade"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "communicationWithServersBehindNat": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "identityAwarenessSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsAzureIdentityAwarenessSetting:getManagementCmeGwConfigurationsAzureIdentityAwarenessSetting"
            },
            "type": "array"
          },
          "ipv6": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "policy": {
            "type": "string"
          },
          "relatedAccount": {
            "type": "string"
          },
          "repositoryGatewayScripts": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsAzureRepositoryGatewayScript:getManagementCmeGwConfigurationsAzureRepositoryGatewayScript"
            },
            "type": "array"
          },
          "sectionName": {
            "type": "string"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sicKey": {
            "type": "string"
          },
          "version": {
            "type": "string"
          },
          "xForwardedFor": {
            "type": "boolean"
          }
        },
        "required": [
          "blades",
          "color",
          "communicationWithServersBehindNat",
          "id",
          "identityAwarenessSettings",
          "ipv6",
          "name",
          "policy",
          "relatedAccount",
          "repositoryGatewayScripts",
          "sectionName",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "sicKey",
          "version",
          "xForwardedFor"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeGwConfigurationsGcp:getManagementCmeGwConfigurationsGcp": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gwConfigGcp = checkpoint.getManagementCmeGwConfigurationsGcp({\n    name: \"gcpGWConfigurations\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngw_config_gcp = checkpoint.get_management_cme_gw_configurations_gcp(name=\"gcpGWConfigurations\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var gwConfigGcp = Checkpoint.GetManagementCmeGwConfigurationsGcp.Invoke(new()\n    {\n        Name = \"gcpGWConfigurations\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeGwConfigurationsGcp(ctx, \u0026checkpoint.LookupManagementCmeGwConfigurationsGcpArgs{\n\t\t\tName: \"gcpGWConfigurations\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeGwConfigurationsGcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var gwConfigGcp = CheckpointFunctions.getManagementCmeGwConfigurationsGcp(GetManagementCmeGwConfigurationsGcpArgs.builder()\n            .name(\"gcpGWConfigurations\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  gwConfigGcp:\n    fn::invoke:\n      function: checkpoint:getManagementCmeGwConfigurationsGcp\n      arguments:\n        name: gcpGWConfigurations\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeGwConfigurationsGcp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The Gateway configuration name.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeGwConfigurationsGcp.\n",
        "properties": {
          "blades": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsGcpBlade:getManagementCmeGwConfigurationsGcpBlade"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "communicationWithServersBehindNat": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "identityAwarenessSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsGcpIdentityAwarenessSetting:getManagementCmeGwConfigurationsGcpIdentityAwarenessSetting"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "policy": {
            "type": "string"
          },
          "relatedAccount": {
            "type": "string"
          },
          "repositoryGatewayScripts": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCmeGwConfigurationsGcpRepositoryGatewayScript:getManagementCmeGwConfigurationsGcpRepositoryGatewayScript"
            },
            "type": "array"
          },
          "sectionName": {
            "type": "string"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sicKey": {
            "type": "string"
          },
          "version": {
            "type": "string"
          },
          "xForwardedFor": {
            "type": "boolean"
          }
        },
        "required": [
          "blades",
          "color",
          "communicationWithServersBehindNat",
          "id",
          "identityAwarenessSettings",
          "name",
          "policy",
          "relatedAccount",
          "repositoryGatewayScripts",
          "sectionName",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "sicKey",
          "version",
          "xForwardedFor"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeManagement:getManagementCmeManagement": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst mgmt = checkpoint.getManagementCmeManagement({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmgmt = checkpoint.get_management_cme_management()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var mgmt = Checkpoint.GetManagementCmeManagement.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementCmeManagement(ctx, \u0026checkpoint.LookupManagementCmeManagementArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeManagementArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var mgmt = CheckpointFunctions.getManagementCmeManagement(GetManagementCmeManagementArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  mgmt:\n    fn::invoke:\n      function: checkpoint:getManagementCmeManagement\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeManagement.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeManagement.\n",
        "properties": {
          "domain": {
            "type": "string"
          },
          "host": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          }
        },
        "required": [
          "domain",
          "host",
          "id",
          "name"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCmeVersion:getManagementCmeVersion": {
      "description": "## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst cmeVersion = checkpoint.getManagementCmeVersion({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ncme_version = checkpoint.get_management_cme_version()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var cmeVersion = Checkpoint.GetManagementCmeVersion.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementCmeVersion(ctx, \u0026checkpoint.GetManagementCmeVersionArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementCmeVersionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var cmeVersion = CheckpointFunctions.getManagementCmeVersion(GetManagementCmeVersionArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  cmeVersion:\n    fn::invoke:\n      function: checkpoint:getManagementCmeVersion\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCmeVersion.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCmeVersion.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "take": {
            "type": "number"
          }
        },
        "required": [
          "id",
          "take"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementContentAwarenessAdvancedSettings:getManagementContentAwarenessAdvancedSettings": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementContentAwarenessAdvancedSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementContentAwarenessAdvancedSettings.\n",
        "properties": {
          "httpiNonStandardPorts": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "inspectArchives": {
            "type": "boolean"
          },
          "internalErrorFailMode": {
            "type": "string"
          },
          "supportedServices": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "httpiNonStandardPorts",
          "id",
          "inspectArchives",
          "internalErrorFailMode",
          "supportedServices",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCpPasswordRequirements:getManagementCpPasswordRequirements": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCpPasswordRequirements.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCpPasswordRequirements.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "minPasswordLength": {
            "type": "number"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "minPasswordLength",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCpTrustedCaCertificate:getManagementCpTrustedCaCertificate": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCpTrustedCaCertificate.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCpTrustedCaCertificate.\n",
        "properties": {
          "addedBy": {
            "type": "string"
          },
          "base64Certificate": {
            "type": "string"
          },
          "base64PublicCertificate": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "issuedBy": {
            "type": "string"
          },
          "issuedTo": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "status": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "validFroms": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCpTrustedCaCertificateValidFrom:getManagementCpTrustedCaCertificateValidFrom"
            },
            "type": "array"
          },
          "validTos": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCpTrustedCaCertificateValidTo:getManagementCpTrustedCaCertificateValidTo"
            },
            "type": "array"
          }
        },
        "required": [
          "addedBy",
          "base64Certificate",
          "base64PublicCertificate",
          "id",
          "issuedBy",
          "issuedTo",
          "status",
          "tags",
          "validFroms",
          "validTos"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementCustomTrustedCaCertificate:getManagementCustomTrustedCaCertificate": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementCustomTrustedCaCertificate.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementCustomTrustedCaCertificate.\n",
        "properties": {
          "addedBy": {
            "type": "string"
          },
          "base64Certificate": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "issuedBy": {
            "type": "string"
          },
          "issuedTo": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "validFroms": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCustomTrustedCaCertificateValidFrom:getManagementCustomTrustedCaCertificateValidFrom"
            },
            "type": "array"
          },
          "validTos": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementCustomTrustedCaCertificateValidTo:getManagementCustomTrustedCaCertificateValidTo"
            },
            "type": "array"
          }
        },
        "required": [
          "addedBy",
          "base64Certificate",
          "id",
          "issuedBy",
          "issuedTo",
          "tags",
          "validFroms",
          "validTos"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataAccessLayer:getManagementDataAccessLayer": {
      "description": "Use this data source to get information on an existing Check Point Access Layer.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accessLayer = new checkpoint.ManagementAccessLayer(\"access_layer\", {\n    name: \"Access Layer 1\",\n    detectUsingXForwardFor: false,\n    applicationsAndUrlFiltering: true,\n});\nconst dataAccessLayer = checkpoint.getManagementDataAccessLayerOutput({\n    name: accessLayer.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccess_layer = checkpoint.ManagementAccessLayer(\"access_layer\",\n    name=\"Access Layer 1\",\n    detect_using_x_forward_for=False,\n    applications_and_url_filtering=True)\ndata_access_layer = checkpoint.get_management_data_access_layer_output(name=access_layer.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accessLayer = new Checkpoint.ManagementAccessLayer(\"access_layer\", new()\n    {\n        Name = \"Access Layer 1\",\n        DetectUsingXForwardFor = false,\n        ApplicationsAndUrlFiltering = true,\n    });\n\n    var dataAccessLayer = Checkpoint.GetManagementDataAccessLayer.Invoke(new()\n    {\n        Name = accessLayer.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taccessLayer, err := checkpoint.NewManagementAccessLayer(ctx, \"access_layer\", \u0026checkpoint.ManagementAccessLayerArgs{\n\t\t\tName:                        pulumi.String(\"Access Layer 1\"),\n\t\t\tDetectUsingXForwardFor:      pulumi.Bool(false),\n\t\t\tApplicationsAndUrlFiltering: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataAccessLayerOutput(ctx, checkpoint.GetManagementDataAccessLayerOutputArgs{\n\t\t\tName: accessLayer.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessLayer;\nimport com.pulumi.checkpoint.ManagementAccessLayerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataAccessLayerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accessLayer = new ManagementAccessLayer(\"accessLayer\", ManagementAccessLayerArgs.builder()\n            .name(\"Access Layer 1\")\n            .detectUsingXForwardFor(false)\n            .applicationsAndUrlFiltering(true)\n            .build());\n\n        final var dataAccessLayer = CheckpointFunctions.getManagementDataAccessLayer(GetManagementDataAccessLayerArgs.builder()\n            .name(accessLayer.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accessLayer:\n    type: checkpoint:ManagementAccessLayer\n    name: access_layer\n    properties:\n      name: Access Layer 1\n      detectUsingXForwardFor: false\n      applicationsAndUrlFiltering: true\nvariables:\n  dataAccessLayer:\n    fn::invoke:\n      function: checkpoint:getManagementDataAccessLayer\n      arguments:\n        name: ${accessLayer.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataAccessLayer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataAccessLayer.\n",
        "properties": {
          "applicationsAndUrlFiltering": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "contentAwareness": {
            "type": "boolean"
          },
          "detectUsingXForwardFor": {
            "type": "boolean"
          },
          "firewall": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "implicitCleanupAction": {
            "type": "string"
          },
          "mobileAccess": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "shared": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "applicationsAndUrlFiltering",
          "color",
          "comments",
          "contentAwareness",
          "detectUsingXForwardFor",
          "firewall",
          "id",
          "implicitCleanupAction",
          "mobileAccess",
          "shared",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataAccessRole:getManagementDataAccessRole": {
      "description": "Use this data source to get information on an existing Check Point Access Role.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accessRole = new checkpoint.ManagementAccessRole(\"access_role\", {\n    name: \"My Access Role\",\n    comments: \"my-Access-Role\",\n    machines: [{\n        source: \"all identified\",\n        selections: [\"all identified\"],\n    }],\n    users: [{\n        selections: [\"any\"],\n        source: \"any\",\n    }],\n});\nconst dataAccessRole = checkpoint.getManagementDataAccessRoleOutput({\n    name: accessRole.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccess_role = checkpoint.ManagementAccessRole(\"access_role\",\n    name=\"My Access Role\",\n    comments=\"my-Access-Role\",\n    machines=[{\n        \"source\": \"all identified\",\n        \"selections\": [\"all identified\"],\n    }],\n    users=[{\n        \"selections\": [\"any\"],\n        \"source\": \"any\",\n    }])\ndata_access_role = checkpoint.get_management_data_access_role_output(name=access_role.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accessRole = new Checkpoint.ManagementAccessRole(\"access_role\", new()\n    {\n        Name = \"My Access Role\",\n        Comments = \"my-Access-Role\",\n        Machines = new[]\n        {\n            new Checkpoint.Inputs.ManagementAccessRoleMachineArgs\n            {\n                Source = \"all identified\",\n                Selections = new[]\n                {\n                    \"all identified\",\n                },\n            },\n        },\n        Users = new[]\n        {\n            new Checkpoint.Inputs.ManagementAccessRoleUserArgs\n            {\n                Selections = new[]\n                {\n                    \"any\",\n                },\n                Source = \"any\",\n            },\n        },\n    });\n\n    var dataAccessRole = Checkpoint.GetManagementDataAccessRole.Invoke(new()\n    {\n        Name = accessRole.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taccessRole, err := checkpoint.NewManagementAccessRole(ctx, \"access_role\", \u0026checkpoint.ManagementAccessRoleArgs{\n\t\t\tName:     pulumi.String(\"My Access Role\"),\n\t\t\tComments: pulumi.String(\"my-Access-Role\"),\n\t\t\tMachines: checkpoint.ManagementAccessRoleMachineArray{\n\t\t\t\t\u0026checkpoint.ManagementAccessRoleMachineArgs{\n\t\t\t\t\tSource: pulumi.String(\"all identified\"),\n\t\t\t\t\tSelections: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"all identified\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t\tUsers: checkpoint.ManagementAccessRoleUserArray{\n\t\t\t\t\u0026checkpoint.ManagementAccessRoleUserArgs{\n\t\t\t\t\tSelections: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"any\"),\n\t\t\t\t\t},\n\t\t\t\t\tSource: pulumi.String(\"any\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataAccessRoleOutput(ctx, checkpoint.GetManagementDataAccessRoleOutputArgs{\n\t\t\tName: accessRole.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessRole;\nimport com.pulumi.checkpoint.ManagementAccessRoleArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAccessRoleMachineArgs;\nimport com.pulumi.checkpoint.inputs.ManagementAccessRoleUserArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataAccessRoleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accessRole = new ManagementAccessRole(\"accessRole\", ManagementAccessRoleArgs.builder()\n            .name(\"My Access Role\")\n            .comments(\"my-Access-Role\")\n            .machines(ManagementAccessRoleMachineArgs.builder()\n                .source(\"all identified\")\n                .selections(\"all identified\")\n                .build())\n            .users(ManagementAccessRoleUserArgs.builder()\n                .selections(\"any\")\n                .source(\"any\")\n                .build())\n            .build());\n\n        final var dataAccessRole = CheckpointFunctions.getManagementDataAccessRole(GetManagementDataAccessRoleArgs.builder()\n            .name(accessRole.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accessRole:\n    type: checkpoint:ManagementAccessRole\n    name: access_role\n    properties:\n      name: My Access Role\n      comments: my-Access-Role\n      machines:\n        - source: all identified\n          selections:\n            - all identified\n      users:\n        - selections:\n            - any\n          source: any\nvariables:\n  dataAccessRole:\n    fn::invoke:\n      function: checkpoint:getManagementDataAccessRole\n      arguments:\n        name: ${accessRole.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataAccessRole.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataAccessRole.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "machines": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataAccessRoleMachine:getManagementDataAccessRoleMachine"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "networks": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "remoteAccessClients": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "users": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataAccessRoleUser:getManagementDataAccessRoleUser"
            },
            "type": "array"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "machines",
          "networks",
          "remoteAccessClients",
          "tags",
          "users"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataAccessRule:getManagementDataAccessRule": {
      "description": "Use this data source to get information on an existing Check Point Access Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accessRule = new checkpoint.ManagementAccessRule(\"access_rule\", {\n    name: \"My Rule\",\n    layer: \"Network\",\n    position: {\n        top: \"top\",\n    },\n    sources: [\"Any\"],\n    destinations: [\"Any\"],\n    services: [\"Any\"],\n    contents: [\"Any\"],\n    times: [\"Any\"],\n    installOns: [\"Policy Targets\"],\n    track: {\n        type: \"Log\",\n        accounting: \"false\",\n        alert: \"none\",\n        enable_firewall_session: \"false\",\n        per_connection: \"true\",\n        per_session: \"false\",\n    },\n    customFields: {},\n    vpn: \"Any\",\n});\nconst dataAccessRule = checkpoint.getManagementDataAccessRuleOutput({\n    name: accessRule.name,\n    layer: accessRule.layer,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccess_rule = checkpoint.ManagementAccessRule(\"access_rule\",\n    name=\"My Rule\",\n    layer=\"Network\",\n    position={\n        \"top\": \"top\",\n    },\n    sources=[\"Any\"],\n    destinations=[\"Any\"],\n    services=[\"Any\"],\n    contents=[\"Any\"],\n    times=[\"Any\"],\n    install_ons=[\"Policy Targets\"],\n    track={\n        \"type\": \"Log\",\n        \"accounting\": \"false\",\n        \"alert\": \"none\",\n        \"enable_firewall_session\": \"false\",\n        \"per_connection\": \"true\",\n        \"per_session\": \"false\",\n    },\n    custom_fields={},\n    vpn=\"Any\")\ndata_access_rule = checkpoint.get_management_data_access_rule_output(name=access_rule.name,\n    layer=access_rule.layer)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accessRule = new Checkpoint.ManagementAccessRule(\"access_rule\", new()\n    {\n        Name = \"My Rule\",\n        Layer = \"Network\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Sources = new[]\n        {\n            \"Any\",\n        },\n        Destinations = new[]\n        {\n            \"Any\",\n        },\n        Services = new[]\n        {\n            \"Any\",\n        },\n        Contents = new[]\n        {\n            \"Any\",\n        },\n        Times = new[]\n        {\n            \"Any\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy Targets\",\n        },\n        Track = \n        {\n            { \"type\", \"Log\" },\n            { \"accounting\", \"false\" },\n            { \"alert\", \"none\" },\n            { \"enable_firewall_session\", \"false\" },\n            { \"per_connection\", \"true\" },\n            { \"per_session\", \"false\" },\n        },\n        CustomFields = null,\n        Vpn = \"Any\",\n    });\n\n    var dataAccessRule = Checkpoint.GetManagementDataAccessRule.Invoke(new()\n    {\n        Name = accessRule.Name,\n        Layer = accessRule.Layer,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taccessRule, err := checkpoint.NewManagementAccessRule(ctx, \"access_rule\", \u0026checkpoint.ManagementAccessRuleArgs{\n\t\t\tName:  pulumi.String(\"My Rule\"),\n\t\t\tLayer: pulumi.String(\"Network\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tTimes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy Targets\"),\n\t\t\t},\n\t\t\tTrack: pulumi.StringMap{\n\t\t\t\t\"type\":                    pulumi.String(\"Log\"),\n\t\t\t\t\"accounting\":              pulumi.String(\"false\"),\n\t\t\t\t\"alert\":                   pulumi.String(\"none\"),\n\t\t\t\t\"enable_firewall_session\": pulumi.String(\"false\"),\n\t\t\t\t\"per_connection\":          pulumi.String(\"true\"),\n\t\t\t\t\"per_session\":             pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tCustomFields: pulumi.StringMap{},\n\t\t\tVpn:          pulumi.String(\"Any\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataAccessRuleOutput(ctx, checkpoint.GetManagementDataAccessRuleOutputArgs{\n\t\t\tName:  accessRule.Name,\n\t\t\tLayer: accessRule.Layer,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessRule;\nimport com.pulumi.checkpoint.ManagementAccessRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataAccessRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accessRule = new ManagementAccessRule(\"accessRule\", ManagementAccessRuleArgs.builder()\n            .name(\"My Rule\")\n            .layer(\"Network\")\n            .position(Map.of(\"top\", \"top\"))\n            .sources(\"Any\")\n            .destinations(\"Any\")\n            .services(\"Any\")\n            .contents(\"Any\")\n            .times(\"Any\")\n            .installOns(\"Policy Targets\")\n            .track(Map.ofEntries(\n                Map.entry(\"type\", \"Log\"),\n                Map.entry(\"accounting\", \"false\"),\n                Map.entry(\"alert\", \"none\"),\n                Map.entry(\"enable_firewall_session\", \"false\"),\n                Map.entry(\"per_connection\", \"true\"),\n                Map.entry(\"per_session\", \"false\")\n            ))\n            .customFields(Map.ofEntries(\n            ))\n            .vpn(\"Any\")\n            .build());\n\n        final var dataAccessRule = CheckpointFunctions.getManagementDataAccessRule(GetManagementDataAccessRuleArgs.builder()\n            .name(accessRule.name())\n            .layer(accessRule.layer())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accessRule:\n    type: checkpoint:ManagementAccessRule\n    name: access_rule\n    properties:\n      name: My Rule\n      layer: Network\n      position:\n        top: top\n      sources:\n        - Any\n      destinations:\n        - Any\n      services:\n        - Any\n      contents:\n        - Any\n      times:\n        - Any\n      installOns:\n        - Policy Targets\n      track:\n        type: Log\n        accounting: false\n        alert: none\n        enable_firewall_session: false\n        per_connection: true\n        per_session: false\n      customFields: {}\n      vpn: Any\nvariables:\n  dataAccessRule:\n    fn::invoke:\n      function: checkpoint:getManagementDataAccessRule\n      arguments:\n        name: ${accessRule.name}\n        layer: ${accessRule.layer}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataAccessRule.\n",
        "properties": {
          "fieldsWithUidIdentifiers": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of resource fields that will use object UIDs as object identifiers. Default is object name.\n"
          },
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Rule name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "layer"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataAccessRule.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "actionSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "comments": {
            "type": "string"
          },
          "contentDirection": {
            "type": "string"
          },
          "contentNegate": {
            "type": "boolean"
          },
          "contents": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "customFields": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "destinationNegate": {
            "type": "boolean"
          },
          "destinations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "enabled": {
            "type": "boolean"
          },
          "fieldsWithUidIdentifiers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "inlineLayer": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "layer": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "serviceNegate": {
            "type": "boolean"
          },
          "services": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sourceNegate": {
            "type": "boolean"
          },
          "sources": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "times": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "track": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "uid": {
            "type": "string"
          },
          "userChecks": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataAccessRuleUserCheck:getManagementDataAccessRuleUserCheck"
            },
            "type": "array"
          },
          "vpn": {
            "type": "string"
          },
          "vpnCommunities": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "vpnDirectionals": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataAccessRuleVpnDirectional:getManagementDataAccessRuleVpnDirectional"
            },
            "type": "array"
          }
        },
        "required": [
          "action",
          "actionSettings",
          "comments",
          "contentDirection",
          "contentNegate",
          "contents",
          "customFields",
          "destinationNegate",
          "destinations",
          "enabled",
          "id",
          "inlineLayer",
          "installOns",
          "layer",
          "serviceNegate",
          "services",
          "sourceNegate",
          "sources",
          "times",
          "track",
          "userChecks",
          "vpn",
          "vpnCommunities",
          "vpnDirectionals"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataAccessSection:getManagementDataAccessSection": {
      "description": "Use this data source to get information on an existing Check Point Access Section.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst accessLayer = new checkpoint.ManagementAccessLayer(\"access_layer\", {\n    name: \"myaccesslayer\",\n    detectUsingXForwardFor: false,\n    applicationsAndUrlFiltering: true,\n});\nconst accessSection = new checkpoint.ManagementAccessSection(\"access_section\", {\n    name: \"myaccesssection\",\n    layer: accessLayer.name,\n    position: {\n        top: \"top\",\n    },\n});\nconst dataAccessSection = checkpoint.getManagementDataAccessSectionOutput({\n    name: accessSection.name,\n    layer: accessSection.layer,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naccess_layer = checkpoint.ManagementAccessLayer(\"access_layer\",\n    name=\"myaccesslayer\",\n    detect_using_x_forward_for=False,\n    applications_and_url_filtering=True)\naccess_section = checkpoint.ManagementAccessSection(\"access_section\",\n    name=\"myaccesssection\",\n    layer=access_layer.name,\n    position={\n        \"top\": \"top\",\n    })\ndata_access_section = checkpoint.get_management_data_access_section_output(name=access_section.name,\n    layer=access_section.layer)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var accessLayer = new Checkpoint.ManagementAccessLayer(\"access_layer\", new()\n    {\n        Name = \"myaccesslayer\",\n        DetectUsingXForwardFor = false,\n        ApplicationsAndUrlFiltering = true,\n    });\n\n    var accessSection = new Checkpoint.ManagementAccessSection(\"access_section\", new()\n    {\n        Name = \"myaccesssection\",\n        Layer = accessLayer.Name,\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var dataAccessSection = Checkpoint.GetManagementDataAccessSection.Invoke(new()\n    {\n        Name = accessSection.Name,\n        Layer = accessSection.Layer,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taccessLayer, err := checkpoint.NewManagementAccessLayer(ctx, \"access_layer\", \u0026checkpoint.ManagementAccessLayerArgs{\n\t\t\tName:                        pulumi.String(\"myaccesslayer\"),\n\t\t\tDetectUsingXForwardFor:      pulumi.Bool(false),\n\t\t\tApplicationsAndUrlFiltering: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\taccessSection, err := checkpoint.NewManagementAccessSection(ctx, \"access_section\", \u0026checkpoint.ManagementAccessSectionArgs{\n\t\t\tName:  pulumi.String(\"myaccesssection\"),\n\t\t\tLayer: accessLayer.Name,\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataAccessSectionOutput(ctx, checkpoint.GetManagementDataAccessSectionOutputArgs{\n\t\t\tName:  accessSection.Name,\n\t\t\tLayer: accessSection.Layer,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAccessLayer;\nimport com.pulumi.checkpoint.ManagementAccessLayerArgs;\nimport com.pulumi.checkpoint.ManagementAccessSection;\nimport com.pulumi.checkpoint.ManagementAccessSectionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataAccessSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var accessLayer = new ManagementAccessLayer(\"accessLayer\", ManagementAccessLayerArgs.builder()\n            .name(\"myaccesslayer\")\n            .detectUsingXForwardFor(false)\n            .applicationsAndUrlFiltering(true)\n            .build());\n\n        var accessSection = new ManagementAccessSection(\"accessSection\", ManagementAccessSectionArgs.builder()\n            .name(\"myaccesssection\")\n            .layer(accessLayer.name())\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var dataAccessSection = CheckpointFunctions.getManagementDataAccessSection(GetManagementDataAccessSectionArgs.builder()\n            .name(accessSection.name())\n            .layer(accessSection.layer())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  accessLayer:\n    type: checkpoint:ManagementAccessLayer\n    name: access_layer\n    properties:\n      name: myaccesslayer\n      detectUsingXForwardFor: false\n      applicationsAndUrlFiltering: true\n  accessSection:\n    type: checkpoint:ManagementAccessSection\n    name: access_section\n    properties:\n      name: myaccesssection\n      layer: ${accessLayer.name}\n      position:\n        top: top\nvariables:\n  dataAccessSection:\n    fn::invoke:\n      function: checkpoint:getManagementDataAccessSection\n      arguments:\n        name: ${accessSection.name}\n        layer: ${accessSection.layer}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataAccessSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "layer"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataAccessSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "layer"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataAddressRange:getManagementDataAddressRange": {
      "description": "Use this data source to get information on an existing Check Point Address Range.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst addressRange = new checkpoint.ManagementAddressRange(\"address_range\", {\n    name: \"My Address Range\",\n    ipv4AddressFirst: \"1.1.1.1\",\n    ipv4AddressLast: \"2.2.2.2\",\n});\nconst dataAddressRange = checkpoint.getManagementDataAddressRangeOutput({\n    name: addressRange.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\naddress_range = checkpoint.ManagementAddressRange(\"address_range\",\n    name=\"My Address Range\",\n    ipv4_address_first=\"1.1.1.1\",\n    ipv4_address_last=\"2.2.2.2\")\ndata_address_range = checkpoint.get_management_data_address_range_output(name=address_range.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var addressRange = new Checkpoint.ManagementAddressRange(\"address_range\", new()\n    {\n        Name = \"My Address Range\",\n        Ipv4AddressFirst = \"1.1.1.1\",\n        Ipv4AddressLast = \"2.2.2.2\",\n    });\n\n    var dataAddressRange = Checkpoint.GetManagementDataAddressRange.Invoke(new()\n    {\n        Name = addressRange.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\taddressRange, err := checkpoint.NewManagementAddressRange(ctx, \"address_range\", \u0026checkpoint.ManagementAddressRangeArgs{\n\t\t\tName:             pulumi.String(\"My Address Range\"),\n\t\t\tIpv4AddressFirst: pulumi.String(\"1.1.1.1\"),\n\t\t\tIpv4AddressLast:  pulumi.String(\"2.2.2.2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataAddressRangeOutput(ctx, checkpoint.GetManagementDataAddressRangeOutputArgs{\n\t\t\tName: addressRange.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementAddressRange;\nimport com.pulumi.checkpoint.ManagementAddressRangeArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataAddressRangeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var addressRange = new ManagementAddressRange(\"addressRange\", ManagementAddressRangeArgs.builder()\n            .name(\"My Address Range\")\n            .ipv4AddressFirst(\"1.1.1.1\")\n            .ipv4AddressLast(\"2.2.2.2\")\n            .build());\n\n        final var dataAddressRange = CheckpointFunctions.getManagementDataAddressRange(GetManagementDataAddressRangeArgs.builder()\n            .name(addressRange.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  addressRange:\n    type: checkpoint:ManagementAddressRange\n    name: address_range\n    properties:\n      name: My Address Range\n      ipv4AddressFirst: 1.1.1.1\n      ipv4AddressLast: 2.2.2.2\nvariables:\n  dataAddressRange:\n    fn::invoke:\n      function: checkpoint:getManagementDataAddressRange\n      arguments:\n        name: ${addressRange.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataAddressRange.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataAddressRange.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ipv4AddressFirst": {
            "type": "string"
          },
          "ipv4AddressLast": {
            "type": "string"
          },
          "ipv6AddressFirst": {
            "type": "string"
          },
          "ipv6AddressLast": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "ipv4AddressFirst",
          "ipv4AddressLast",
          "ipv6AddressFirst",
          "ipv6AddressLast",
          "natSettings",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataApplicationSite:getManagementDataApplicationSite": {
      "description": "Use this data source to get information on an existing Check Point Application Site.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst applicationSite = new checkpoint.ManagementApplicationSite(\"application_site\", {\n    name: \"applicationsite1\",\n    primaryCategory: \"Social Networking\",\n    urlLists: [\"www.somesite.com\"],\n});\nconst dataApplicationSite = checkpoint.getManagementDataApplicationSiteOutput({\n    name: applicationSite.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\napplication_site = checkpoint.ManagementApplicationSite(\"application_site\",\n    name=\"applicationsite1\",\n    primary_category=\"Social Networking\",\n    url_lists=[\"www.somesite.com\"])\ndata_application_site = checkpoint.get_management_data_application_site_output(name=application_site.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var applicationSite = new Checkpoint.ManagementApplicationSite(\"application_site\", new()\n    {\n        Name = \"applicationsite1\",\n        PrimaryCategory = \"Social Networking\",\n        UrlLists = new[]\n        {\n            \"www.somesite.com\",\n        },\n    });\n\n    var dataApplicationSite = Checkpoint.GetManagementDataApplicationSite.Invoke(new()\n    {\n        Name = applicationSite.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tapplicationSite, err := checkpoint.NewManagementApplicationSite(ctx, \"application_site\", \u0026checkpoint.ManagementApplicationSiteArgs{\n\t\t\tName:            pulumi.String(\"applicationsite1\"),\n\t\t\tPrimaryCategory: pulumi.String(\"Social Networking\"),\n\t\t\tUrlLists: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"www.somesite.com\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataApplicationSiteOutput(ctx, checkpoint.GetManagementDataApplicationSiteOutputArgs{\n\t\t\tName: applicationSite.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSite;\nimport com.pulumi.checkpoint.ManagementApplicationSiteArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataApplicationSiteArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var applicationSite = new ManagementApplicationSite(\"applicationSite\", ManagementApplicationSiteArgs.builder()\n            .name(\"applicationsite1\")\n            .primaryCategory(\"Social Networking\")\n            .urlLists(\"www.somesite.com\")\n            .build());\n\n        final var dataApplicationSite = CheckpointFunctions.getManagementDataApplicationSite(GetManagementDataApplicationSiteArgs.builder()\n            .name(applicationSite.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  applicationSite:\n    type: checkpoint:ManagementApplicationSite\n    name: application_site\n    properties:\n      name: applicationsite1\n      primaryCategory: Social Networking\n      urlLists:\n        - www.somesite.com\nvariables:\n  dataApplicationSite:\n    fn::invoke:\n      function: checkpoint:getManagementDataApplicationSite\n      arguments:\n        name: ${applicationSite.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataApplicationSite.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataApplicationSite.\n",
        "properties": {
          "additionalCategories": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "applicationSignature": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "primaryCategory": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "urlLists": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "urlsDefinedAsRegularExpression": {
            "type": "boolean"
          }
        },
        "required": [
          "additionalCategories",
          "applicationSignature",
          "color",
          "comments",
          "description",
          "groups",
          "id",
          "primaryCategory",
          "tags",
          "urlLists",
          "urlsDefinedAsRegularExpression"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataApplicationSiteCategory:getManagementDataApplicationSiteCategory": {
      "description": "Use this data source to get information on an existing Check Point Application Site Category.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst applicationSiteCategory = new checkpoint.ManagementApplicationSiteCategory(\"application_site_category\", {name: \"applicationcategory1\"});\nconst dataApplicationSiteCategory = checkpoint.getManagementDataApplicationSiteCategoryOutput({\n    name: applicationSiteCategory.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\napplication_site_category = checkpoint.ManagementApplicationSiteCategory(\"application_site_category\", name=\"applicationcategory1\")\ndata_application_site_category = checkpoint.get_management_data_application_site_category_output(name=application_site_category.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var applicationSiteCategory = new Checkpoint.ManagementApplicationSiteCategory(\"application_site_category\", new()\n    {\n        Name = \"applicationcategory1\",\n    });\n\n    var dataApplicationSiteCategory = Checkpoint.GetManagementDataApplicationSiteCategory.Invoke(new()\n    {\n        Name = applicationSiteCategory.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tapplicationSiteCategory, err := checkpoint.NewManagementApplicationSiteCategory(ctx, \"application_site_category\", \u0026checkpoint.ManagementApplicationSiteCategoryArgs{\n\t\t\tName: pulumi.String(\"applicationcategory1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataApplicationSiteCategoryOutput(ctx, checkpoint.GetManagementDataApplicationSiteCategoryOutputArgs{\n\t\t\tName: applicationSiteCategory.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSiteCategory;\nimport com.pulumi.checkpoint.ManagementApplicationSiteCategoryArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataApplicationSiteCategoryArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var applicationSiteCategory = new ManagementApplicationSiteCategory(\"applicationSiteCategory\", ManagementApplicationSiteCategoryArgs.builder()\n            .name(\"applicationcategory1\")\n            .build());\n\n        final var dataApplicationSiteCategory = CheckpointFunctions.getManagementDataApplicationSiteCategory(GetManagementDataApplicationSiteCategoryArgs.builder()\n            .name(applicationSiteCategory.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  applicationSiteCategory:\n    type: checkpoint:ManagementApplicationSiteCategory\n    name: application_site_category\n    properties:\n      name: applicationcategory1\nvariables:\n  dataApplicationSiteCategory:\n    fn::invoke:\n      function: checkpoint:getManagementDataApplicationSiteCategory\n      arguments:\n        name: ${applicationSiteCategory.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataApplicationSiteCategory.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataApplicationSiteCategory.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "description",
          "groups",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataApplicationSiteGroup:getManagementDataApplicationSiteGroup": {
      "description": "Use this data source to get information on an existing Check Point Application Site Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst applicationSiteGroup = new checkpoint.ManagementApplicationSiteGroup(\"application_site_group\", {name: \"my application site group\"});\nconst dataApplicationSiteGroup = checkpoint.getManagementDataApplicationSiteGroupOutput({\n    name: applicationSiteGroup.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\napplication_site_group = checkpoint.ManagementApplicationSiteGroup(\"application_site_group\", name=\"my application site group\")\ndata_application_site_group = checkpoint.get_management_data_application_site_group_output(name=application_site_group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var applicationSiteGroup = new Checkpoint.ManagementApplicationSiteGroup(\"application_site_group\", new()\n    {\n        Name = \"my application site group\",\n    });\n\n    var dataApplicationSiteGroup = Checkpoint.GetManagementDataApplicationSiteGroup.Invoke(new()\n    {\n        Name = applicationSiteGroup.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tapplicationSiteGroup, err := checkpoint.NewManagementApplicationSiteGroup(ctx, \"application_site_group\", \u0026checkpoint.ManagementApplicationSiteGroupArgs{\n\t\t\tName: pulumi.String(\"my application site group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataApplicationSiteGroupOutput(ctx, checkpoint.GetManagementDataApplicationSiteGroupOutputArgs{\n\t\t\tName: applicationSiteGroup.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementApplicationSiteGroup;\nimport com.pulumi.checkpoint.ManagementApplicationSiteGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataApplicationSiteGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var applicationSiteGroup = new ManagementApplicationSiteGroup(\"applicationSiteGroup\", ManagementApplicationSiteGroupArgs.builder()\n            .name(\"my application site group\")\n            .build());\n\n        final var dataApplicationSiteGroup = CheckpointFunctions.getManagementDataApplicationSiteGroup(GetManagementDataApplicationSiteGroupArgs.builder()\n            .name(applicationSiteGroup.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  applicationSiteGroup:\n    type: checkpoint:ManagementApplicationSiteGroup\n    name: application_site_group\n    properties:\n      name: my application site group\nvariables:\n  dataApplicationSiteGroup:\n    fn::invoke:\n      function: checkpoint:getManagementDataApplicationSiteGroup\n      arguments:\n        name: ${applicationSiteGroup.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataApplicationSiteGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataApplicationSiteGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataCenterContent:getManagementDataCenterContent": {
      "description": "Use this data source to get information on an existing Check Point data center content.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```yaml\nvariables:\n  test:\n    fn::invoke:\n      function: checkpoint:getManagementDataCenterContent\n      arguments:\n        name: Network\n        filter:\n          text: TEXT_TO_FIND\n          uri: DATA_CENTER_URI\n        limit: 100\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataCenterContent.\n",
        "properties": {
          "dataCenterName": {
            "type": "string",
            "description": "Name of the Data Center Server where to search for objects.\n"
          },
          "dataCenterUid": {
            "type": "string",
            "description": "Unique identifier of the Data Center Server where to search for objects.\n"
          },
          "filter": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Return results matching the specified filter.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterContentOrder:getManagementDataCenterContentOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order.\norders blocks are documented below.\n"
          },
          "uidInDataCenter": {
            "type": "string",
            "description": "Return result matching the unique identifier of the object on the Data Center Server.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataCenterContent.\n",
        "properties": {
          "dataCenterName": {
            "type": "string"
          },
          "dataCenterUid": {
            "type": "string"
          },
          "filter": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterContentObject:getManagementDataCenterContentObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterContentOrder:getManagementDataCenterContentOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          },
          "uidInDataCenter": {
            "type": "string"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataCenterObject:getManagementDataCenterObject": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataCenterObject.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataCenterObject.\n",
        "properties": {
          "additionalProperties": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterObjectAdditionalProperty:getManagementDataCenterObjectAdditionalProperty"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataCenterName": {
            "type": "string"
          },
          "dataCenters": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterObjectDataCenter:getManagementDataCenterObjectDataCenter"
            },
            "type": "array"
          },
          "deleted": {
            "type": "boolean"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ignoreErrors": {
            "type": "boolean"
          },
          "ignoreWarnings": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "nameInDataCenter": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "typeInDataCenter": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "uidInDataCenter": {
            "type": "string"
          },
          "updatedOnDataCenter": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          }
        },
        "required": [
          "additionalProperties",
          "color",
          "comments",
          "dataCenterName",
          "dataCenters",
          "deleted",
          "groups",
          "id",
          "ignoreErrors",
          "ignoreWarnings",
          "nameInDataCenter",
          "tags",
          "typeInDataCenter",
          "uidInDataCenter",
          "updatedOnDataCenter"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataCenterQuery:getManagementDataCenterQuery": {
      "description": "Use this data source to get information on an existing Check Point Data Center Query.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testQuery = new checkpoint.ManagementDataCenterQuery(\"testQuery\", {\n    name: \"myQuery\",\n    dataCenters: [\"All\"],\n    queryRules: [{\n        keyType: \"predefined\",\n        key: \"name-in-data-center\",\n        values: [\n            \"firstVal\",\n            \"secondVal\",\n        ],\n    }],\n});\nconst dataCenterQuery = checkpoint.getManagementDataCenterQueryOutput({\n    name: testQuery.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_query = checkpoint.ManagementDataCenterQuery(\"testQuery\",\n    name=\"myQuery\",\n    data_centers=[\"All\"],\n    query_rules=[{\n        \"key_type\": \"predefined\",\n        \"key\": \"name-in-data-center\",\n        \"values\": [\n            \"firstVal\",\n            \"secondVal\",\n        ],\n    }])\ndata_center_query = checkpoint.get_management_data_center_query_output(name=test_query.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testQuery = new Checkpoint.ManagementDataCenterQuery(\"testQuery\", new()\n    {\n        Name = \"myQuery\",\n        DataCenters = new[]\n        {\n            \"All\",\n        },\n        QueryRules = new[]\n        {\n            new Checkpoint.Inputs.ManagementDataCenterQueryQueryRuleArgs\n            {\n                KeyType = \"predefined\",\n                Key = \"name-in-data-center\",\n                Values = new[]\n                {\n                    \"firstVal\",\n                    \"secondVal\",\n                },\n            },\n        },\n    });\n\n    var dataCenterQuery = Checkpoint.GetManagementDataCenterQuery.Invoke(new()\n    {\n        Name = testQuery.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestQuery, err := checkpoint.NewManagementDataCenterQuery(ctx, \"testQuery\", \u0026checkpoint.ManagementDataCenterQueryArgs{\n\t\t\tName: pulumi.String(\"myQuery\"),\n\t\t\tDataCenters: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"All\"),\n\t\t\t},\n\t\t\tQueryRules: checkpoint.ManagementDataCenterQueryQueryRuleArray{\n\t\t\t\t\u0026checkpoint.ManagementDataCenterQueryQueryRuleArgs{\n\t\t\t\t\tKeyType: pulumi.String(\"predefined\"),\n\t\t\t\t\tKey:     pulumi.String(\"name-in-data-center\"),\n\t\t\t\t\tValues: pulumi.StringArray{\n\t\t\t\t\t\tpulumi.String(\"firstVal\"),\n\t\t\t\t\t\tpulumi.String(\"secondVal\"),\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataCenterQueryOutput(ctx, checkpoint.GetManagementDataCenterQueryOutputArgs{\n\t\t\tName: testQuery.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataCenterQuery;\nimport com.pulumi.checkpoint.ManagementDataCenterQueryArgs;\nimport com.pulumi.checkpoint.inputs.ManagementDataCenterQueryQueryRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataCenterQueryArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testQuery = new ManagementDataCenterQuery(\"testQuery\", ManagementDataCenterQueryArgs.builder()\n            .name(\"myQuery\")\n            .dataCenters(\"All\")\n            .queryRules(ManagementDataCenterQueryQueryRuleArgs.builder()\n                .keyType(\"predefined\")\n                .key(\"name-in-data-center\")\n                .values(                \n                    \"firstVal\",\n                    \"secondVal\")\n                .build())\n            .build());\n\n        final var dataCenterQuery = CheckpointFunctions.getManagementDataCenterQuery(GetManagementDataCenterQueryArgs.builder()\n            .name(testQuery.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testQuery:\n    type: checkpoint:ManagementDataCenterQuery\n    properties:\n      name: myQuery\n      dataCenters:\n        - All\n      queryRules:\n        - keyType: predefined\n          key: name-in-data-center\n          values:\n            - firstVal\n            - secondVal\nvariables:\n  dataCenterQuery:\n    fn::invoke:\n      function: checkpoint:getManagementDataCenterQuery\n      arguments:\n        name: ${testQuery.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataCenterQuery.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataCenterQuery.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataCenters": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "queryRules": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataCenterQueryQueryRule:getManagementDataCenterQueryQueryRule"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "dataCenters",
          "id",
          "queryRules",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataDnsDomain:getManagementDataDnsDomain": {
      "description": "Use this data source to get information on an existing Check Point Dns Domain.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dnsDomain = new checkpoint.ManagementDnsDomain(\"dns_domain\", {\n    name: \"My DNS domain\",\n    isSubDomain: true,\n});\nconst dataDnsDomain = checkpoint.getManagementDataDnsDomainOutput({\n    name: dnsDomain.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndns_domain = checkpoint.ManagementDnsDomain(\"dns_domain\",\n    name=\"My DNS domain\",\n    is_sub_domain=True)\ndata_dns_domain = checkpoint.get_management_data_dns_domain_output(name=dns_domain.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dnsDomain = new Checkpoint.ManagementDnsDomain(\"dns_domain\", new()\n    {\n        Name = \"My DNS domain\",\n        IsSubDomain = true,\n    });\n\n    var dataDnsDomain = Checkpoint.GetManagementDataDnsDomain.Invoke(new()\n    {\n        Name = dnsDomain.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tdnsDomain, err := checkpoint.NewManagementDnsDomain(ctx, \"dns_domain\", \u0026checkpoint.ManagementDnsDomainArgs{\n\t\t\tName:        pulumi.String(\"My DNS domain\"),\n\t\t\tIsSubDomain: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataDnsDomainOutput(ctx, checkpoint.GetManagementDataDnsDomainOutputArgs{\n\t\t\tName: dnsDomain.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDnsDomain;\nimport com.pulumi.checkpoint.ManagementDnsDomainArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataDnsDomainArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var dnsDomain = new ManagementDnsDomain(\"dnsDomain\", ManagementDnsDomainArgs.builder()\n            .name(\"My DNS domain\")\n            .isSubDomain(true)\n            .build());\n\n        final var dataDnsDomain = CheckpointFunctions.getManagementDataDnsDomain(GetManagementDataDnsDomainArgs.builder()\n            .name(dnsDomain.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  dnsDomain:\n    type: checkpoint:ManagementDnsDomain\n    name: dns_domain\n    properties:\n      name: My DNS domain\n      isSubDomain: true\nvariables:\n  dataDnsDomain:\n    fn::invoke:\n      function: checkpoint:getManagementDataDnsDomain\n      arguments:\n        name: ${dnsDomain.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataDnsDomain.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataDnsDomain.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "isSubDomain": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "isSubDomain",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataDynamicObject:getManagementDataDynamicObject": {
      "description": "Use this data source to get information on an existing Check Point Dynamic Object.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dynamicObject = new checkpoint.ManagementDynamicObject(\"dynamic_object\", {name: \"Dynamic Object\"});\nconst dataDynamicObject = checkpoint.getManagementDataDynamicObjectOutput({\n    name: dynamicObject.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndynamic_object = checkpoint.ManagementDynamicObject(\"dynamic_object\", name=\"Dynamic Object\")\ndata_dynamic_object = checkpoint.get_management_data_dynamic_object_output(name=dynamic_object.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dynamicObject = new Checkpoint.ManagementDynamicObject(\"dynamic_object\", new()\n    {\n        Name = \"Dynamic Object\",\n    });\n\n    var dataDynamicObject = Checkpoint.GetManagementDataDynamicObject.Invoke(new()\n    {\n        Name = dynamicObject.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tdynamicObject, err := checkpoint.NewManagementDynamicObject(ctx, \"dynamic_object\", \u0026checkpoint.ManagementDynamicObjectArgs{\n\t\t\tName: pulumi.String(\"Dynamic Object\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataDynamicObjectOutput(ctx, checkpoint.GetManagementDataDynamicObjectOutputArgs{\n\t\t\tName: dynamicObject.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDynamicObject;\nimport com.pulumi.checkpoint.ManagementDynamicObjectArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataDynamicObjectArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var dynamicObject = new ManagementDynamicObject(\"dynamicObject\", ManagementDynamicObjectArgs.builder()\n            .name(\"Dynamic Object\")\n            .build());\n\n        final var dataDynamicObject = CheckpointFunctions.getManagementDataDynamicObject(GetManagementDataDynamicObjectArgs.builder()\n            .name(dynamicObject.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  dynamicObject:\n    type: checkpoint:ManagementDynamicObject\n    name: dynamic_object\n    properties:\n      name: Dynamic Object\nvariables:\n  dataDynamicObject:\n    fn::invoke:\n      function: checkpoint:getManagementDataDynamicObject\n      arguments:\n        name: ${dynamicObject.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataDynamicObject.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataDynamicObject.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataExceptionGroup:getManagementDataExceptionGroup": {
      "description": "Use this data source to get information on an existing Check Point Exception Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst exceptionGroup = new checkpoint.ManagementExceptionGroup(\"exception_group\", {\n    name: \"exception group\",\n    applyOn: \"manually-select-threat-rules\",\n});\nconst dataExceptionGroup = checkpoint.getManagementDataExceptionGroupOutput({\n    name: exceptionGroup.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexception_group = checkpoint.ManagementExceptionGroup(\"exception_group\",\n    name=\"exception group\",\n    apply_on=\"manually-select-threat-rules\")\ndata_exception_group = checkpoint.get_management_data_exception_group_output(name=exception_group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var exceptionGroup = new Checkpoint.ManagementExceptionGroup(\"exception_group\", new()\n    {\n        Name = \"exception group\",\n        ApplyOn = \"manually-select-threat-rules\",\n    });\n\n    var dataExceptionGroup = Checkpoint.GetManagementDataExceptionGroup.Invoke(new()\n    {\n        Name = exceptionGroup.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texceptionGroup, err := checkpoint.NewManagementExceptionGroup(ctx, \"exception_group\", \u0026checkpoint.ManagementExceptionGroupArgs{\n\t\t\tName:    pulumi.String(\"exception group\"),\n\t\t\tApplyOn: pulumi.String(\"manually-select-threat-rules\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataExceptionGroupOutput(ctx, checkpoint.GetManagementDataExceptionGroupOutputArgs{\n\t\t\tName: exceptionGroup.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementExceptionGroup;\nimport com.pulumi.checkpoint.ManagementExceptionGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataExceptionGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var exceptionGroup = new ManagementExceptionGroup(\"exceptionGroup\", ManagementExceptionGroupArgs.builder()\n            .name(\"exception group\")\n            .applyOn(\"manually-select-threat-rules\")\n            .build());\n\n        final var dataExceptionGroup = CheckpointFunctions.getManagementDataExceptionGroup(GetManagementDataExceptionGroupArgs.builder()\n            .name(exceptionGroup.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  exceptionGroup:\n    type: checkpoint:ManagementExceptionGroup\n    name: exception_group\n    properties:\n      name: exception group\n      applyOn: manually-select-threat-rules\nvariables:\n  dataExceptionGroup:\n    fn::invoke:\n      function: checkpoint:getManagementDataExceptionGroup\n      arguments:\n        name: ${exceptionGroup.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataExceptionGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataExceptionGroup.\n",
        "properties": {
          "appliedProfile": {
            "type": "string"
          },
          "applyOn": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "appliedProfile",
          "applyOn",
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataGroup:getManagementDataGroup": {
      "description": "Use this data source to get information on an existing Check Point Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst group = new checkpoint.ManagementGroup(\"group\", {name: \"My Group\"});\nconst dataGroup = checkpoint.getManagementDataGroupOutput({\n    name: group.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngroup = checkpoint.ManagementGroup(\"group\", name=\"My Group\")\ndata_group = checkpoint.get_management_data_group_output(name=group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var @group = new Checkpoint.ManagementGroup(\"group\", new()\n    {\n        Name = \"My Group\",\n    });\n\n    var dataGroup = Checkpoint.GetManagementDataGroup.Invoke(new()\n    {\n        Name = @group.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tgroup, err := checkpoint.NewManagementGroup(ctx, \"group\", \u0026checkpoint.ManagementGroupArgs{\n\t\t\tName: pulumi.String(\"My Group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataGroupOutput(ctx, checkpoint.GetManagementDataGroupOutputArgs{\n\t\t\tName: group.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGroup;\nimport com.pulumi.checkpoint.ManagementGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var group = new ManagementGroup(\"group\", ManagementGroupArgs.builder()\n            .name(\"My Group\")\n            .build());\n\n        final var dataGroup = CheckpointFunctions.getManagementDataGroup(GetManagementDataGroupArgs.builder()\n            .name(group.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  group:\n    type: checkpoint:ManagementGroup\n    properties:\n      name: My Group\nvariables:\n  dataGroup:\n    fn::invoke:\n      function: checkpoint:getManagementDataGroup\n      arguments:\n        name: ${group.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataGroupWithExclusion:getManagementDataGroupWithExclusion": {
      "description": "Use this data source to get information on an existing Check Point Group With Exclusion.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst group1 = new checkpoint.ManagementGroup(\"group1\", {name: \"group1\"});\nconst group2 = new checkpoint.ManagementGroup(\"group2\", {name: \"group2\"});\nconst groupWithExclusion = new checkpoint.ManagementGroupWithExclusion(\"group_with_exclusion\", {\n    name: \"Group with exclusion\",\n    include: group1.name,\n    except: group2.name,\n});\nconst dataGroupWithExclusion = checkpoint.getManagementDataGroupWithExclusionOutput({\n    name: groupWithExclusion.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngroup1 = checkpoint.ManagementGroup(\"group1\", name=\"group1\")\ngroup2 = checkpoint.ManagementGroup(\"group2\", name=\"group2\")\ngroup_with_exclusion = checkpoint.ManagementGroupWithExclusion(\"group_with_exclusion\",\n    name=\"Group with exclusion\",\n    include=group1.name,\n    except_=group2.name)\ndata_group_with_exclusion = checkpoint.get_management_data_group_with_exclusion_output(name=group_with_exclusion.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var group1 = new Checkpoint.ManagementGroup(\"group1\", new()\n    {\n        Name = \"group1\",\n    });\n\n    var group2 = new Checkpoint.ManagementGroup(\"group2\", new()\n    {\n        Name = \"group2\",\n    });\n\n    var groupWithExclusion = new Checkpoint.ManagementGroupWithExclusion(\"group_with_exclusion\", new()\n    {\n        Name = \"Group with exclusion\",\n        Include = group1.Name,\n        Except = group2.Name,\n    });\n\n    var dataGroupWithExclusion = Checkpoint.GetManagementDataGroupWithExclusion.Invoke(new()\n    {\n        Name = groupWithExclusion.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tgroup1, err := checkpoint.NewManagementGroup(ctx, \"group1\", \u0026checkpoint.ManagementGroupArgs{\n\t\t\tName: pulumi.String(\"group1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgroup2, err := checkpoint.NewManagementGroup(ctx, \"group2\", \u0026checkpoint.ManagementGroupArgs{\n\t\t\tName: pulumi.String(\"group2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tgroupWithExclusion, err := checkpoint.NewManagementGroupWithExclusion(ctx, \"group_with_exclusion\", \u0026checkpoint.ManagementGroupWithExclusionArgs{\n\t\t\tName:    pulumi.String(\"Group with exclusion\"),\n\t\t\tInclude: group1.Name,\n\t\t\tExcept:  group2.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataGroupWithExclusionOutput(ctx, checkpoint.GetManagementDataGroupWithExclusionOutputArgs{\n\t\t\tName: groupWithExclusion.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGroup;\nimport com.pulumi.checkpoint.ManagementGroupArgs;\nimport com.pulumi.checkpoint.ManagementGroupWithExclusion;\nimport com.pulumi.checkpoint.ManagementGroupWithExclusionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataGroupWithExclusionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var group1 = new ManagementGroup(\"group1\", ManagementGroupArgs.builder()\n            .name(\"group1\")\n            .build());\n\n        var group2 = new ManagementGroup(\"group2\", ManagementGroupArgs.builder()\n            .name(\"group2\")\n            .build());\n\n        var groupWithExclusion = new ManagementGroupWithExclusion(\"groupWithExclusion\", ManagementGroupWithExclusionArgs.builder()\n            .name(\"Group with exclusion\")\n            .include(group1.name())\n            .except(group2.name())\n            .build());\n\n        final var dataGroupWithExclusion = CheckpointFunctions.getManagementDataGroupWithExclusion(GetManagementDataGroupWithExclusionArgs.builder()\n            .name(groupWithExclusion.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  group1:\n    type: checkpoint:ManagementGroup\n    properties:\n      name: group1\n  group2:\n    type: checkpoint:ManagementGroup\n    properties:\n      name: group2\n  groupWithExclusion:\n    type: checkpoint:ManagementGroupWithExclusion\n    name: group_with_exclusion\n    properties:\n      name: Group with exclusion\n      include: ${group1.name}\n      except: ${group2.name}\nvariables:\n  dataGroupWithExclusion:\n    fn::invoke:\n      function: checkpoint:getManagementDataGroupWithExclusion\n      arguments:\n        name: ${groupWithExclusion.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataGroupWithExclusion.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataGroupWithExclusion.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "except": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "include": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "except",
          "groups",
          "id",
          "include",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataHost:getManagementDataHost": {
      "description": "Use this data source to get information on an existing Check Point Host.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst host = new checkpoint.ManagementHost(\"host\", {\n    name: \"My Host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst dataHost = checkpoint.getManagementDataHostOutput({\n    name: host.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhost = checkpoint.ManagementHost(\"host\",\n    name=\"My Host\",\n    ipv4_address=\"1.2.3.4\")\ndata_host = checkpoint.get_management_data_host_output(name=host.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var host = new Checkpoint.ManagementHost(\"host\", new()\n    {\n        Name = \"My Host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var dataHost = Checkpoint.GetManagementDataHost.Invoke(new()\n    {\n        Name = host.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thost, err := checkpoint.NewManagementHost(ctx, \"host\", \u0026checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"My Host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataHostOutput(ctx, checkpoint.GetManagementDataHostOutputArgs{\n\t\t\tName: host.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataHostArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var host = new ManagementHost(\"host\", ManagementHostArgs.builder()\n            .name(\"My Host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        final var dataHost = CheckpointFunctions.getManagementDataHost(GetManagementDataHostArgs.builder()\n            .name(host.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  host:\n    type: checkpoint:ManagementHost\n    properties:\n      name: My Host\n      ipv4Address: 1.2.3.4\nvariables:\n  dataHost:\n    fn::invoke:\n      function: checkpoint:getManagementDataHost\n      arguments:\n        name: ${host.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataHost.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataHost.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "hostServers": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataHostHostServer:getManagementDataHostHostServer"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataHostInterface:getManagementDataHostInterface"
            },
            "type": "array"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "hostServers",
          "id",
          "interfaces",
          "ipv4Address",
          "ipv6Address",
          "natSettings",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataHttpsLayer:getManagementDataHttpsLayer": {
      "description": "Use this data source to get information on an existing Check Point Https Layer.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst httpsLayer = new checkpoint.ManagementHttpsLayer(\"https_layer\", {name: \"%s\"});\nconst dataHttpsLayer = checkpoint.getManagementDataHttpsLayerOutput({\n    name: httpsLayer.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhttps_layer = checkpoint.ManagementHttpsLayer(\"https_layer\", name=\"%s\")\ndata_https_layer = checkpoint.get_management_data_https_layer_output(name=https_layer.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var httpsLayer = new Checkpoint.ManagementHttpsLayer(\"https_layer\", new()\n    {\n        Name = \"%s\",\n    });\n\n    var dataHttpsLayer = Checkpoint.GetManagementDataHttpsLayer.Invoke(new()\n    {\n        Name = httpsLayer.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thttpsLayer, err := checkpoint.NewManagementHttpsLayer(ctx, \"https_layer\", \u0026checkpoint.ManagementHttpsLayerArgs{\n\t\t\tName: pulumi.String(\"%s\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataHttpsLayerOutput(ctx, checkpoint.GetManagementDataHttpsLayerOutputArgs{\n\t\t\tName: httpsLayer.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHttpsLayer;\nimport com.pulumi.checkpoint.ManagementHttpsLayerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataHttpsLayerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var httpsLayer = new ManagementHttpsLayer(\"httpsLayer\", ManagementHttpsLayerArgs.builder()\n            .name(\"%s\")\n            .build());\n\n        final var dataHttpsLayer = CheckpointFunctions.getManagementDataHttpsLayer(GetManagementDataHttpsLayerArgs.builder()\n            .name(httpsLayer.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  httpsLayer:\n    type: checkpoint:ManagementHttpsLayer\n    name: https_layer\n    properties:\n      name: '%s'\nvariables:\n  dataHttpsLayer:\n    fn::invoke:\n      function: checkpoint:getManagementDataHttpsLayer\n      arguments:\n        name: ${httpsLayer.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataHttpsLayer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataHttpsLayer.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "shared": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "shared",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataHttpsRule:getManagementDataHttpsRule": {
      "description": "Use this data source to get information on an existing Check Point Https Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst httpsRule = new checkpoint.ManagementHttpsRule(\"https_rule\", {\n    name: \"HTTPS Rule\",\n    position: {\n        top: \"top\",\n    },\n    layer: \"Default Layer\",\n    blades: [\"IPS\"],\n    destinations: [\"Internet\"],\n    enabled: true,\n    services: [\"HTTPS default services\"],\n    sources: [\"DMZNet\"],\n    installOns: [\"Policy HTTPS Targets\"],\n    siteCategories: [\"Any\"],\n});\nconst dataHttpsRule = checkpoint.getManagementDataHttpsRuleOutput({\n    ruleNumber: \"1\",\n    layer: httpsRule.layer,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhttps_rule = checkpoint.ManagementHttpsRule(\"https_rule\",\n    name=\"HTTPS Rule\",\n    position={\n        \"top\": \"top\",\n    },\n    layer=\"Default Layer\",\n    blades=[\"IPS\"],\n    destinations=[\"Internet\"],\n    enabled=True,\n    services=[\"HTTPS default services\"],\n    sources=[\"DMZNet\"],\n    install_ons=[\"Policy HTTPS Targets\"],\n    site_categories=[\"Any\"])\ndata_https_rule = checkpoint.get_management_data_https_rule_output(rule_number=\"1\",\n    layer=https_rule.layer)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var httpsRule = new Checkpoint.ManagementHttpsRule(\"https_rule\", new()\n    {\n        Name = \"HTTPS Rule\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        Layer = \"Default Layer\",\n        Blades = new[]\n        {\n            \"IPS\",\n        },\n        Destinations = new[]\n        {\n            \"Internet\",\n        },\n        Enabled = true,\n        Services = new[]\n        {\n            \"HTTPS default services\",\n        },\n        Sources = new[]\n        {\n            \"DMZNet\",\n        },\n        InstallOns = new[]\n        {\n            \"Policy HTTPS Targets\",\n        },\n        SiteCategories = new[]\n        {\n            \"Any\",\n        },\n    });\n\n    var dataHttpsRule = Checkpoint.GetManagementDataHttpsRule.Invoke(new()\n    {\n        RuleNumber = \"1\",\n        Layer = httpsRule.Layer,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thttpsRule, err := checkpoint.NewManagementHttpsRule(ctx, \"https_rule\", \u0026checkpoint.ManagementHttpsRuleArgs{\n\t\t\tName: pulumi.String(\"HTTPS Rule\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tLayer: pulumi.String(\"Default Layer\"),\n\t\t\tBlades: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"IPS\"),\n\t\t\t},\n\t\t\tDestinations: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Internet\"),\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t\tServices: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"HTTPS default services\"),\n\t\t\t},\n\t\t\tSources: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"DMZNet\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Policy HTTPS Targets\"),\n\t\t\t},\n\t\t\tSiteCategories: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Any\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataHttpsRuleOutput(ctx, checkpoint.GetManagementDataHttpsRuleOutputArgs{\n\t\t\tRuleNumber: pulumi.String(\"1\"),\n\t\t\tLayer:      httpsRule.Layer,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHttpsRule;\nimport com.pulumi.checkpoint.ManagementHttpsRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataHttpsRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var httpsRule = new ManagementHttpsRule(\"httpsRule\", ManagementHttpsRuleArgs.builder()\n            .name(\"HTTPS Rule\")\n            .position(Map.of(\"top\", \"top\"))\n            .layer(\"Default Layer\")\n            .blades(\"IPS\")\n            .destinations(\"Internet\")\n            .enabled(true)\n            .services(\"HTTPS default services\")\n            .sources(\"DMZNet\")\n            .installOns(\"Policy HTTPS Targets\")\n            .siteCategories(\"Any\")\n            .build());\n\n        final var dataHttpsRule = CheckpointFunctions.getManagementDataHttpsRule(GetManagementDataHttpsRuleArgs.builder()\n            .ruleNumber(\"1\")\n            .layer(httpsRule.layer())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  httpsRule:\n    type: checkpoint:ManagementHttpsRule\n    name: https_rule\n    properties:\n      name: HTTPS Rule\n      position:\n        top: top\n      layer: Default Layer\n      blades:\n        - IPS\n      destinations:\n        - Internet\n      enabled: true\n      services:\n        - HTTPS default services\n      sources:\n        - DMZNet\n      installOns:\n        - Policy HTTPS Targets\n      siteCategories:\n        - Any\nvariables:\n  dataHttpsRule:\n    fn::invoke:\n      function: checkpoint:getManagementDataHttpsRule\n      arguments:\n        ruleNumber: '1'\n        layer: ${httpsRule.layer}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataHttpsRule.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string",
            "description": "Layer that holds the Object. Identified by the Name or UID.\n"
          },
          "ruleNumber": {
            "type": "string",
            "description": "Rule number.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "layer"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataHttpsRule.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "blades": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "certificate": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "destinationNegate": {
            "type": "boolean"
          },
          "destinations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "layer": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "ruleNumber": {
            "type": "string"
          },
          "serviceNegate": {
            "type": "boolean"
          },
          "services": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "siteCategories": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "siteCategoryNegate": {
            "type": "boolean"
          },
          "sourceNegate": {
            "type": "boolean"
          },
          "sources": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "track": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "action",
          "blades",
          "certificate",
          "comments",
          "destinationNegate",
          "destinations",
          "enabled",
          "id",
          "installOns",
          "layer",
          "name",
          "serviceNegate",
          "services",
          "siteCategories",
          "siteCategoryNegate",
          "sourceNegate",
          "sources",
          "track"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataHttpsSection:getManagementDataHttpsSection": {
      "description": "Use this data source to get information on an existing Check Point Https Section.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst httpsSection = new checkpoint.ManagementHttpsSection(\"https_section\", {\n    name: \"HTTPS section\",\n    layer: \"Default Layer\",\n    position: {\n        top: \"top\",\n    },\n});\nconst dataHttpsSection = checkpoint.getManagementDataHttpsSectionOutput({\n    name: httpsSection.name,\n    layer: httpsSection.layer,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhttps_section = checkpoint.ManagementHttpsSection(\"https_section\",\n    name=\"HTTPS section\",\n    layer=\"Default Layer\",\n    position={\n        \"top\": \"top\",\n    })\ndata_https_section = checkpoint.get_management_data_https_section_output(name=https_section.name,\n    layer=https_section.layer)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var httpsSection = new Checkpoint.ManagementHttpsSection(\"https_section\", new()\n    {\n        Name = \"HTTPS section\",\n        Layer = \"Default Layer\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var dataHttpsSection = Checkpoint.GetManagementDataHttpsSection.Invoke(new()\n    {\n        Name = httpsSection.Name,\n        Layer = httpsSection.Layer,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thttpsSection, err := checkpoint.NewManagementHttpsSection(ctx, \"https_section\", \u0026checkpoint.ManagementHttpsSectionArgs{\n\t\t\tName:  pulumi.String(\"HTTPS section\"),\n\t\t\tLayer: pulumi.String(\"Default Layer\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataHttpsSectionOutput(ctx, checkpoint.GetManagementDataHttpsSectionOutputArgs{\n\t\t\tName:  httpsSection.Name,\n\t\t\tLayer: httpsSection.Layer,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHttpsSection;\nimport com.pulumi.checkpoint.ManagementHttpsSectionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataHttpsSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var httpsSection = new ManagementHttpsSection(\"httpsSection\", ManagementHttpsSectionArgs.builder()\n            .name(\"HTTPS section\")\n            .layer(\"Default Layer\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var dataHttpsSection = CheckpointFunctions.getManagementDataHttpsSection(GetManagementDataHttpsSectionArgs.builder()\n            .name(httpsSection.name())\n            .layer(httpsSection.layer())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  httpsSection:\n    type: checkpoint:ManagementHttpsSection\n    name: https_section\n    properties:\n      name: HTTPS section\n      layer: Default Layer\n      position:\n        top: top\nvariables:\n  dataHttpsSection:\n    fn::invoke:\n      function: checkpoint:getManagementDataHttpsSection\n      arguments:\n        name: ${httpsSection.name}\n        layer: ${httpsSection.layer}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataHttpsSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string",
            "description": "Layer that holds the Object. Identified by the Name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "layer"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataHttpsSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "layer"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataMulticastAddressRange:getManagementDataMulticastAddressRange": {
      "description": "Use this data source to get information on an existing Check Point Multicast Address Range.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst multicastAddressRange = new checkpoint.ManagementMulticastAddressRange(\"multicast_address_range\", {\n    name: \"multicast address range\",\n    ipv4AddressFirst: \"224.0.0.1\",\n    ipv4AddressLast: \"224.0.0.4\",\n});\nconst dataMulticastAddressRange = checkpoint.getManagementDataMulticastAddressRangeOutput({\n    name: multicastAddressRange.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmulticast_address_range = checkpoint.ManagementMulticastAddressRange(\"multicast_address_range\",\n    name=\"multicast address range\",\n    ipv4_address_first=\"224.0.0.1\",\n    ipv4_address_last=\"224.0.0.4\")\ndata_multicast_address_range = checkpoint.get_management_data_multicast_address_range_output(name=multicast_address_range.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var multicastAddressRange = new Checkpoint.ManagementMulticastAddressRange(\"multicast_address_range\", new()\n    {\n        Name = \"multicast address range\",\n        Ipv4AddressFirst = \"224.0.0.1\",\n        Ipv4AddressLast = \"224.0.0.4\",\n    });\n\n    var dataMulticastAddressRange = Checkpoint.GetManagementDataMulticastAddressRange.Invoke(new()\n    {\n        Name = multicastAddressRange.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmulticastAddressRange, err := checkpoint.NewManagementMulticastAddressRange(ctx, \"multicast_address_range\", \u0026checkpoint.ManagementMulticastAddressRangeArgs{\n\t\t\tName:             pulumi.String(\"multicast address range\"),\n\t\t\tIpv4AddressFirst: pulumi.String(\"224.0.0.1\"),\n\t\t\tIpv4AddressLast:  pulumi.String(\"224.0.0.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataMulticastAddressRangeOutput(ctx, checkpoint.GetManagementDataMulticastAddressRangeOutputArgs{\n\t\t\tName: multicastAddressRange.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMulticastAddressRange;\nimport com.pulumi.checkpoint.ManagementMulticastAddressRangeArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataMulticastAddressRangeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var multicastAddressRange = new ManagementMulticastAddressRange(\"multicastAddressRange\", ManagementMulticastAddressRangeArgs.builder()\n            .name(\"multicast address range\")\n            .ipv4AddressFirst(\"224.0.0.1\")\n            .ipv4AddressLast(\"224.0.0.4\")\n            .build());\n\n        final var dataMulticastAddressRange = CheckpointFunctions.getManagementDataMulticastAddressRange(GetManagementDataMulticastAddressRangeArgs.builder()\n            .name(multicastAddressRange.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  multicastAddressRange:\n    type: checkpoint:ManagementMulticastAddressRange\n    name: multicast_address_range\n    properties:\n      name: multicast address range\n      ipv4AddressFirst: 224.0.0.1\n      ipv4AddressLast: 224.0.0.4\nvariables:\n  dataMulticastAddressRange:\n    fn::invoke:\n      function: checkpoint:getManagementDataMulticastAddressRange\n      arguments:\n        name: ${multicastAddressRange.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataMulticastAddressRange.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataMulticastAddressRange.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv4AddressFirst": {
            "type": "string"
          },
          "ipv4AddressLast": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "ipv6AddressFirst": {
            "type": "string"
          },
          "ipv6AddressLast": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "ipv4Address",
          "ipv4AddressFirst",
          "ipv4AddressLast",
          "ipv6Address",
          "ipv6AddressFirst",
          "ipv6AddressLast",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataNetwork:getManagementDataNetwork": {
      "description": "Use this data source to get information on an existing Check Point Network Object.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst network = new checkpoint.ManagementNetwork(\"network\", {\n    name: \"My Network\",\n    subnet4: \"10.0.0.0\",\n    maskLength4: 24,\n});\nconst dataNetwork = checkpoint.getManagementDataNetworkOutput({\n    name: network.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nnetwork = checkpoint.ManagementNetwork(\"network\",\n    name=\"My Network\",\n    subnet4=\"10.0.0.0\",\n    mask_length4=24)\ndata_network = checkpoint.get_management_data_network_output(name=network.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var network = new Checkpoint.ManagementNetwork(\"network\", new()\n    {\n        Name = \"My Network\",\n        Subnet4 = \"10.0.0.0\",\n        MaskLength4 = 24,\n    });\n\n    var dataNetwork = Checkpoint.GetManagementDataNetwork.Invoke(new()\n    {\n        Name = network.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tnetwork, err := checkpoint.NewManagementNetwork(ctx, \"network\", \u0026checkpoint.ManagementNetworkArgs{\n\t\t\tName:        pulumi.String(\"My Network\"),\n\t\t\tSubnet4:     pulumi.String(\"10.0.0.0\"),\n\t\t\tMaskLength4: pulumi.Float64(24),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataNetworkOutput(ctx, checkpoint.GetManagementDataNetworkOutputArgs{\n\t\t\tName: network.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNetwork;\nimport com.pulumi.checkpoint.ManagementNetworkArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataNetworkArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var network = new ManagementNetwork(\"network\", ManagementNetworkArgs.builder()\n            .name(\"My Network\")\n            .subnet4(\"10.0.0.0\")\n            .maskLength4(24.0)\n            .build());\n\n        final var dataNetwork = CheckpointFunctions.getManagementDataNetwork(GetManagementDataNetworkArgs.builder()\n            .name(network.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  network:\n    type: checkpoint:ManagementNetwork\n    properties:\n      name: My Network\n      subnet4: 10.0.0.0\n      maskLength4: '24'\nvariables:\n  dataNetwork:\n    fn::invoke:\n      function: checkpoint:getManagementDataNetwork\n      arguments:\n        name: ${network.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataNetwork.\n",
        "properties": {
          "groups": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of group identifiers.\n"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataNetwork.\n",
        "properties": {
          "broadcast": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "maskLength4": {
            "type": "number"
          },
          "maskLength6": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "subnet4": {
            "type": "string"
          },
          "subnet6": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "broadcast",
          "color",
          "comments",
          "id",
          "maskLength4",
          "maskLength6",
          "natSettings",
          "subnet4",
          "subnet6",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataOpsecApplication:getManagementDataOpsecApplication": {
      "description": "Use this data source to get information on an existing Check Point Opsec Application.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst myhost = new checkpoint.ManagementHost(\"myhost\", {\n    name: \"myhost\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst opsecApplication = new checkpoint.ManagementOpsecApplication(\"opsec_application\", {\n    name: \"OPSEC application\",\n    host: myhost.name,\n    cpmi: {\n        enabled: \"true\",\n        administrator_profile: \"read only all\",\n        use_administrator_credentials: \"false\",\n    },\n    lea: {\n        enabled: \"true\",\n        access_permissions: \"show all\",\n    },\n});\nconst dataOpsecApplication = checkpoint.getManagementDataOpsecApplicationOutput({\n    name: opsecApplication.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmyhost = checkpoint.ManagementHost(\"myhost\",\n    name=\"myhost\",\n    ipv4_address=\"1.2.3.4\")\nopsec_application = checkpoint.ManagementOpsecApplication(\"opsec_application\",\n    name=\"OPSEC application\",\n    host=myhost.name,\n    cpmi={\n        \"enabled\": \"true\",\n        \"administrator_profile\": \"read only all\",\n        \"use_administrator_credentials\": \"false\",\n    },\n    lea={\n        \"enabled\": \"true\",\n        \"access_permissions\": \"show all\",\n    })\ndata_opsec_application = checkpoint.get_management_data_opsec_application_output(name=opsec_application.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myhost = new Checkpoint.ManagementHost(\"myhost\", new()\n    {\n        Name = \"myhost\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var opsecApplication = new Checkpoint.ManagementOpsecApplication(\"opsec_application\", new()\n    {\n        Name = \"OPSEC application\",\n        Host = myhost.Name,\n        Cpmi = \n        {\n            { \"enabled\", \"true\" },\n            { \"administrator_profile\", \"read only all\" },\n            { \"use_administrator_credentials\", \"false\" },\n        },\n        Lea = \n        {\n            { \"enabled\", \"true\" },\n            { \"access_permissions\", \"show all\" },\n        },\n    });\n\n    var dataOpsecApplication = Checkpoint.GetManagementDataOpsecApplication.Invoke(new()\n    {\n        Name = opsecApplication.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmyhost, err := checkpoint.NewManagementHost(ctx, \"myhost\", \u0026checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"myhost\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\topsecApplication, err := checkpoint.NewManagementOpsecApplication(ctx, \"opsec_application\", \u0026checkpoint.ManagementOpsecApplicationArgs{\n\t\t\tName: pulumi.String(\"OPSEC application\"),\n\t\t\tHost: myhost.Name,\n\t\t\tCpmi: pulumi.StringMap{\n\t\t\t\t\"enabled\":                       pulumi.String(\"true\"),\n\t\t\t\t\"administrator_profile\":         pulumi.String(\"read only all\"),\n\t\t\t\t\"use_administrator_credentials\": pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tLea: pulumi.StringMap{\n\t\t\t\t\"enabled\":            pulumi.String(\"true\"),\n\t\t\t\t\"access_permissions\": pulumi.String(\"show all\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataOpsecApplicationOutput(ctx, checkpoint.GetManagementDataOpsecApplicationOutputArgs{\n\t\t\tName: opsecApplication.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.ManagementOpsecApplication;\nimport com.pulumi.checkpoint.ManagementOpsecApplicationArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataOpsecApplicationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var myhost = new ManagementHost(\"myhost\", ManagementHostArgs.builder()\n            .name(\"myhost\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        var opsecApplication = new ManagementOpsecApplication(\"opsecApplication\", ManagementOpsecApplicationArgs.builder()\n            .name(\"OPSEC application\")\n            .host(myhost.name())\n            .cpmi(Map.ofEntries(\n                Map.entry(\"enabled\", \"true\"),\n                Map.entry(\"administrator_profile\", \"read only all\"),\n                Map.entry(\"use_administrator_credentials\", \"false\")\n            ))\n            .lea(Map.ofEntries(\n                Map.entry(\"enabled\", \"true\"),\n                Map.entry(\"access_permissions\", \"show all\")\n            ))\n            .build());\n\n        final var dataOpsecApplication = CheckpointFunctions.getManagementDataOpsecApplication(GetManagementDataOpsecApplicationArgs.builder()\n            .name(opsecApplication.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  myhost:\n    type: checkpoint:ManagementHost\n    properties:\n      name: myhost\n      ipv4Address: 1.2.3.4\n  opsecApplication:\n    type: checkpoint:ManagementOpsecApplication\n    name: opsec_application\n    properties:\n      name: OPSEC application\n      host: ${myhost.name}\n      cpmi:\n        enabled: true\n        administrator_profile: read only all\n        use_administrator_credentials: false\n      lea:\n        enabled: true\n        access_permissions: show all\nvariables:\n  dataOpsecApplication:\n    fn::invoke:\n      function: checkpoint:getManagementDataOpsecApplication\n      arguments:\n        name: ${opsecApplication.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataOpsecApplication.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataOpsecApplication.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "cpmi": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "lea": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "cpmi",
          "id",
          "lea",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataPackage:getManagementDataPackage": {
      "description": "Use this data source to get information on an existing Check Point Package Object.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst _package = new checkpoint.ManagementPackage(\"package\", {name: \"My Package\"});\nconst dataPackage = checkpoint.getManagementDataPackageOutput({\n    name: _package.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\npackage = checkpoint.ManagementPackage(\"package\", name=\"My Package\")\ndata_package = checkpoint.get_management_data_package_output(name=package.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var package = new Checkpoint.ManagementPackage(\"package\", new()\n    {\n        Name = \"My Package\",\n    });\n\n    var dataPackage = Checkpoint.GetManagementDataPackage.Invoke(new()\n    {\n        Name = package.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_package, err := checkpoint.NewManagementPackage(ctx, \"package\", \u0026checkpoint.ManagementPackageArgs{\n\t\t\tName: pulumi.String(\"My Package\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataPackageOutput(ctx, checkpoint.GetManagementDataPackageOutputArgs{\n\t\t\tName: _package.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementPackage;\nimport com.pulumi.checkpoint.ManagementPackageArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataPackageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var package_ = new ManagementPackage(\"package\", ManagementPackageArgs.builder()\n            .name(\"My Package\")\n            .build());\n\n        final var dataPackage = CheckpointFunctions.getManagementDataPackage(GetManagementDataPackageArgs.builder()\n            .name(package_.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  package:\n    type: checkpoint:ManagementPackage\n    properties:\n      name: My Package\nvariables:\n  dataPackage:\n    fn::invoke:\n      function: checkpoint:getManagementDataPackage\n      arguments:\n        name: ${package.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataPackage.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "showInstallationTargets": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"installation-targets\" field in reply.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataPackage.\n",
        "properties": {
          "access": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "desktopSecurity": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "installationTargets": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "qos": {
            "type": "boolean"
          },
          "qosPolicyType": {
            "type": "string"
          },
          "showInstallationTargets": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatPrevention": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          },
          "vpnTraditionalMode": {
            "type": "boolean"
          }
        },
        "required": [
          "access",
          "color",
          "comments",
          "desktopSecurity",
          "id",
          "installationTargets",
          "qos",
          "qosPolicyType",
          "tags",
          "threatPrevention",
          "vpnTraditionalMode"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataSecurityZone:getManagementDataSecurityZone": {
      "description": "Use this data source to get information on an existing Check Point Security Zone.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst securityZone = new checkpoint.ManagementSecurityZone(\"security_zone\", {name: \"Security Zone 1\"});\nconst dataSecurityZone = checkpoint.getManagementDataSecurityZoneOutput({\n    name: securityZone.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsecurity_zone = checkpoint.ManagementSecurityZone(\"security_zone\", name=\"Security Zone 1\")\ndata_security_zone = checkpoint.get_management_data_security_zone_output(name=security_zone.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var securityZone = new Checkpoint.ManagementSecurityZone(\"security_zone\", new()\n    {\n        Name = \"Security Zone 1\",\n    });\n\n    var dataSecurityZone = Checkpoint.GetManagementDataSecurityZone.Invoke(new()\n    {\n        Name = securityZone.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tsecurityZone, err := checkpoint.NewManagementSecurityZone(ctx, \"security_zone\", \u0026checkpoint.ManagementSecurityZoneArgs{\n\t\t\tName: pulumi.String(\"Security Zone 1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataSecurityZoneOutput(ctx, checkpoint.GetManagementDataSecurityZoneOutputArgs{\n\t\t\tName: securityZone.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSecurityZone;\nimport com.pulumi.checkpoint.ManagementSecurityZoneArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataSecurityZoneArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var securityZone = new ManagementSecurityZone(\"securityZone\", ManagementSecurityZoneArgs.builder()\n            .name(\"Security Zone 1\")\n            .build());\n\n        final var dataSecurityZone = CheckpointFunctions.getManagementDataSecurityZone(GetManagementDataSecurityZoneArgs.builder()\n            .name(securityZone.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  securityZone:\n    type: checkpoint:ManagementSecurityZone\n    name: security_zone\n    properties:\n      name: Security Zone 1\nvariables:\n  dataSecurityZone:\n    fn::invoke:\n      function: checkpoint:getManagementDataSecurityZone\n      arguments:\n        name: ${securityZone.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataSecurityZone.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataSecurityZone.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceDceRpc:getManagementDataServiceDceRpc": {
      "description": "Use this data source to get information on an existing Check Point Service Dce Rpc.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceDceRpc = new checkpoint.ManagementServiceDceRpc(\"service_dce_rpc\", {\n    name: \"service dce rpc\",\n    interfaceUuid: \"97aeb460-9aea-11d5-bd16-0090272ccb30\",\n});\nconst dataServiceDceRpc = checkpoint.getManagementDataServiceDceRpcOutput({\n    name: serviceDceRpc.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_dce_rpc = checkpoint.ManagementServiceDceRpc(\"service_dce_rpc\",\n    name=\"service dce rpc\",\n    interface_uuid=\"97aeb460-9aea-11d5-bd16-0090272ccb30\")\ndata_service_dce_rpc = checkpoint.get_management_data_service_dce_rpc_output(name=service_dce_rpc.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceDceRpc = new Checkpoint.ManagementServiceDceRpc(\"service_dce_rpc\", new()\n    {\n        Name = \"service dce rpc\",\n        InterfaceUuid = \"97aeb460-9aea-11d5-bd16-0090272ccb30\",\n    });\n\n    var dataServiceDceRpc = Checkpoint.GetManagementDataServiceDceRpc.Invoke(new()\n    {\n        Name = serviceDceRpc.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceDceRpc, err := checkpoint.NewManagementServiceDceRpc(ctx, \"service_dce_rpc\", \u0026checkpoint.ManagementServiceDceRpcArgs{\n\t\t\tName:          pulumi.String(\"service dce rpc\"),\n\t\t\tInterfaceUuid: pulumi.String(\"97aeb460-9aea-11d5-bd16-0090272ccb30\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceDceRpcOutput(ctx, checkpoint.GetManagementDataServiceDceRpcOutputArgs{\n\t\t\tName: serviceDceRpc.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceDceRpc;\nimport com.pulumi.checkpoint.ManagementServiceDceRpcArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceDceRpcArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceDceRpc = new ManagementServiceDceRpc(\"serviceDceRpc\", ManagementServiceDceRpcArgs.builder()\n            .name(\"service dce rpc\")\n            .interfaceUuid(\"97aeb460-9aea-11d5-bd16-0090272ccb30\")\n            .build());\n\n        final var dataServiceDceRpc = CheckpointFunctions.getManagementDataServiceDceRpc(GetManagementDataServiceDceRpcArgs.builder()\n            .name(serviceDceRpc.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceDceRpc:\n    type: checkpoint:ManagementServiceDceRpc\n    name: service_dce_rpc\n    properties:\n      name: service dce rpc\n      interfaceUuid: 97aeb460-9aea-11d5-bd16-0090272ccb30\nvariables:\n  dataServiceDceRpc:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceDceRpc\n      arguments:\n        name: ${serviceDceRpc.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceDceRpc.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceDceRpc.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "interfaceUuid": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "interfaceUuid",
          "keepConnectionsOpenAfterPolicyInstallation",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceGroup:getManagementDataServiceGroup": {
      "description": "Use this data source to get information on an existing Check Point Service Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceGroup = new checkpoint.ManagementServiceGroup(\"service_group\", {name: \"service group\"});\nconst dataServiceGroup = checkpoint.getManagementDataServiceGroupOutput({\n    name: serviceGroup.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_group = checkpoint.ManagementServiceGroup(\"service_group\", name=\"service group\")\ndata_service_group = checkpoint.get_management_data_service_group_output(name=service_group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceGroup = new Checkpoint.ManagementServiceGroup(\"service_group\", new()\n    {\n        Name = \"service group\",\n    });\n\n    var dataServiceGroup = Checkpoint.GetManagementDataServiceGroup.Invoke(new()\n    {\n        Name = serviceGroup.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceGroup, err := checkpoint.NewManagementServiceGroup(ctx, \"service_group\", \u0026checkpoint.ManagementServiceGroupArgs{\n\t\t\tName: pulumi.String(\"service group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceGroupOutput(ctx, checkpoint.GetManagementDataServiceGroupOutputArgs{\n\t\t\tName: serviceGroup.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceGroup;\nimport com.pulumi.checkpoint.ManagementServiceGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceGroup = new ManagementServiceGroup(\"serviceGroup\", ManagementServiceGroupArgs.builder()\n            .name(\"service group\")\n            .build());\n\n        final var dataServiceGroup = CheckpointFunctions.getManagementDataServiceGroup(GetManagementDataServiceGroupArgs.builder()\n            .name(serviceGroup.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceGroup:\n    type: checkpoint:ManagementServiceGroup\n    name: service_group\n    properties:\n      name: service group\nvariables:\n  dataServiceGroup:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceGroup\n      arguments:\n        name: ${serviceGroup.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceIcmp6:getManagementDataServiceIcmp6": {
      "description": "Use this data source to get information on an existing Check Point Service Icmp6.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceIcmp6 = new checkpoint.ManagementServiceIcmp6(\"service_icmp6\", {name: \"service icmp6\"});\nconst dataServiceIcmp6 = checkpoint.getManagementDataServiceIcmp6Output({\n    name: serviceIcmp6.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_icmp6 = checkpoint.ManagementServiceIcmp6(\"service_icmp6\", name=\"service icmp6\")\ndata_service_icmp6 = checkpoint.get_management_data_service_icmp6_output(name=service_icmp6.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceIcmp6 = new Checkpoint.ManagementServiceIcmp6(\"service_icmp6\", new()\n    {\n        Name = \"service icmp6\",\n    });\n\n    var dataServiceIcmp6 = Checkpoint.GetManagementDataServiceIcmp6.Invoke(new()\n    {\n        Name = serviceIcmp6.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceIcmp6, err := checkpoint.NewManagementServiceIcmp6(ctx, \"service_icmp6\", \u0026checkpoint.ManagementServiceIcmp6Args{\n\t\t\tName: pulumi.String(\"service icmp6\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceIcmp6Output(ctx, checkpoint.GetManagementDataServiceIcmp6OutputArgs{\n\t\t\tName: serviceIcmp6.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceIcmp6;\nimport com.pulumi.checkpoint.ManagementServiceIcmp6Args;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceIcmp6Args;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceIcmp6 = new ManagementServiceIcmp6(\"serviceIcmp6\", ManagementServiceIcmp6Args.builder()\n            .name(\"service icmp6\")\n            .build());\n\n        final var dataServiceIcmp6 = CheckpointFunctions.getManagementDataServiceIcmp6(GetManagementDataServiceIcmp6Args.builder()\n            .name(serviceIcmp6.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceIcmp6:\n    type: checkpoint:ManagementServiceIcmp6\n    name: service_icmp6\n    properties:\n      name: service icmp6\nvariables:\n  dataServiceIcmp6:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceIcmp6\n      arguments:\n        name: ${serviceIcmp6.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceIcmp6.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceIcmp6.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "icmpCode": {
            "type": "number"
          },
          "icmpType": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "icmpCode",
          "icmpType",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceIcmp:getManagementDataServiceIcmp": {
      "description": "Use this data source to get information on an existing Check Point Service Icmp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceIcmp = new checkpoint.ManagementServiceIcmp(\"service_icmp\", {name: \"icmp group\"});\nconst dataServiceIcmp = checkpoint.getManagementDataServiceIcmpOutput({\n    name: serviceIcmp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_icmp = checkpoint.ManagementServiceIcmp(\"service_icmp\", name=\"icmp group\")\ndata_service_icmp = checkpoint.get_management_data_service_icmp_output(name=service_icmp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceIcmp = new Checkpoint.ManagementServiceIcmp(\"service_icmp\", new()\n    {\n        Name = \"icmp group\",\n    });\n\n    var dataServiceIcmp = Checkpoint.GetManagementDataServiceIcmp.Invoke(new()\n    {\n        Name = serviceIcmp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceIcmp, err := checkpoint.NewManagementServiceIcmp(ctx, \"service_icmp\", \u0026checkpoint.ManagementServiceIcmpArgs{\n\t\t\tName: pulumi.String(\"icmp group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceIcmpOutput(ctx, checkpoint.GetManagementDataServiceIcmpOutputArgs{\n\t\t\tName: serviceIcmp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceIcmp;\nimport com.pulumi.checkpoint.ManagementServiceIcmpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceIcmpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceIcmp = new ManagementServiceIcmp(\"serviceIcmp\", ManagementServiceIcmpArgs.builder()\n            .name(\"icmp group\")\n            .build());\n\n        final var dataServiceIcmp = CheckpointFunctions.getManagementDataServiceIcmp(GetManagementDataServiceIcmpArgs.builder()\n            .name(serviceIcmp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceIcmp:\n    type: checkpoint:ManagementServiceIcmp\n    name: service_icmp\n    properties:\n      name: icmp group\nvariables:\n  dataServiceIcmp:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceIcmp\n      arguments:\n        name: ${serviceIcmp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceIcmp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceIcmp.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "icmpCode": {
            "type": "number"
          },
          "icmpType": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "icmpCode",
          "icmpType",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceOther:getManagementDataServiceOther": {
      "description": "Use this data source to get information on an existing Check Point Service Other.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceOther = new checkpoint.ManagementServiceOther(\"service_other\", {\n    name: \"service other\",\n    keepConnectionsOpenAfterPolicyInstallation: false,\n    sessionTimeout: 100,\n    matchForAny: true,\n    syncConnectionsOnCluster: true,\n    ipProtocol: 51,\n    aggressiveAging: {\n        use_default_timeout: \"true\",\n        enable: \"true\",\n        default_timeout: \"600\",\n        timeout: \"600\",\n    },\n});\nconst dataServiceOther = checkpoint.getManagementDataServiceOtherOutput({\n    name: serviceOther.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_other = checkpoint.ManagementServiceOther(\"service_other\",\n    name=\"service other\",\n    keep_connections_open_after_policy_installation=False,\n    session_timeout=100,\n    match_for_any=True,\n    sync_connections_on_cluster=True,\n    ip_protocol=51,\n    aggressive_aging={\n        \"use_default_timeout\": \"true\",\n        \"enable\": \"true\",\n        \"default_timeout\": \"600\",\n        \"timeout\": \"600\",\n    })\ndata_service_other = checkpoint.get_management_data_service_other_output(name=service_other.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceOther = new Checkpoint.ManagementServiceOther(\"service_other\", new()\n    {\n        Name = \"service other\",\n        KeepConnectionsOpenAfterPolicyInstallation = false,\n        SessionTimeout = 100,\n        MatchForAny = true,\n        SyncConnectionsOnCluster = true,\n        IpProtocol = 51,\n        AggressiveAging = \n        {\n            { \"use_default_timeout\", \"true\" },\n            { \"enable\", \"true\" },\n            { \"default_timeout\", \"600\" },\n            { \"timeout\", \"600\" },\n        },\n    });\n\n    var dataServiceOther = Checkpoint.GetManagementDataServiceOther.Invoke(new()\n    {\n        Name = serviceOther.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceOther, err := checkpoint.NewManagementServiceOther(ctx, \"service_other\", \u0026checkpoint.ManagementServiceOtherArgs{\n\t\t\tName: pulumi.String(\"service other\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(false),\n\t\t\tSessionTimeout:           pulumi.Float64(100),\n\t\t\tMatchForAny:              pulumi.Bool(true),\n\t\t\tSyncConnectionsOnCluster: pulumi.Bool(true),\n\t\t\tIpProtocol:               pulumi.Float64(51),\n\t\t\tAggressiveAging: pulumi.StringMap{\n\t\t\t\t\"use_default_timeout\": pulumi.String(\"true\"),\n\t\t\t\t\"enable\":              pulumi.String(\"true\"),\n\t\t\t\t\"default_timeout\":     pulumi.String(\"600\"),\n\t\t\t\t\"timeout\":             pulumi.String(\"600\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceOtherOutput(ctx, checkpoint.GetManagementDataServiceOtherOutputArgs{\n\t\t\tName: serviceOther.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceOther;\nimport com.pulumi.checkpoint.ManagementServiceOtherArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceOtherArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceOther = new ManagementServiceOther(\"serviceOther\", ManagementServiceOtherArgs.builder()\n            .name(\"service other\")\n            .keepConnectionsOpenAfterPolicyInstallation(false)\n            .sessionTimeout(100.0)\n            .matchForAny(true)\n            .syncConnectionsOnCluster(true)\n            .ipProtocol(51.0)\n            .aggressiveAging(Map.ofEntries(\n                Map.entry(\"use_default_timeout\", \"true\"),\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"default_timeout\", \"600\"),\n                Map.entry(\"timeout\", \"600\")\n            ))\n            .build());\n\n        final var dataServiceOther = CheckpointFunctions.getManagementDataServiceOther(GetManagementDataServiceOtherArgs.builder()\n            .name(serviceOther.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceOther:\n    type: checkpoint:ManagementServiceOther\n    name: service_other\n    properties:\n      name: service other\n      keepConnectionsOpenAfterPolicyInstallation: false\n      sessionTimeout: 100\n      matchForAny: true\n      syncConnectionsOnCluster: true\n      ipProtocol: 51\n      aggressiveAging:\n        use_default_timeout: true\n        enable: true\n        default_timeout: 600\n        timeout: 600\nvariables:\n  dataServiceOther:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceOther\n      arguments:\n        name: ${serviceOther.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceOther.\n",
        "properties": {
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceOther.\n",
        "properties": {
          "acceptReplies": {
            "type": "boolean"
          },
          "action": {
            "type": "string"
          },
          "aggressiveAging": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ipProtocol": {
            "type": "number"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "match": {
            "type": "string"
          },
          "matchForAny": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "overrideDefaultSettings": {
            "type": "boolean"
          },
          "sessionTimeout": {
            "type": "number"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean"
          }
        },
        "required": [
          "acceptReplies",
          "action",
          "aggressiveAging",
          "color",
          "groups",
          "id",
          "ipProtocol",
          "keepConnectionsOpenAfterPolicyInstallation",
          "match",
          "matchForAny",
          "overrideDefaultSettings",
          "sessionTimeout",
          "syncConnectionsOnCluster",
          "tags",
          "useDefaultSessionTimeout"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceRpc:getManagementDataServiceRpc": {
      "description": "Use this data source to get information on an existing Check Point Service Rpc.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceRpc = new checkpoint.ManagementServiceRpc(\"service_rpc\", {name: \"service rpc\"});\nconst dataServiceRpc = checkpoint.getManagementDataServiceRpcOutput({\n    name: serviceRpc.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_rpc = checkpoint.ManagementServiceRpc(\"service_rpc\", name=\"service rpc\")\ndata_service_rpc = checkpoint.get_management_data_service_rpc_output(name=service_rpc.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceRpc = new Checkpoint.ManagementServiceRpc(\"service_rpc\", new()\n    {\n        Name = \"service rpc\",\n    });\n\n    var dataServiceRpc = Checkpoint.GetManagementDataServiceRpc.Invoke(new()\n    {\n        Name = serviceRpc.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceRpc, err := checkpoint.NewManagementServiceRpc(ctx, \"service_rpc\", \u0026checkpoint.ManagementServiceRpcArgs{\n\t\t\tName: pulumi.String(\"service rpc\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceRpcOutput(ctx, checkpoint.GetManagementDataServiceRpcOutputArgs{\n\t\t\tName: serviceRpc.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceRpc;\nimport com.pulumi.checkpoint.ManagementServiceRpcArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceRpcArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceRpc = new ManagementServiceRpc(\"serviceRpc\", ManagementServiceRpcArgs.builder()\n            .name(\"service rpc\")\n            .build());\n\n        final var dataServiceRpc = CheckpointFunctions.getManagementDataServiceRpc(GetManagementDataServiceRpcArgs.builder()\n            .name(serviceRpc.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceRpc:\n    type: checkpoint:ManagementServiceRpc\n    name: service_rpc\n    properties:\n      name: service rpc\nvariables:\n  dataServiceRpc:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceRpc\n      arguments:\n        name: ${serviceRpc.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceRpc.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceRpc.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "programNumber": {
            "type": "number"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "programNumber",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceSctp:getManagementDataServiceSctp": {
      "description": "Use this data source to get information on an existing Check Point Service Sctp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceSctp = new checkpoint.ManagementServiceSctp(\"service_sctp\", {\n    name: \"service sctp\",\n    port: \"1234\",\n    sessionTimeout: 3600,\n    syncConnectionsOnCluster: true,\n});\nconst dataServiceSctp = checkpoint.getManagementDataServiceSctpOutput({\n    name: serviceSctp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_sctp = checkpoint.ManagementServiceSctp(\"service_sctp\",\n    name=\"service sctp\",\n    port=\"1234\",\n    session_timeout=3600,\n    sync_connections_on_cluster=True)\ndata_service_sctp = checkpoint.get_management_data_service_sctp_output(name=service_sctp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceSctp = new Checkpoint.ManagementServiceSctp(\"service_sctp\", new()\n    {\n        Name = \"service sctp\",\n        Port = \"1234\",\n        SessionTimeout = 3600,\n        SyncConnectionsOnCluster = true,\n    });\n\n    var dataServiceSctp = Checkpoint.GetManagementDataServiceSctp.Invoke(new()\n    {\n        Name = serviceSctp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceSctp, err := checkpoint.NewManagementServiceSctp(ctx, \"service_sctp\", \u0026checkpoint.ManagementServiceSctpArgs{\n\t\t\tName:                     pulumi.String(\"service sctp\"),\n\t\t\tPort:                     pulumi.String(\"1234\"),\n\t\t\tSessionTimeout:           pulumi.Float64(3600),\n\t\t\tSyncConnectionsOnCluster: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceSctpOutput(ctx, checkpoint.GetManagementDataServiceSctpOutputArgs{\n\t\t\tName: serviceSctp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceSctp;\nimport com.pulumi.checkpoint.ManagementServiceSctpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceSctpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceSctp = new ManagementServiceSctp(\"serviceSctp\", ManagementServiceSctpArgs.builder()\n            .name(\"service sctp\")\n            .port(\"1234\")\n            .sessionTimeout(3600.0)\n            .syncConnectionsOnCluster(true)\n            .build());\n\n        final var dataServiceSctp = CheckpointFunctions.getManagementDataServiceSctp(GetManagementDataServiceSctpArgs.builder()\n            .name(serviceSctp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceSctp:\n    type: checkpoint:ManagementServiceSctp\n    name: service_sctp\n    properties:\n      name: service sctp\n      port: '1234'\n      sessionTimeout: '3600'\n      syncConnectionsOnCluster: true\nvariables:\n  dataServiceSctp:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceSctp\n      arguments:\n        name: ${serviceSctp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceSctp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceSctp.\n",
        "properties": {
          "aggressiveAging": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "matchForAny": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "port": {
            "type": "string"
          },
          "sessionTimeout": {
            "type": "number"
          },
          "sourcePort": {
            "type": "string"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean"
          }
        },
        "required": [
          "aggressiveAging",
          "color",
          "comments",
          "groups",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "matchForAny",
          "port",
          "sessionTimeout",
          "sourcePort",
          "syncConnectionsOnCluster",
          "tags",
          "useDefaultSessionTimeout"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceTcp:getManagementDataServiceTcp": {
      "description": "Use this data source to get information on an existing Check Point Service Tcp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceTcp = new checkpoint.ManagementServiceTcp(\"service_tcp\", {\n    name: \"service tcp\",\n    port: \"1122\",\n});\nconst dataServiceTcp = checkpoint.getManagementDataServiceTcpOutput({\n    name: serviceTcp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_tcp = checkpoint.ManagementServiceTcp(\"service_tcp\",\n    name=\"service tcp\",\n    port=\"1122\")\ndata_service_tcp = checkpoint.get_management_data_service_tcp_output(name=service_tcp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceTcp = new Checkpoint.ManagementServiceTcp(\"service_tcp\", new()\n    {\n        Name = \"service tcp\",\n        Port = \"1122\",\n    });\n\n    var dataServiceTcp = Checkpoint.GetManagementDataServiceTcp.Invoke(new()\n    {\n        Name = serviceTcp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceTcp, err := checkpoint.NewManagementServiceTcp(ctx, \"service_tcp\", \u0026checkpoint.ManagementServiceTcpArgs{\n\t\t\tName: pulumi.String(\"service tcp\"),\n\t\t\tPort: pulumi.String(\"1122\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceTcpOutput(ctx, checkpoint.GetManagementDataServiceTcpOutputArgs{\n\t\t\tName: serviceTcp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceTcp;\nimport com.pulumi.checkpoint.ManagementServiceTcpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceTcp = new ManagementServiceTcp(\"serviceTcp\", ManagementServiceTcpArgs.builder()\n            .name(\"service tcp\")\n            .port(\"1122\")\n            .build());\n\n        final var dataServiceTcp = CheckpointFunctions.getManagementDataServiceTcp(GetManagementDataServiceTcpArgs.builder()\n            .name(serviceTcp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceTcp:\n    type: checkpoint:ManagementServiceTcp\n    name: service_tcp\n    properties:\n      name: service tcp\n      port: '1122'\nvariables:\n  dataServiceTcp:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceTcp\n      arguments:\n        name: ${serviceTcp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceTcp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceTcp.\n",
        "properties": {
          "aggressiveAging": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "matchByProtocolSignature": {
            "type": "boolean"
          },
          "matchForAny": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "overrideDefaultSettings": {
            "type": "boolean"
          },
          "port": {
            "type": "string"
          },
          "protocol": {
            "type": "string"
          },
          "sessionTimeout": {
            "type": "number"
          },
          "sourcePort": {
            "type": "string"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean"
          }
        },
        "required": [
          "aggressiveAging",
          "color",
          "comments",
          "groups",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "matchByProtocolSignature",
          "matchForAny",
          "overrideDefaultSettings",
          "port",
          "protocol",
          "sessionTimeout",
          "sourcePort",
          "syncConnectionsOnCluster",
          "tags",
          "useDefaultSessionTimeout"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataServiceUdp:getManagementDataServiceUdp": {
      "description": "Use this data source to get information on an existing Check Point Service Udp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceUdp = new checkpoint.ManagementServiceUdp(\"service_udp\", {\n    name: \"service udp\",\n    port: \"1123\",\n});\nconst dataServiceUdp = checkpoint.getManagementDataServiceUdpOutput({\n    name: serviceUdp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_udp = checkpoint.ManagementServiceUdp(\"service_udp\",\n    name=\"service udp\",\n    port=\"1123\")\ndata_service_udp = checkpoint.get_management_data_service_udp_output(name=service_udp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceUdp = new Checkpoint.ManagementServiceUdp(\"service_udp\", new()\n    {\n        Name = \"service udp\",\n        Port = \"1123\",\n    });\n\n    var dataServiceUdp = Checkpoint.GetManagementDataServiceUdp.Invoke(new()\n    {\n        Name = serviceUdp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceUdp, err := checkpoint.NewManagementServiceUdp(ctx, \"service_udp\", \u0026checkpoint.ManagementServiceUdpArgs{\n\t\t\tName: pulumi.String(\"service udp\"),\n\t\t\tPort: pulumi.String(\"1123\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataServiceUdpOutput(ctx, checkpoint.GetManagementDataServiceUdpOutputArgs{\n\t\t\tName: serviceUdp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceUdp;\nimport com.pulumi.checkpoint.ManagementServiceUdpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataServiceUdpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceUdp = new ManagementServiceUdp(\"serviceUdp\", ManagementServiceUdpArgs.builder()\n            .name(\"service udp\")\n            .port(\"1123\")\n            .build());\n\n        final var dataServiceUdp = CheckpointFunctions.getManagementDataServiceUdp(GetManagementDataServiceUdpArgs.builder()\n            .name(serviceUdp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceUdp:\n    type: checkpoint:ManagementServiceUdp\n    name: service_udp\n    properties:\n      name: service udp\n      port: '1123'\nvariables:\n  dataServiceUdp:\n    fn::invoke:\n      function: checkpoint:getManagementDataServiceUdp\n      arguments:\n        name: ${serviceUdp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataServiceUdp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataServiceUdp.\n",
        "properties": {
          "acceptReplies": {
            "type": "boolean"
          },
          "aggressiveAging": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "matchByProtocolSignature": {
            "type": "boolean"
          },
          "matchForAny": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "overrideDefaultSettings": {
            "type": "boolean"
          },
          "port": {
            "type": "string"
          },
          "protocol": {
            "type": "string"
          },
          "sessionTimeout": {
            "type": "number"
          },
          "sourcePort": {
            "type": "string"
          },
          "syncConnectionsOnCluster": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "useDefaultSessionTimeout": {
            "type": "boolean"
          }
        },
        "required": [
          "acceptReplies",
          "aggressiveAging",
          "color",
          "comments",
          "groups",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "matchByProtocolSignature",
          "matchForAny",
          "overrideDefaultSettings",
          "port",
          "protocol",
          "sessionTimeout",
          "sourcePort",
          "syncConnectionsOnCluster",
          "tags",
          "useDefaultSessionTimeout"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataThreatIndicator:getManagementDataThreatIndicator": {
      "description": "Use this data source to get information on an existing Check Point Threat Indicator.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst threatIndicator = new checkpoint.ManagementThreatIndicator(\"threat_indicator\", {\n    name: \"threat indicator\",\n    observables: [{\n        name: \"obs1\",\n        ipAddress: \"5.4.7.1\",\n    }],\n    ignoreWarnings: true,\n});\nconst dataThreatIndicator = checkpoint.getManagementDataThreatIndicatorOutput({\n    name: threatIndicator.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nthreat_indicator = checkpoint.ManagementThreatIndicator(\"threat_indicator\",\n    name=\"threat indicator\",\n    observables=[{\n        \"name\": \"obs1\",\n        \"ip_address\": \"5.4.7.1\",\n    }],\n    ignore_warnings=True)\ndata_threat_indicator = checkpoint.get_management_data_threat_indicator_output(name=threat_indicator.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var threatIndicator = new Checkpoint.ManagementThreatIndicator(\"threat_indicator\", new()\n    {\n        Name = \"threat indicator\",\n        Observables = new[]\n        {\n            new Checkpoint.Inputs.ManagementThreatIndicatorObservableArgs\n            {\n                Name = \"obs1\",\n                IpAddress = \"5.4.7.1\",\n            },\n        },\n        IgnoreWarnings = true,\n    });\n\n    var dataThreatIndicator = Checkpoint.GetManagementDataThreatIndicator.Invoke(new()\n    {\n        Name = threatIndicator.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthreatIndicator, err := checkpoint.NewManagementThreatIndicator(ctx, \"threat_indicator\", \u0026checkpoint.ManagementThreatIndicatorArgs{\n\t\t\tName: pulumi.String(\"threat indicator\"),\n\t\t\tObservables: checkpoint.ManagementThreatIndicatorObservableArray{\n\t\t\t\t\u0026checkpoint.ManagementThreatIndicatorObservableArgs{\n\t\t\t\t\tName:      pulumi.String(\"obs1\"),\n\t\t\t\t\tIpAddress: pulumi.String(\"5.4.7.1\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tIgnoreWarnings: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataThreatIndicatorOutput(ctx, checkpoint.GetManagementDataThreatIndicatorOutputArgs{\n\t\t\tName: threatIndicator.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatIndicator;\nimport com.pulumi.checkpoint.ManagementThreatIndicatorArgs;\nimport com.pulumi.checkpoint.inputs.ManagementThreatIndicatorObservableArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataThreatIndicatorArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var threatIndicator = new ManagementThreatIndicator(\"threatIndicator\", ManagementThreatIndicatorArgs.builder()\n            .name(\"threat indicator\")\n            .observables(ManagementThreatIndicatorObservableArgs.builder()\n                .name(\"obs1\")\n                .ipAddress(\"5.4.7.1\")\n                .build())\n            .ignoreWarnings(true)\n            .build());\n\n        final var dataThreatIndicator = CheckpointFunctions.getManagementDataThreatIndicator(GetManagementDataThreatIndicatorArgs.builder()\n            .name(threatIndicator.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  threatIndicator:\n    type: checkpoint:ManagementThreatIndicator\n    name: threat_indicator\n    properties:\n      name: threat indicator\n      observables:\n        - name: obs1\n          ipAddress: 5.4.7.1\n      ignoreWarnings: true\nvariables:\n  dataThreatIndicator:\n    fn::invoke:\n      function: checkpoint:getManagementDataThreatIndicator\n      arguments:\n        name: ${threatIndicator.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataThreatIndicator.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataThreatIndicator.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "profileOverrides": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataThreatIndicatorProfileOverride:getManagementDataThreatIndicatorProfileOverride"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "action",
          "color",
          "comments",
          "id",
          "profileOverrides",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTimeGroup:getManagementDataTimeGroup": {
      "description": "Use this data source to get information on an existing Check Point Time Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst timeGroup = new checkpoint.ManagementTimeGroup(\"time_group\", {name: \"time group\"});\nconst dataTimeGroup = checkpoint.getManagementDataTimeGroupOutput({\n    name: timeGroup.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntime_group = checkpoint.ManagementTimeGroup(\"time_group\", name=\"time group\")\ndata_time_group = checkpoint.get_management_data_time_group_output(name=time_group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var timeGroup = new Checkpoint.ManagementTimeGroup(\"time_group\", new()\n    {\n        Name = \"time group\",\n    });\n\n    var dataTimeGroup = Checkpoint.GetManagementDataTimeGroup.Invoke(new()\n    {\n        Name = timeGroup.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttimeGroup, err := checkpoint.NewManagementTimeGroup(ctx, \"time_group\", \u0026checkpoint.ManagementTimeGroupArgs{\n\t\t\tName: pulumi.String(\"time group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataTimeGroupOutput(ctx, checkpoint.GetManagementDataTimeGroupOutputArgs{\n\t\t\tName: timeGroup.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTimeGroup;\nimport com.pulumi.checkpoint.ManagementTimeGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTimeGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var timeGroup = new ManagementTimeGroup(\"timeGroup\", ManagementTimeGroupArgs.builder()\n            .name(\"time group\")\n            .build());\n\n        final var dataTimeGroup = CheckpointFunctions.getManagementDataTimeGroup(GetManagementDataTimeGroupArgs.builder()\n            .name(timeGroup.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  timeGroup:\n    type: checkpoint:ManagementTimeGroup\n    name: time_group\n    properties:\n      name: time group\nvariables:\n  dataTimeGroup:\n    fn::invoke:\n      function: checkpoint:getManagementDataTimeGroup\n      arguments:\n        name: ${timeGroup.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTimeGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTimeGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypeCompoundGroup:getManagementDataTypeCompoundGroup": {
      "description": "Use this data source to get information on an existing Check Point Data Type Compound Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeCompoundGroup(\"example\", {\n    name: \"compound-group-obj\",\n    description: \"Compound group object\",\n    matchedGroups: [\"Source Code\"],\n    unmatchedGroups: [\"Large File\"],\n});\nconst data = checkpoint.getManagementDataTypeCompoundGroupOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeCompoundGroup(\"example\",\n    name=\"compound-group-obj\",\n    description=\"Compound group object\",\n    matched_groups=[\"Source Code\"],\n    unmatched_groups=[\"Large File\"])\ndata = checkpoint.get_management_data_type_compound_group_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypeCompoundGroup(\"example\", new()\n    {\n        Name = \"compound-group-obj\",\n        Description = \"Compound group object\",\n        MatchedGroups = new[]\n        {\n            \"Source Code\",\n        },\n        UnmatchedGroups = new[]\n        {\n            \"Large File\",\n        },\n    });\n\n    var data = Checkpoint.GetManagementDataTypeCompoundGroup.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDataTypeCompoundGroup(ctx, \"example\", \u0026checkpoint.ManagementDataTypeCompoundGroupArgs{\n\t\t\tName:        pulumi.String(\"compound-group-obj\"),\n\t\t\tDescription: pulumi.String(\"Compound group object\"),\n\t\t\tMatchedGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Source Code\"),\n\t\t\t},\n\t\t\tUnmatchedGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Large File\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataTypeCompoundGroupOutput(ctx, checkpoint.GetManagementDataTypeCompoundGroupOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeCompoundGroup;\nimport com.pulumi.checkpoint.ManagementDataTypeCompoundGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypeCompoundGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeCompoundGroup(\"example\", ManagementDataTypeCompoundGroupArgs.builder()\n            .name(\"compound-group-obj\")\n            .description(\"Compound group object\")\n            .matchedGroups(\"Source Code\")\n            .unmatchedGroups(\"Large File\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypeCompoundGroup(GetManagementDataTypeCompoundGroupArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeCompoundGroup\n    properties:\n      name: compound-group-obj\n      description: Compound group object\n      matchedGroups:\n        - Source Code\n      unmatchedGroups:\n        - Large File\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypeCompoundGroup\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypeCompoundGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypeCompoundGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "matchedGroups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "unmatchedGroups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "color",
          "comments",
          "description",
          "id",
          "matchedGroups",
          "tags",
          "unmatchedGroups"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypeFileAttributes:getManagementDataTypeFileAttributes": {
      "description": "Use this data source to get information on an existing  Check Point Data Type File Attributes.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeFileAttributes(\"example\", {\n    name: \"file-attr-obj\",\n    matchByFileType: true,\n    fileGroupsLists: [\"Viewer\"],\n    matchByFileName: true,\n    fileNameContains: \"expression\",\n    matchByFileSize: true,\n    fileSize: 14,\n});\nconst data = checkpoint.getManagementDataTypeFileAttributesOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeFileAttributes(\"example\",\n    name=\"file-attr-obj\",\n    match_by_file_type=True,\n    file_groups_lists=[\"Viewer\"],\n    match_by_file_name=True,\n    file_name_contains=\"expression\",\n    match_by_file_size=True,\n    file_size=14)\ndata = checkpoint.get_management_data_type_file_attributes_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypeFileAttributes(\"example\", new()\n    {\n        Name = \"file-attr-obj\",\n        MatchByFileType = true,\n        FileGroupsLists = new[]\n        {\n            \"Viewer\",\n        },\n        MatchByFileName = true,\n        FileNameContains = \"expression\",\n        MatchByFileSize = true,\n        FileSize = 14,\n    });\n\n    var data = Checkpoint.GetManagementDataTypeFileAttributes.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDataTypeFileAttributes(ctx, \"example\", \u0026checkpoint.ManagementDataTypeFileAttributesArgs{\n\t\t\tName:            pulumi.String(\"file-attr-obj\"),\n\t\t\tMatchByFileType: pulumi.Bool(true),\n\t\t\tFileGroupsLists: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Viewer\"),\n\t\t\t},\n\t\t\tMatchByFileName:  pulumi.Bool(true),\n\t\t\tFileNameContains: pulumi.String(\"expression\"),\n\t\t\tMatchByFileSize:  pulumi.Bool(true),\n\t\t\tFileSize:         pulumi.Float64(14),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataTypeFileAttributesOutput(ctx, checkpoint.GetManagementDataTypeFileAttributesOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeFileAttributes;\nimport com.pulumi.checkpoint.ManagementDataTypeFileAttributesArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypeFileAttributesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeFileAttributes(\"example\", ManagementDataTypeFileAttributesArgs.builder()\n            .name(\"file-attr-obj\")\n            .matchByFileType(true)\n            .fileGroupsLists(\"Viewer\")\n            .matchByFileName(true)\n            .fileNameContains(\"expression\")\n            .matchByFileSize(true)\n            .fileSize(14.0)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypeFileAttributes(GetManagementDataTypeFileAttributesArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeFileAttributes\n    properties:\n      name: file-attr-obj\n      matchByFileType: true\n      fileGroupsLists:\n        - Viewer\n      matchByFileName: true\n      fileNameContains: expression\n      matchByFileSize: true\n      fileSize: 14\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypeFileAttributes\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypeFileAttributes.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypeFileAttributes.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "fileGroupsLists": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "fileNameContains": {
            "type": "string"
          },
          "fileSize": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "matchByFileName": {
            "type": "boolean"
          },
          "matchByFileSize": {
            "type": "boolean"
          },
          "matchByFileType": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "description",
          "fileGroupsLists",
          "fileNameContains",
          "fileSize",
          "id",
          "matchByFileName",
          "matchByFileSize",
          "matchByFileType",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypeGroup:getManagementDataTypeGroup": {
      "description": "Use this data source to get information on an existing Check Point Data Type Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeGroup(\"example\", {\n    name: \"data-group-obj\",\n    description: \"add data type group object\",\n    fileTypes: [\"Archive File\"],\n    fileContents: [\"CSV File\"],\n});\nconst data = checkpoint.getManagementDataTypeGroup({\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeGroup(\"example\",\n    name=\"data-group-obj\",\n    description=\"add data type group object\",\n    file_types=[\"Archive File\"],\n    file_contents=[\"CSV File\"])\ndata = checkpoint.get_management_data_type_group(name=test[\"name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypeGroup(\"example\", new()\n    {\n        Name = \"data-group-obj\",\n        Description = \"add data type group object\",\n        FileTypes = new[]\n        {\n            \"Archive File\",\n        },\n        FileContents = new[]\n        {\n            \"CSV File\",\n        },\n    });\n\n    var data = Checkpoint.GetManagementDataTypeGroup.Invoke(new()\n    {\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementDataTypeGroup(ctx, \"example\", \u0026checkpoint.ManagementDataTypeGroupArgs{\n\t\t\tName:        pulumi.String(\"data-group-obj\"),\n\t\t\tDescription: pulumi.String(\"add data type group object\"),\n\t\t\tFileTypes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"Archive File\"),\n\t\t\t},\n\t\t\tFileContents: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"CSV File\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementDataTypeGroup(ctx, \u0026checkpoint.LookupManagementDataTypeGroupArgs{\n\t\t\tName: pulumi.StringRef(test.Name),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeGroup;\nimport com.pulumi.checkpoint.ManagementDataTypeGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypeGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeGroup(\"example\", ManagementDataTypeGroupArgs.builder()\n            .name(\"data-group-obj\")\n            .description(\"add data type group object\")\n            .fileTypes(\"Archive File\")\n            .fileContents(\"CSV File\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypeGroup(GetManagementDataTypeGroupArgs.builder()\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeGroup\n    properties:\n      name: data-group-obj\n      description: add data type group object\n      fileTypes:\n        - Archive File\n      fileContents:\n        - CSV File\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypeGroup\n      arguments:\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypeGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypeGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "fileContents": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "fileTypes": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "description",
          "fileContents",
          "fileTypes",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypeKeywords:getManagementDataTypeKeywords": {
      "description": "Use this data source to get information on an existing Check Point Data Type Keywords.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeKeywords(\"example\", {\n    name: \"keywords_obj\",\n    description: \"keywords object\",\n    keywords: [\n        \"word1\",\n        \"word2\",\n    ],\n    dataMatchThreshold: \"all-keywords\",\n});\nconst data = checkpoint.getManagementDataTypeKeywordsOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeKeywords(\"example\",\n    name=\"keywords_obj\",\n    description=\"keywords object\",\n    keywords=[\n        \"word1\",\n        \"word2\",\n    ],\n    data_match_threshold=\"all-keywords\")\ndata = checkpoint.get_management_data_type_keywords_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypeKeywords(\"example\", new()\n    {\n        Name = \"keywords_obj\",\n        Description = \"keywords object\",\n        Keywords = new[]\n        {\n            \"word1\",\n            \"word2\",\n        },\n        DataMatchThreshold = \"all-keywords\",\n    });\n\n    var data = Checkpoint.GetManagementDataTypeKeywords.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDataTypeKeywords(ctx, \"example\", \u0026checkpoint.ManagementDataTypeKeywordsArgs{\n\t\t\tName:        pulumi.String(\"keywords_obj\"),\n\t\t\tDescription: pulumi.String(\"keywords object\"),\n\t\t\tKeywords: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"word1\"),\n\t\t\t\tpulumi.String(\"word2\"),\n\t\t\t},\n\t\t\tDataMatchThreshold: pulumi.String(\"all-keywords\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataTypeKeywordsOutput(ctx, checkpoint.GetManagementDataTypeKeywordsOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeKeywords;\nimport com.pulumi.checkpoint.ManagementDataTypeKeywordsArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypeKeywordsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeKeywords(\"example\", ManagementDataTypeKeywordsArgs.builder()\n            .name(\"keywords_obj\")\n            .description(\"keywords object\")\n            .keywords(            \n                \"word1\",\n                \"word2\")\n            .dataMatchThreshold(\"all-keywords\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypeKeywords(GetManagementDataTypeKeywordsArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeKeywords\n    properties:\n      name: keywords_obj\n      description: keywords object\n      keywords:\n        - word1\n        - word2\n      dataMatchThreshold: all-keywords\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypeKeywords\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypeKeywords.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypeKeywords.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataMatchThreshold": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "keywords": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "minNumberOfKeywords": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "dataMatchThreshold",
          "description",
          "id",
          "keywords",
          "minNumberOfKeywords",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypePatterns:getManagementDataTypePatterns": {
      "description": "Use this data source to get information on an existing Check Point Data Type Patterns.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypePatterns(\"example\", {\n    name: \"pattern-obj\",\n    description: \"data type pattern object\",\n    patterns: [\n        \"g*\",\n        \"^k\",\n    ],\n    numberOfOccurrences: 4,\n});\nconst data = checkpoint.getManagementDataTypePatternsOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypePatterns(\"example\",\n    name=\"pattern-obj\",\n    description=\"data type pattern object\",\n    patterns=[\n        \"g*\",\n        \"^k\",\n    ],\n    number_of_occurrences=4)\ndata = checkpoint.get_management_data_type_patterns_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypePatterns(\"example\", new()\n    {\n        Name = \"pattern-obj\",\n        Description = \"data type pattern object\",\n        Patterns = new[]\n        {\n            \"g*\",\n            \"^k\",\n        },\n        NumberOfOccurrences = 4,\n    });\n\n    var data = Checkpoint.GetManagementDataTypePatterns.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDataTypePatterns(ctx, \"example\", \u0026checkpoint.ManagementDataTypePatternsArgs{\n\t\t\tName:        pulumi.String(\"pattern-obj\"),\n\t\t\tDescription: pulumi.String(\"data type pattern object\"),\n\t\t\tPatterns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"g*\"),\n\t\t\t\tpulumi.String(\"^k\"),\n\t\t\t},\n\t\t\tNumberOfOccurrences: pulumi.Float64(4),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataTypePatternsOutput(ctx, checkpoint.GetManagementDataTypePatternsOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypePatterns;\nimport com.pulumi.checkpoint.ManagementDataTypePatternsArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypePatternsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypePatterns(\"example\", ManagementDataTypePatternsArgs.builder()\n            .name(\"pattern-obj\")\n            .description(\"data type pattern object\")\n            .patterns(            \n                \"g*\",\n                \"^k\")\n            .numberOfOccurrences(4.0)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypePatterns(GetManagementDataTypePatternsArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypePatterns\n    properties:\n      name: pattern-obj\n      description: data type pattern object\n      patterns:\n        - g*\n        - ^k\n      numberOfOccurrences: 4\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypePatterns\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypePatterns.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypePatterns.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "numberOfOccurrences": {
            "type": "number"
          },
          "patterns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "description",
          "id",
          "numberOfOccurrences",
          "patterns",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypeTraditionalGroup:getManagementDataTypeTraditionalGroup": {
      "description": "Use this data source to get information on an existing Check Point Data Type Traditional Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeTraditionalGroup(\"example\", {\n    name: \"trad-group-obj\",\n    description: \"traditional group object\",\n    dataTypes: [\n        \"SSH Private Key\",\n        \"CSV File\",\n    ],\n});\nconst data = checkpoint.getManagementDataTypeTraditionalGroupOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeTraditionalGroup(\"example\",\n    name=\"trad-group-obj\",\n    description=\"traditional group object\",\n    data_types=[\n        \"SSH Private Key\",\n        \"CSV File\",\n    ])\ndata = checkpoint.get_management_data_type_traditional_group_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypeTraditionalGroup(\"example\", new()\n    {\n        Name = \"trad-group-obj\",\n        Description = \"traditional group object\",\n        DataTypes = new[]\n        {\n            \"SSH Private Key\",\n            \"CSV File\",\n        },\n    });\n\n    var data = Checkpoint.GetManagementDataTypeTraditionalGroup.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDataTypeTraditionalGroup(ctx, \"example\", \u0026checkpoint.ManagementDataTypeTraditionalGroupArgs{\n\t\t\tName:        pulumi.String(\"trad-group-obj\"),\n\t\t\tDescription: pulumi.String(\"traditional group object\"),\n\t\t\tDataTypes: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"SSH Private Key\"),\n\t\t\t\tpulumi.String(\"CSV File\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataTypeTraditionalGroupOutput(ctx, checkpoint.GetManagementDataTypeTraditionalGroupOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeTraditionalGroup;\nimport com.pulumi.checkpoint.ManagementDataTypeTraditionalGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypeTraditionalGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeTraditionalGroup(\"example\", ManagementDataTypeTraditionalGroupArgs.builder()\n            .name(\"trad-group-obj\")\n            .description(\"traditional group object\")\n            .dataTypes(            \n                \"SSH Private Key\",\n                \"CSV File\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypeTraditionalGroup(GetManagementDataTypeTraditionalGroupArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeTraditionalGroup\n    properties:\n      name: trad-group-obj\n      description: traditional group object\n      dataTypes:\n        - SSH Private Key\n        - CSV File\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypeTraditionalGroup\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypeTraditionalGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypeTraditionalGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataTypes": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "description": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "dataTypes",
          "description",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataTypeWeightedKeywords:getManagementDataTypeWeightedKeywords": {
      "description": "Use this data source to get information on an existing Check Point Data Type Weighted Keywords.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDataTypeWeightedKeywords(\"example\", {\n    name: \"weighted-words-obj\",\n    weightedKeywords: [{\n        keyword: \"name\",\n        weight: 4,\n        maxWeight: 4,\n        regex: true,\n    }],\n    sumOfWeightsThreshold: 10,\n});\nconst data = checkpoint.getManagementDataTypeWeightedKeywordsOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDataTypeWeightedKeywords(\"example\",\n    name=\"weighted-words-obj\",\n    weighted_keywords=[{\n        \"keyword\": \"name\",\n        \"weight\": 4,\n        \"max_weight\": 4,\n        \"regex\": True,\n    }],\n    sum_of_weights_threshold=10)\ndata = checkpoint.get_management_data_type_weighted_keywords_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDataTypeWeightedKeywords(\"example\", new()\n    {\n        Name = \"weighted-words-obj\",\n        WeightedKeywords = new[]\n        {\n            new Checkpoint.Inputs.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs\n            {\n                Keyword = \"name\",\n                Weight = 4,\n                MaxWeight = 4,\n                Regex = true,\n            },\n        },\n        SumOfWeightsThreshold = 10,\n    });\n\n    var data = Checkpoint.GetManagementDataTypeWeightedKeywords.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDataTypeWeightedKeywords(ctx, \"example\", \u0026checkpoint.ManagementDataTypeWeightedKeywordsArgs{\n\t\t\tName: pulumi.String(\"weighted-words-obj\"),\n\t\t\tWeightedKeywords: checkpoint.ManagementDataTypeWeightedKeywordsWeightedKeywordArray{\n\t\t\t\t\u0026checkpoint.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs{\n\t\t\t\t\tKeyword:   pulumi.String(\"name\"),\n\t\t\t\t\tWeight:    pulumi.Float64(4),\n\t\t\t\t\tMaxWeight: pulumi.Float64(4),\n\t\t\t\t\tRegex:     pulumi.Bool(true),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSumOfWeightsThreshold: pulumi.Float64(10),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDataTypeWeightedKeywordsOutput(ctx, checkpoint.GetManagementDataTypeWeightedKeywordsOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDataTypeWeightedKeywords;\nimport com.pulumi.checkpoint.ManagementDataTypeWeightedKeywordsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementDataTypeWeightedKeywordsWeightedKeywordArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataTypeWeightedKeywordsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDataTypeWeightedKeywords(\"example\", ManagementDataTypeWeightedKeywordsArgs.builder()\n            .name(\"weighted-words-obj\")\n            .weightedKeywords(ManagementDataTypeWeightedKeywordsWeightedKeywordArgs.builder()\n                .keyword(\"name\")\n                .weight(4.0)\n                .maxWeight(4.0)\n                .regex(true)\n                .build())\n            .sumOfWeightsThreshold(10.0)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementDataTypeWeightedKeywords(GetManagementDataTypeWeightedKeywordsArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDataTypeWeightedKeywords\n    properties:\n      name: weighted-words-obj\n      weightedKeywords:\n        - keyword: name\n          weight: '4'\n          maxWeight: '4'\n          regex: true\n      sumOfWeightsThreshold: 10\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementDataTypeWeightedKeywords\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataTypeWeightedKeywords.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataTypeWeightedKeywords.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "sumOfWeightsThreshold": {
            "type": "number"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "weightedKeywords": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataTypeWeightedKeywordsWeightedKeyword:getManagementDataTypeWeightedKeywordsWeightedKeyword"
            },
            "type": "array"
          }
        },
        "required": [
          "color",
          "comments",
          "description",
          "id",
          "name",
          "sumOfWeightsThreshold",
          "tags",
          "weightedKeywords"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityMeshed:getManagementDataVpnCommunityMeshed": {
      "description": "Use this data source to get information on an existing Check Point Vpn Community Meshed.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst vpnCommunityMeshed = new checkpoint.ManagementVpnCommunityMeshed(\"vpn_community_meshed\", {\n    name: \"vpn community meshed\",\n    encryptionMethod: \"ikev1 for ipv4 and ikev2 for ipv6 only\",\n    encryptionSuite: \"custom\",\n});\nconst dataVpnCommunityMeshed = checkpoint.getManagementDataVpnCommunityMeshedOutput({\n    name: vpnCommunityMeshed.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nvpn_community_meshed = checkpoint.ManagementVpnCommunityMeshed(\"vpn_community_meshed\",\n    name=\"vpn community meshed\",\n    encryption_method=\"ikev1 for ipv4 and ikev2 for ipv6 only\",\n    encryption_suite=\"custom\")\ndata_vpn_community_meshed = checkpoint.get_management_data_vpn_community_meshed_output(name=vpn_community_meshed.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var vpnCommunityMeshed = new Checkpoint.ManagementVpnCommunityMeshed(\"vpn_community_meshed\", new()\n    {\n        Name = \"vpn community meshed\",\n        EncryptionMethod = \"ikev1 for ipv4 and ikev2 for ipv6 only\",\n        EncryptionSuite = \"custom\",\n    });\n\n    var dataVpnCommunityMeshed = Checkpoint.GetManagementDataVpnCommunityMeshed.Invoke(new()\n    {\n        Name = vpnCommunityMeshed.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tvpnCommunityMeshed, err := checkpoint.NewManagementVpnCommunityMeshed(ctx, \"vpn_community_meshed\", \u0026checkpoint.ManagementVpnCommunityMeshedArgs{\n\t\t\tName:             pulumi.String(\"vpn community meshed\"),\n\t\t\tEncryptionMethod: pulumi.String(\"ikev1 for ipv4 and ikev2 for ipv6 only\"),\n\t\t\tEncryptionSuite:  pulumi.String(\"custom\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataVpnCommunityMeshedOutput(ctx, checkpoint.GetManagementDataVpnCommunityMeshedOutputArgs{\n\t\t\tName: vpnCommunityMeshed.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVpnCommunityMeshed;\nimport com.pulumi.checkpoint.ManagementVpnCommunityMeshedArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataVpnCommunityMeshedArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var vpnCommunityMeshed = new ManagementVpnCommunityMeshed(\"vpnCommunityMeshed\", ManagementVpnCommunityMeshedArgs.builder()\n            .name(\"vpn community meshed\")\n            .encryptionMethod(\"ikev1 for ipv4 and ikev2 for ipv6 only\")\n            .encryptionSuite(\"custom\")\n            .build());\n\n        final var dataVpnCommunityMeshed = CheckpointFunctions.getManagementDataVpnCommunityMeshed(GetManagementDataVpnCommunityMeshedArgs.builder()\n            .name(vpnCommunityMeshed.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  vpnCommunityMeshed:\n    type: checkpoint:ManagementVpnCommunityMeshed\n    name: vpn_community_meshed\n    properties:\n      name: vpn community meshed\n      encryptionMethod: ikev1 for ipv4 and ikev2 for ipv6 only\n      encryptionSuite: custom\nvariables:\n  dataVpnCommunityMeshed:\n    fn::invoke:\n      function: checkpoint:getManagementDataVpnCommunityMeshed\n      arguments:\n        name: ${vpnCommunityMeshed.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataVpnCommunityMeshed.\n",
        "properties": {
          "excludedServices": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of services that are excluded from the community identified by the name or UID.\u003cbr\u003e Connections with these services will not be encrypted and will not match rules specifying the community in the VPN community.excluded_services blocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataVpnCommunityMeshed.\n",
        "properties": {
          "advancedProperties": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedAdvancedProperty:getManagementDataVpnCommunityMeshedAdvancedProperty"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "disableNat": {
            "type": "boolean"
          },
          "encryptedTraffics": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedEncryptedTraffic:getManagementDataVpnCommunityMeshedEncryptedTraffic"
            },
            "type": "array"
          },
          "encryptionMethod": {
            "type": "string"
          },
          "encryptionSuite": {
            "type": "string"
          },
          "excludedServices": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "gateways": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "granularEncryptions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedGranularEncryption:getManagementDataVpnCommunityMeshedGranularEncryption"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ikePhase1": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "ikePhase2": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "linkSelectionMode": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "overrideInterfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedOverrideInterface:getManagementDataVpnCommunityMeshedOverrideInterface"
            },
            "type": "array"
          },
          "overrideVpnDomains": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedOverrideVpnDomain:getManagementDataVpnCommunityMeshedOverrideVpnDomain"
            },
            "type": "array"
          },
          "permanentTunnels": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedPermanentTunnel:getManagementDataVpnCommunityMeshedPermanentTunnel"
            },
            "type": "array"
          },
          "routingMode": {
            "type": "string"
          },
          "sharedSecrets": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedSharedSecret:getManagementDataVpnCommunityMeshedSharedSecret"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tunnelGranularity": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "useSharedSecret": {
            "type": "boolean"
          },
          "wireModes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityMeshedWireMode:getManagementDataVpnCommunityMeshedWireMode"
            },
            "type": "array"
          }
        },
        "required": [
          "advancedProperties",
          "color",
          "comments",
          "disableNat",
          "encryptedTraffics",
          "encryptionMethod",
          "encryptionSuite",
          "gateways",
          "granularEncryptions",
          "id",
          "ikePhase1",
          "ikePhase2",
          "linkSelectionMode",
          "overrideInterfaces",
          "overrideVpnDomains",
          "permanentTunnels",
          "routingMode",
          "sharedSecrets",
          "tags",
          "tunnelGranularity",
          "useSharedSecret",
          "wireModes"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataVpnCommunityStar:getManagementDataVpnCommunityStar": {
      "description": "Use this data source to get information on an existing Check Point Vpn Community Star.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst vpnCommunityStar = new checkpoint.ManagementVpnCommunityStar(\"vpn_community_star\", {\n    name: \"%s\",\n    encryptionMethod: \"ikev1 for ipv4 and ikev2 for ipv6 only\",\n    encryptionSuite: \"custom\",\n});\nconst dataVpnCommunityStar = checkpoint.getManagementDataVpnCommunityStarOutput({\n    name: vpnCommunityStar.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nvpn_community_star = checkpoint.ManagementVpnCommunityStar(\"vpn_community_star\",\n    name=\"%s\",\n    encryption_method=\"ikev1 for ipv4 and ikev2 for ipv6 only\",\n    encryption_suite=\"custom\")\ndata_vpn_community_star = checkpoint.get_management_data_vpn_community_star_output(name=vpn_community_star.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var vpnCommunityStar = new Checkpoint.ManagementVpnCommunityStar(\"vpn_community_star\", new()\n    {\n        Name = \"%s\",\n        EncryptionMethod = \"ikev1 for ipv4 and ikev2 for ipv6 only\",\n        EncryptionSuite = \"custom\",\n    });\n\n    var dataVpnCommunityStar = Checkpoint.GetManagementDataVpnCommunityStar.Invoke(new()\n    {\n        Name = vpnCommunityStar.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tvpnCommunityStar, err := checkpoint.NewManagementVpnCommunityStar(ctx, \"vpn_community_star\", \u0026checkpoint.ManagementVpnCommunityStarArgs{\n\t\t\tName:             pulumi.String(\"%s\"),\n\t\t\tEncryptionMethod: pulumi.String(\"ikev1 for ipv4 and ikev2 for ipv6 only\"),\n\t\t\tEncryptionSuite:  pulumi.String(\"custom\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataVpnCommunityStarOutput(ctx, checkpoint.GetManagementDataVpnCommunityStarOutputArgs{\n\t\t\tName: vpnCommunityStar.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVpnCommunityStar;\nimport com.pulumi.checkpoint.ManagementVpnCommunityStarArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataVpnCommunityStarArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var vpnCommunityStar = new ManagementVpnCommunityStar(\"vpnCommunityStar\", ManagementVpnCommunityStarArgs.builder()\n            .name(\"%s\")\n            .encryptionMethod(\"ikev1 for ipv4 and ikev2 for ipv6 only\")\n            .encryptionSuite(\"custom\")\n            .build());\n\n        final var dataVpnCommunityStar = CheckpointFunctions.getManagementDataVpnCommunityStar(GetManagementDataVpnCommunityStarArgs.builder()\n            .name(vpnCommunityStar.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  vpnCommunityStar:\n    type: checkpoint:ManagementVpnCommunityStar\n    name: vpn_community_star\n    properties:\n      name: '%s'\n      encryptionMethod: ikev1 for ipv4 and ikev2 for ipv6 only\n      encryptionSuite: custom\nvariables:\n  dataVpnCommunityStar:\n    fn::invoke:\n      function: checkpoint:getManagementDataVpnCommunityStar\n      arguments:\n        name: ${vpnCommunityStar.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataVpnCommunityStar.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataVpnCommunityStar.\n",
        "properties": {
          "advancedProperties": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarAdvancedProperty:getManagementDataVpnCommunityStarAdvancedProperty"
            },
            "type": "array"
          },
          "centerGateways": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "disableNat": {
            "type": "boolean"
          },
          "disableNatOn": {
            "type": "string"
          },
          "encryptedTraffics": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarEncryptedTraffic:getManagementDataVpnCommunityStarEncryptedTraffic"
            },
            "type": "array"
          },
          "encryptionMethod": {
            "type": "string"
          },
          "encryptionSuite": {
            "type": "string"
          },
          "excludedServices": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "granularEncryptions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarGranularEncryption:getManagementDataVpnCommunityStarGranularEncryption"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ikePhase1": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "ikePhase2": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "linkSelectionMode": {
            "type": "string"
          },
          "meps": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarMep:getManagementDataVpnCommunityStarMep"
            },
            "type": "array"
          },
          "meshCenterGateways": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "overrideInterfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarOverrideInterface:getManagementDataVpnCommunityStarOverrideInterface"
            },
            "type": "array"
          },
          "overrideVpnDomains": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarOverrideVpnDomain:getManagementDataVpnCommunityStarOverrideVpnDomain"
            },
            "type": "array"
          },
          "permanentTunnels": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarPermanentTunnel:getManagementDataVpnCommunityStarPermanentTunnel"
            },
            "type": "array"
          },
          "routingMode": {
            "type": "string"
          },
          "satelliteGateways": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sharedSecrets": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarSharedSecret:getManagementDataVpnCommunityStarSharedSecret"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tunnelGranularity": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "useSharedSecret": {
            "type": "boolean"
          },
          "vpnRouting": {
            "type": "string"
          },
          "wireModes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDataVpnCommunityStarWireMode:getManagementDataVpnCommunityStarWireMode"
            },
            "type": "array"
          }
        },
        "required": [
          "advancedProperties",
          "centerGateways",
          "color",
          "comments",
          "disableNat",
          "disableNatOn",
          "encryptedTraffics",
          "encryptionMethod",
          "encryptionSuite",
          "excludedServices",
          "granularEncryptions",
          "id",
          "ikePhase1",
          "ikePhase2",
          "linkSelectionMode",
          "meps",
          "meshCenterGateways",
          "overrideInterfaces",
          "overrideVpnDomains",
          "permanentTunnels",
          "routingMode",
          "satelliteGateways",
          "sharedSecrets",
          "tags",
          "tunnelGranularity",
          "useSharedSecret",
          "vpnRouting",
          "wireModes"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDataWildcard:getManagementDataWildcard": {
      "description": "Use this data source to get information on an existing Check Point Wildcard.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst wildcard = new checkpoint.ManagementWildcard(\"wildcard\", {\n    name: \"%s\",\n    ipv4Address: \"192.168.2.1\",\n    ipv4MaskWildcard: \"0.0.0.128\",\n});\nconst dataWildcard = checkpoint.getManagementDataWildcardOutput({\n    name: wildcard.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nwildcard = checkpoint.ManagementWildcard(\"wildcard\",\n    name=\"%s\",\n    ipv4_address=\"192.168.2.1\",\n    ipv4_mask_wildcard=\"0.0.0.128\")\ndata_wildcard = checkpoint.get_management_data_wildcard_output(name=wildcard.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var wildcard = new Checkpoint.ManagementWildcard(\"wildcard\", new()\n    {\n        Name = \"%s\",\n        Ipv4Address = \"192.168.2.1\",\n        Ipv4MaskWildcard = \"0.0.0.128\",\n    });\n\n    var dataWildcard = Checkpoint.GetManagementDataWildcard.Invoke(new()\n    {\n        Name = wildcard.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\twildcard, err := checkpoint.NewManagementWildcard(ctx, \"wildcard\", \u0026checkpoint.ManagementWildcardArgs{\n\t\t\tName:             pulumi.String(\"%s\"),\n\t\t\tIpv4Address:      pulumi.String(\"192.168.2.1\"),\n\t\t\tIpv4MaskWildcard: pulumi.String(\"0.0.0.128\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.GetManagementDataWildcardOutput(ctx, checkpoint.GetManagementDataWildcardOutputArgs{\n\t\t\tName: wildcard.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementWildcard;\nimport com.pulumi.checkpoint.ManagementWildcardArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDataWildcardArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var wildcard = new ManagementWildcard(\"wildcard\", ManagementWildcardArgs.builder()\n            .name(\"%s\")\n            .ipv4Address(\"192.168.2.1\")\n            .ipv4MaskWildcard(\"0.0.0.128\")\n            .build());\n\n        final var dataWildcard = CheckpointFunctions.getManagementDataWildcard(GetManagementDataWildcardArgs.builder()\n            .name(wildcard.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  wildcard:\n    type: checkpoint:ManagementWildcard\n    properties:\n      name: '%s'\n      ipv4Address: 192.168.2.1\n      ipv4MaskWildcard: 0.0.0.128\nvariables:\n  dataWildcard:\n    fn::invoke:\n      function: checkpoint:getManagementDataWildcard\n      arguments:\n        name: ${wildcard.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDataWildcard.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDataWildcard.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv4MaskWildcard": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "ipv6MaskWildcard": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groups",
          "id",
          "ipv4Address",
          "ipv4MaskWildcard",
          "ipv6Address",
          "ipv6MaskWildcard",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDefaultAdministratorSettings:getManagementDefaultAdministratorSettings": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDefaultAdministratorSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDefaultAdministratorSettings.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string"
          },
          "daysToIndicateExpirationInAdminView": {
            "type": "number"
          },
          "daysToNotifyExpirationToAdmin": {
            "type": "number"
          },
          "expirationDates": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDefaultAdministratorSettingsExpirationDate:getManagementDefaultAdministratorSettingsExpirationDate"
            },
            "type": "array"
          },
          "expirationPeriod": {
            "type": "number"
          },
          "expirationPeriodTimeUnits": {
            "type": "string"
          },
          "expirationType": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "indicateExpirationInAdminView": {
            "type": "boolean"
          },
          "notifyExpirationToAdmin": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "authenticationMethod",
          "daysToIndicateExpirationInAdminView",
          "daysToNotifyExpirationToAdmin",
          "expirationDates",
          "expirationPeriod",
          "expirationPeriodTimeUnits",
          "expirationType",
          "id",
          "indicateExpirationInAdminView",
          "notifyExpirationToAdmin",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDomain:getManagementDomain": {
      "description": "Use this data source to get information on an existing Check Point Domain.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDomain(\"example\", {\n    name: \"domain1\",\n    servers: [{\n        name: \"domain1_ManagementServer_1\",\n        ipv4Address: \"192.0.2.1\",\n        multiDomainServer: \"MDM_Server\",\n    }],\n});\nconst dataDomain = checkpoint.getManagementDomainOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDomain(\"example\",\n    name=\"domain1\",\n    servers=[{\n        \"name\": \"domain1_ManagementServer_1\",\n        \"ipv4_address\": \"192.0.2.1\",\n        \"multi_domain_server\": \"MDM_Server\",\n    }])\ndata_domain = checkpoint.get_management_domain_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDomain(\"example\", new()\n    {\n        Name = \"domain1\",\n        Servers = new[]\n        {\n            new Checkpoint.Inputs.ManagementDomainServerArgs\n            {\n                Name = \"domain1_ManagementServer_1\",\n                Ipv4Address = \"192.0.2.1\",\n                MultiDomainServer = \"MDM_Server\",\n            },\n        },\n    });\n\n    var dataDomain = Checkpoint.GetManagementDomain.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDomain(ctx, \"example\", \u0026checkpoint.ManagementDomainArgs{\n\t\t\tName: pulumi.String(\"domain1\"),\n\t\t\tServers: checkpoint.ManagementDomainServerArray{\n\t\t\t\t\u0026checkpoint.ManagementDomainServerArgs{\n\t\t\t\t\tName:              pulumi.String(\"domain1_ManagementServer_1\"),\n\t\t\t\t\tIpv4Address:       pulumi.String(\"192.0.2.1\"),\n\t\t\t\t\tMultiDomainServer: pulumi.String(\"MDM_Server\"),\n\t\t\t\t},\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDomainOutput(ctx, checkpoint.GetManagementDomainOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDomain;\nimport com.pulumi.checkpoint.ManagementDomainArgs;\nimport com.pulumi.checkpoint.inputs.ManagementDomainServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDomainArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDomain(\"example\", ManagementDomainArgs.builder()\n            .name(\"domain1\")\n            .servers(ManagementDomainServerArgs.builder()\n                .name(\"domain1_ManagementServer_1\")\n                .ipv4Address(\"192.0.2.1\")\n                .multiDomainServer(\"MDM_Server\")\n                .build())\n            .build());\n\n        final var dataDomain = CheckpointFunctions.getManagementDomain(GetManagementDomainArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDomain\n    properties:\n      name: domain1\n      servers:\n        - name: domain1_ManagementServer_1\n          ipv4Address: 192.0.2.1\n          multiDomainServer: MDM_Server\nvariables:\n  dataDomain:\n    fn::invoke:\n      function: checkpoint:getManagementDomain\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDomain.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDomain.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "servers": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDomainServer:getManagementDomainServer"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "servers",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDomainPermissionsProfile:getManagementDomainPermissionsProfile": {
      "description": "Use this data source to get information on an existing Check Point Domain Permissions Profile.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDomainPermissionsProfile(\"example\", {name: \"customize profile\"});\nconst dataDomainPermissionsProfile = checkpoint.getManagementDomainPermissionsProfileOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDomainPermissionsProfile(\"example\", name=\"customize profile\")\ndata_domain_permissions_profile = checkpoint.get_management_domain_permissions_profile_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDomainPermissionsProfile(\"example\", new()\n    {\n        Name = \"customize profile\",\n    });\n\n    var dataDomainPermissionsProfile = Checkpoint.GetManagementDomainPermissionsProfile.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDomainPermissionsProfile(ctx, \"example\", \u0026checkpoint.ManagementDomainPermissionsProfileArgs{\n\t\t\tName: pulumi.String(\"customize profile\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDomainPermissionsProfileOutput(ctx, checkpoint.GetManagementDomainPermissionsProfileOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDomainPermissionsProfile;\nimport com.pulumi.checkpoint.ManagementDomainPermissionsProfileArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDomainPermissionsProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDomainPermissionsProfile(\"example\", ManagementDomainPermissionsProfileArgs.builder()\n            .name(\"customize profile\")\n            .build());\n\n        final var dataDomainPermissionsProfile = CheckpointFunctions.getManagementDomainPermissionsProfile(GetManagementDomainPermissionsProfileArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDomainPermissionsProfile\n    properties:\n      name: customize profile\nvariables:\n  dataDomainPermissionsProfile:\n    fn::invoke:\n      function: checkpoint:getManagementDomainPermissionsProfile\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDomainPermissionsProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDomainPermissionsProfile.\n",
        "properties": {
          "accessControls": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementDomainPermissionsProfileAccessControl:getManagementDomainPermissionsProfileAccessControl"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "editCommonObjects": {
            "type": "boolean"
          },
          "endpoint": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "eventsAndReports": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "gateways": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "management": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "monitoringAndLogging": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "others": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "permissionType": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatPrevention": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "accessControls",
          "color",
          "comments",
          "editCommonObjects",
          "endpoint",
          "eventsAndReports",
          "gateways",
          "id",
          "management",
          "monitoringAndLogging",
          "others",
          "permissionType",
          "tags",
          "threatPrevention"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementDynamicGlobalNetworkObject:getManagementDynamicGlobalNetworkObject": {
      "description": "Use this data source to get information on an existing Check Point Dynamic Global Network Object.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementDynamicGlobalNetworkObject(\"example\", {name: \"obj_global\"});\nconst dataExample = checkpoint.getManagementDynamicGlobalNetworkObjectOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementDynamicGlobalNetworkObject(\"example\", name=\"obj_global\")\ndata_example = checkpoint.get_management_dynamic_global_network_object_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementDynamicGlobalNetworkObject(\"example\", new()\n    {\n        Name = \"obj_global\",\n    });\n\n    var dataExample = Checkpoint.GetManagementDynamicGlobalNetworkObject.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementDynamicGlobalNetworkObject(ctx, \"example\", \u0026checkpoint.ManagementDynamicGlobalNetworkObjectArgs{\n\t\t\tName: pulumi.String(\"obj_global\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementDynamicGlobalNetworkObjectOutput(ctx, checkpoint.GetManagementDynamicGlobalNetworkObjectOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementDynamicGlobalNetworkObject;\nimport com.pulumi.checkpoint.ManagementDynamicGlobalNetworkObjectArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementDynamicGlobalNetworkObjectArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementDynamicGlobalNetworkObject(\"example\", ManagementDynamicGlobalNetworkObjectArgs.builder()\n            .name(\"obj_global\")\n            .build());\n\n        final var dataExample = CheckpointFunctions.getManagementDynamicGlobalNetworkObject(GetManagementDynamicGlobalNetworkObjectArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementDynamicGlobalNetworkObject\n    properties:\n      name: obj_global\nvariables:\n  dataExample:\n    fn::invoke:\n      function: checkpoint:getManagementDynamicGlobalNetworkObject\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementDynamicGlobalNetworkObject.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementDynamicGlobalNetworkObject.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementExternalTrustedCa:getManagementExternalTrustedCa": {
      "description": "Use this data source to get information on an existing Check Point External Trusted Ca.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementExternalTrustedCa(\"example\", {\n    name: \"external_ca\",\n    base64Certificate: \"MIICujCCAaKgAwIBAgIIP1+IHWHbl0EwDQYJKoZIhvcNAQELBQAwFDESMBAGA1UEAxMJd3d3LnouY29tMB4XDTIzMTEyOTEyMzAwMFoXDTI0MTEyMDE2MDAwMFowFDESMBAGA1UEAxMJd3d3LnouY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoBreRGuq8u43GBog+ZaAnaR8ZF8cT2ppvtd3JoFmzTOQivLIt9sNtFYqEgHCtnNkKn9TRrxN14YscHgKIxfDSVlC9Rh0rrBvWgFqcm715Whr99Ogx6JbYFkusFWJarSejIFx4n6MM48MJxLdtCP6Hy1G2cj1BCiCHj4i3VIVaDE/aMkSqJbYEvf+vFqUWxY8/uEuKI/HGhI7mhUPW4NSGL0Oafz5eEFVsxqV5NA19/JJZ9NajSkyANnaNL5raxGV0oeqaE3JB3lSEZfWbH6mQsToUxxwIQfsZiIBozajDdTgP3Kn4SMY0b+I/WAWgfigMSDTAIR8J1sdzGXy2w2kqQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBUgrHztHwC1E0mU5c4reMrHg+z+YRHrgJNHVIYQbL5I2TJHk9S3UZsynoMa1CO86rReOtR5xoGv4PCkyyOW+PNlWUtXF3tNgqWj/21+XzG4RBHPw89TaTxRCdo+MHX58fi07SIzKjmxfdkEi+7+HQEQluDZGViolrGBAw2rXq/SZ3q/11mNqlb5ZyqyOa2u1sBF1ApvG5a/FBRTaO8gaiNelRf0PGYkuV+1HhF2XyP8Qk565d+uxUH5M7eHF2PNyVk/r/36T+x+UMql9y9iizA0ekuAjXLok1xYl3Vw4S5zXCXYtNZLOVrs+plJb7IrlElyTOAbDFuPugh0medz7uZ\",\n});\nconst data1 = checkpoint.getManagementExternalTrustedCa({\n    uid: obj1.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementExternalTrustedCa(\"example\",\n    name=\"external_ca\",\n    base64_certificate=\"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\")\ndata1 = checkpoint.get_management_external_trusted_ca(uid=obj1[\"id\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementExternalTrustedCa(\"example\", new()\n    {\n        Name = \"external_ca\",\n        Base64Certificate = \"MIICujCCAaKgAwIBAgIIP1+IHWHbl0EwDQYJKoZIhvcNAQELBQAwFDESMBAGA1UEAxMJd3d3LnouY29tMB4XDTIzMTEyOTEyMzAwMFoXDTI0MTEyMDE2MDAwMFowFDESMBAGA1UEAxMJd3d3LnouY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAoBreRGuq8u43GBog+ZaAnaR8ZF8cT2ppvtd3JoFmzTOQivLIt9sNtFYqEgHCtnNkKn9TRrxN14YscHgKIxfDSVlC9Rh0rrBvWgFqcm715Whr99Ogx6JbYFkusFWJarSejIFx4n6MM48MJxLdtCP6Hy1G2cj1BCiCHj4i3VIVaDE/aMkSqJbYEvf+vFqUWxY8/uEuKI/HGhI7mhUPW4NSGL0Oafz5eEFVsxqV5NA19/JJZ9NajSkyANnaNL5raxGV0oeqaE3JB3lSEZfWbH6mQsToUxxwIQfsZiIBozajDdTgP3Kn4SMY0b+I/WAWgfigMSDTAIR8J1sdzGXy2w2kqQIDAQABoxAwDjAMBgNVHRMEBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IBAQBUgrHztHwC1E0mU5c4reMrHg+z+YRHrgJNHVIYQbL5I2TJHk9S3UZsynoMa1CO86rReOtR5xoGv4PCkyyOW+PNlWUtXF3tNgqWj/21+XzG4RBHPw89TaTxRCdo+MHX58fi07SIzKjmxfdkEi+7+HQEQluDZGViolrGBAw2rXq/SZ3q/11mNqlb5ZyqyOa2u1sBF1ApvG5a/FBRTaO8gaiNelRf0PGYkuV+1HhF2XyP8Qk565d+uxUH5M7eHF2PNyVk/r/36T+x+UMql9y9iizA0ekuAjXLok1xYl3Vw4S5zXCXYtNZLOVrs+plJb7IrlElyTOAbDFuPugh0medz7uZ\",\n    });\n\n    var data1 = Checkpoint.GetManagementExternalTrustedCa.Invoke(new()\n    {\n        Uid = obj1.Id,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementExternalTrustedCa(ctx, \"example\", \u0026checkpoint.ManagementExternalTrustedCaArgs{\n\t\t\tName:              pulumi.String(\"external_ca\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementExternalTrustedCa(ctx, \u0026checkpoint.LookupManagementExternalTrustedCaArgs{\n\t\t\tUid: pulumi.StringRef(obj1.Id),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementExternalTrustedCa;\nimport com.pulumi.checkpoint.ManagementExternalTrustedCaArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementExternalTrustedCaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementExternalTrustedCa(\"example\", ManagementExternalTrustedCaArgs.builder()\n            .name(\"external_ca\")\n            .base64Certificate(\"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\")\n            .build());\n\n        final var data1 = CheckpointFunctions.getManagementExternalTrustedCa(GetManagementExternalTrustedCaArgs.builder()\n            .uid(obj1.id())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementExternalTrustedCa\n    properties:\n      name: external_ca\n      base64Certificate: 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\nvariables:\n  data1:\n    fn::invoke:\n      function: checkpoint:getManagementExternalTrustedCa\n      arguments:\n        uid: ${obj1.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementExternalTrustedCa.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementExternalTrustedCa.\n",
        "properties": {
          "allowCertificatesFromBranches": {
            "type": "boolean"
          },
          "base64Certificate": {
            "type": "string"
          },
          "branches": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "crlCacheMethod": {
            "type": "string"
          },
          "crlCacheTimeout": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "retrieveCrlFromHttpServers": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowCertificatesFromBranches",
          "base64Certificate",
          "branches",
          "color",
          "comments",
          "crlCacheMethod",
          "crlCacheTimeout",
          "id",
          "retrieveCrlFromHttpServers",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGaiaBestPractice:getManagementGaiaBestPractice": {
      "description": "Use this data source to get information on an existing Check Point Host.\n\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst gaiaBestPractice = new checkpoint.ManagementGaiaBestPractice(\"gaia_best_practice\", {\n    name: \"Make sure that the network access via Telnet is disabled.\",\n    description: \"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\",\n    actionItem: \"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\",\n    expectedOutputText: \"Success\",\n    practiceScriptBase64: \"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\",\n});\nconst dataGaiaBestPractice = checkpoint.getManagementGaiaBestPracticeOutput({\n    name: gaiaBestPractice.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngaia_best_practice = checkpoint.ManagementGaiaBestPractice(\"gaia_best_practice\",\n    name=\"Make sure that the network access via Telnet is disabled.\",\n    description=\"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\",\n    action_item=\"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\",\n    expected_output_text=\"Success\",\n    practice_script_base64=\"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\")\ndata_gaia_best_practice = checkpoint.get_management_gaia_best_practice_output(name=gaia_best_practice.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var gaiaBestPractice = new Checkpoint.ManagementGaiaBestPractice(\"gaia_best_practice\", new()\n    {\n        Name = \"Make sure that the network access via Telnet is disabled.\",\n        Description = \"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\",\n        ActionItem = \"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\",\n        ExpectedOutputText = \"Success\",\n        PracticeScriptBase64 = \"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\",\n    });\n\n    var dataGaiaBestPractice = Checkpoint.GetManagementGaiaBestPractice.Invoke(new()\n    {\n        Name = gaiaBestPractice.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tgaiaBestPractice, err := checkpoint.NewManagementGaiaBestPractice(ctx, \"gaia_best_practice\", \u0026checkpoint.ManagementGaiaBestPracticeArgs{\n\t\t\tName:                 pulumi.String(\"Make sure that the network access via Telnet is disabled.\"),\n\t\t\tDescription:          pulumi.String(\"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\"),\n\t\t\tActionItem:           pulumi.String(\"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\"),\n\t\t\tExpectedOutputText:   pulumi.String(\"Success\"),\n\t\t\tPracticeScriptBase64: pulumi.String(\"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementGaiaBestPracticeOutput(ctx, checkpoint.GetManagementGaiaBestPracticeOutputArgs{\n\t\t\tName: gaiaBestPractice.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGaiaBestPractice;\nimport com.pulumi.checkpoint.ManagementGaiaBestPracticeArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementGaiaBestPracticeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var gaiaBestPractice = new ManagementGaiaBestPractice(\"gaiaBestPractice\", ManagementGaiaBestPracticeArgs.builder()\n            .name(\"Make sure that the network access via Telnet is disabled.\")\n            .description(\"This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\")\n            .actionItem(\"Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\")\n            .expectedOutputText(\"Success\")\n            .practiceScriptBase64(\"IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\")\n            .build());\n\n        final var dataGaiaBestPractice = CheckpointFunctions.getManagementGaiaBestPractice(GetManagementGaiaBestPracticeArgs.builder()\n            .name(gaiaBestPractice.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  gaiaBestPractice:\n    type: checkpoint:ManagementGaiaBestPractice\n    name: gaia_best_practice\n    properties:\n      name: Make sure that the network access via Telnet is disabled.\n      description: This Gaia Best Practice makes sure that the network access, via Telnet, is disabled.\n      actionItem: Validate that the Telnet settings are disabled on the configuration set on the GAIA OS.\n      expectedOutputText: Success\n      practiceScriptBase64: IyEvYmluL2Jhc2gKCnRlbG5ldF9vZmY9JChjbGlzaCAtYyAic2hvdyBjb25maWd1cmF0aW9uIiB8IGdyZXAgInNldCBuZXQtYWNjZXNzIHRlbG5ldCIgfCBncmVwICJvZmYiKQppZiBbICEgLXogIiR0ZWxuZXRfb2ZmIiBdOyB0aGVuCgllY2hvIFN1Y2Nlc3MKZWxzZQoJZWNobyBGYWlsCmZp\nvariables:\n  dataGaiaBestPractice:\n    fn::invoke:\n      function: checkpoint:getManagementGaiaBestPractice\n      arguments:\n        name: ${gaiaBestPractice.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGaiaBestPractice.\n",
        "properties": {
          "bestPracticeId": {
            "type": "string",
            "description": "Best Practice ID.\n"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Best Practice Name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Best Practice UID.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGaiaBestPractice.\n",
        "properties": {
          "actionItem": {
            "type": "string"
          },
          "bestPracticeId": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "expectedOutputBase64": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "practiceScriptBase64": {
            "type": "string"
          },
          "regulations": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGaiaBestPracticeRegulation:getManagementGaiaBestPracticeRegulation"
            },
            "type": "array"
          },
          "relevantObjects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGaiaBestPracticeRelevantObject:getManagementGaiaBestPracticeRelevantObject"
            },
            "type": "array"
          },
          "status": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "userDefined": {
            "type": "boolean"
          }
        },
        "required": [
          "actionItem",
          "description",
          "expectedOutputBase64",
          "id",
          "practiceScriptBase64",
          "regulations",
          "relevantObjects",
          "status",
          "userDefined"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGatewayCapabilities:getManagementGatewayCapabilities": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGatewayCapabilities.\n",
        "properties": {
          "hardware": {
            "type": "string",
            "description": "Check Point hardware.\n"
          },
          "id": {
            "type": "string"
          },
          "platform": {
            "type": "string",
            "description": "Check Point gateway platform.\n"
          },
          "version": {
            "type": "string",
            "description": "Gateway platform version.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGatewayCapabilities.\n",
        "properties": {
          "hardware": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "platform": {
            "type": "string"
          },
          "restrictions": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "supportedBlades": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedBlade:getManagementGatewayCapabilitiesSupportedBlade"
            },
            "type": "array"
          },
          "supportedFirmwarePlatforms": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedFirmwarePlatform:getManagementGatewayCapabilitiesSupportedFirmwarePlatform"
            },
            "type": "array"
          },
          "supportedHardwares": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedHardware:getManagementGatewayCapabilitiesSupportedHardware"
            },
            "type": "array"
          },
          "supportedPlatforms": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedPlatform:getManagementGatewayCapabilitiesSupportedPlatform"
            },
            "type": "array"
          },
          "supportedVersions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGatewayCapabilitiesSupportedVersion:getManagementGatewayCapabilitiesSupportedVersion"
            },
            "type": "array"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "restrictions",
          "supportedBlades",
          "supportedFirmwarePlatforms",
          "supportedHardwares",
          "supportedPlatforms",
          "supportedVersions"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGatewayGlobalUse:getManagementGatewayGlobalUse": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGatewayGlobalUse.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "target": {
            "type": "string",
            "description": "On what target to execute this command. Target may be identified by its object name, or object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "target"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGatewayGlobalUse.\n",
        "properties": {
          "domain": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "target": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "domain",
          "enabled",
          "id",
          "name",
          "target",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGcpDataCenterServer:getManagementGcpDataCenterServer": {
      "description": "Use this data source to get information on an existing Google Cloud Platform Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testGcp = new checkpoint.ManagementGcpDataCenterServer(\"testGcp\", {\n    name: \"myGcp\",\n    authenticationMethod: \"key-authentication\",\n    privateKey: \"MYKEY.json\",\n    ignoreWarnings: true,\n});\nconst dataGcpDataCenterServer = checkpoint.getManagementGcpDataCenterServerOutput({\n    name: testGcp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_gcp = checkpoint.ManagementGcpDataCenterServer(\"testGcp\",\n    name=\"myGcp\",\n    authentication_method=\"key-authentication\",\n    private_key=\"MYKEY.json\",\n    ignore_warnings=True)\ndata_gcp_data_center_server = checkpoint.get_management_gcp_data_center_server_output(name=test_gcp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testGcp = new Checkpoint.ManagementGcpDataCenterServer(\"testGcp\", new()\n    {\n        Name = \"myGcp\",\n        AuthenticationMethod = \"key-authentication\",\n        PrivateKey = \"MYKEY.json\",\n        IgnoreWarnings = true,\n    });\n\n    var dataGcpDataCenterServer = Checkpoint.GetManagementGcpDataCenterServer.Invoke(new()\n    {\n        Name = testGcp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestGcp, err := checkpoint.NewManagementGcpDataCenterServer(ctx, \"testGcp\", \u0026checkpoint.ManagementGcpDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"myGcp\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"key-authentication\"),\n\t\t\tPrivateKey:           pulumi.String(\"MYKEY.json\"),\n\t\t\tIgnoreWarnings:       pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementGcpDataCenterServerOutput(ctx, checkpoint.GetManagementGcpDataCenterServerOutputArgs{\n\t\t\tName: testGcp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGcpDataCenterServer;\nimport com.pulumi.checkpoint.ManagementGcpDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementGcpDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testGcp = new ManagementGcpDataCenterServer(\"testGcp\", ManagementGcpDataCenterServerArgs.builder()\n            .name(\"myGcp\")\n            .authenticationMethod(\"key-authentication\")\n            .privateKey(\"MYKEY.json\")\n            .ignoreWarnings(true)\n            .build());\n\n        final var dataGcpDataCenterServer = CheckpointFunctions.getManagementGcpDataCenterServer(GetManagementGcpDataCenterServerArgs.builder()\n            .name(testGcp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testGcp:\n    type: checkpoint:ManagementGcpDataCenterServer\n    properties:\n      name: myGcp\n      authenticationMethod: key-authentication\n      privateKey: MYKEY.json\n      ignoreWarnings: true\nvariables:\n  dataGcpDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementGcpDataCenterServer\n      arguments:\n        name: ${testGcp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGcpDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGcpDataCenterServer.\n",
        "properties": {
          "authenticationMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "authenticationMethod",
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGenericDataCenterServer:getManagementGenericDataCenterServer": {
      "description": "Use this data source to get information on an existing Generic Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst genericTest = new checkpoint.ManagementGenericDataCenterServer(\"generic_test\", {\n    name: \"test\",\n    url: \"MY_URL\",\n    interval: \"60\",\n    comments: \"testing generic data center\",\n    color: \"crete blue\",\n    tags: [\"terraform\"],\n});\nconst dataGenericDataCenterServer = checkpoint.getManagementGenericDataCenterServerOutput({\n    name: genericTest.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ngeneric_test = checkpoint.ManagementGenericDataCenterServer(\"generic_test\",\n    name=\"test\",\n    url=\"MY_URL\",\n    interval=\"60\",\n    comments=\"testing generic data center\",\n    color=\"crete blue\",\n    tags=[\"terraform\"])\ndata_generic_data_center_server = checkpoint.get_management_generic_data_center_server_output(name=generic_test.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var genericTest = new Checkpoint.ManagementGenericDataCenterServer(\"generic_test\", new()\n    {\n        Name = \"test\",\n        Url = \"MY_URL\",\n        Interval = \"60\",\n        Comments = \"testing generic data center\",\n        Color = \"crete blue\",\n        Tags = new[]\n        {\n            \"terraform\",\n        },\n    });\n\n    var dataGenericDataCenterServer = Checkpoint.GetManagementGenericDataCenterServer.Invoke(new()\n    {\n        Name = genericTest.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tgenericTest, err := checkpoint.NewManagementGenericDataCenterServer(ctx, \"generic_test\", \u0026checkpoint.ManagementGenericDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"test\"),\n\t\t\tUrl:      pulumi.String(\"MY_URL\"),\n\t\t\tInterval: pulumi.String(\"60\"),\n\t\t\tComments: pulumi.String(\"testing generic data center\"),\n\t\t\tColor:    pulumi.String(\"crete blue\"),\n\t\t\tTags: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"terraform\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementGenericDataCenterServerOutput(ctx, checkpoint.GetManagementGenericDataCenterServerOutputArgs{\n\t\t\tName: genericTest.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGenericDataCenterServer;\nimport com.pulumi.checkpoint.ManagementGenericDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementGenericDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var genericTest = new ManagementGenericDataCenterServer(\"genericTest\", ManagementGenericDataCenterServerArgs.builder()\n            .name(\"test\")\n            .url(\"MY_URL\")\n            .interval(\"60\")\n            .comments(\"testing generic data center\")\n            .color(\"crete blue\")\n            .tags(\"terraform\")\n            .build());\n\n        final var dataGenericDataCenterServer = CheckpointFunctions.getManagementGenericDataCenterServer(GetManagementGenericDataCenterServerArgs.builder()\n            .name(genericTest.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  genericTest:\n    type: checkpoint:ManagementGenericDataCenterServer\n    name: generic_test\n    properties:\n      name: test\n      url: MY_URL\n      interval: '60'\n      comments: testing generic data center\n      color: crete blue\n      tags:\n        - terraform\nvariables:\n  dataGenericDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementGenericDataCenterServer\n      arguments:\n        name: ${genericTest.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGenericDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGenericDataCenterServer.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "customHeader": {
            "type": "boolean"
          },
          "customKey": {
            "type": "string"
          },
          "customValue": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "interval": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "url": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "customHeader",
          "customKey",
          "customValue",
          "id",
          "interval",
          "tags",
          "url"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGlobalAssignment:getManagementGlobalAssignment": {
      "description": "Use this data source to get information on an existing Check Point Global Assignment.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst globalAssignment = new checkpoint.ManagementGlobalAssignment(\"global_assignment\", {\n    globalDomain: \"Global\",\n    dependentDomain: \"domain2\",\n    globalAccessPolicy: \"standard\",\n    globalThreatPreventionPolicy: \"standard\",\n    manageProtectionActions: true,\n});\nconst dataGlobalAssignment = pulumi.all([globalAssignment.dependentDomain, globalAssignment.globalDomain]).apply(([dependentDomain, globalDomain]) =\u003e checkpoint.getManagementGlobalAssignmentOutput({\n    dependentDomain: dependentDomain,\n    globalDomain: globalDomain,\n}));\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nglobal_assignment = checkpoint.ManagementGlobalAssignment(\"global_assignment\",\n    global_domain=\"Global\",\n    dependent_domain=\"domain2\",\n    global_access_policy=\"standard\",\n    global_threat_prevention_policy=\"standard\",\n    manage_protection_actions=True)\ndata_global_assignment = pulumi.Output.all(\n    dependent_domain=global_assignment.dependent_domain,\n    global_domain=global_assignment.global_domain\n).apply(lambda resolved_outputs: checkpoint.get_management_global_assignment_output(dependent_domain=resolved_outputs['dependent_domain'],\n    global_domain=resolved_outputs['global_domain']))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var globalAssignment = new Checkpoint.ManagementGlobalAssignment(\"global_assignment\", new()\n    {\n        GlobalDomain = \"Global\",\n        DependentDomain = \"domain2\",\n        GlobalAccessPolicy = \"standard\",\n        GlobalThreatPreventionPolicy = \"standard\",\n        ManageProtectionActions = true,\n    });\n\n    var dataGlobalAssignment = Checkpoint.GetManagementGlobalAssignment.Invoke(new()\n    {\n        DependentDomain = globalAssignment.DependentDomain,\n        GlobalDomain = globalAssignment.GlobalDomain,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tglobalAssignment, err := checkpoint.NewManagementGlobalAssignment(ctx, \"global_assignment\", \u0026checkpoint.ManagementGlobalAssignmentArgs{\n\t\t\tGlobalDomain:                 pulumi.String(\"Global\"),\n\t\t\tDependentDomain:              pulumi.String(\"domain2\"),\n\t\t\tGlobalAccessPolicy:           pulumi.String(\"standard\"),\n\t\t\tGlobalThreatPreventionPolicy: pulumi.String(\"standard\"),\n\t\t\tManageProtectionActions:      pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pulumi.All(globalAssignment.DependentDomain, globalAssignment.GlobalDomain).ApplyT(func(_args []interface{}) (checkpoint.GetManagementGlobalAssignmentResult, error) {\n\t\t\tdependentDomain := _args[0].(*string)\n\t\t\tglobalDomain := _args[1].(*string)\n\t\t\treturn checkpoint.GetManagementGlobalAssignmentResult(interface{}(checkpoint.LookupManagementGlobalAssignmentOutput(ctx, checkpoint.GetManagementGlobalAssignmentOutputArgs{\n\t\t\t\tDependentDomain: dependentDomain,\n\t\t\t\tGlobalDomain:    globalDomain,\n\t\t\t}, nil))), nil\n\t\t}).(checkpoint.GetManagementGlobalAssignmentResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGlobalAssignment;\nimport com.pulumi.checkpoint.ManagementGlobalAssignmentArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementGlobalAssignmentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var globalAssignment = new ManagementGlobalAssignment(\"globalAssignment\", ManagementGlobalAssignmentArgs.builder()\n            .globalDomain(\"Global\")\n            .dependentDomain(\"domain2\")\n            .globalAccessPolicy(\"standard\")\n            .globalThreatPreventionPolicy(\"standard\")\n            .manageProtectionActions(true)\n            .build());\n\n        final var dataGlobalAssignment = Output.tuple(globalAssignment.dependentDomain(), globalAssignment.globalDomain()).applyValue(values -\u003e {\n            var dependentDomain = values.t1;\n            var globalDomain = values.t2;\n            return CheckpointFunctions.getManagementGlobalAssignment(GetManagementGlobalAssignmentArgs.builder()\n                .dependentDomain(dependentDomain)\n                .globalDomain(globalDomain)\n                .build());\n        });\n\n    }\n}\n```\n```yaml\nresources:\n  globalAssignment:\n    type: checkpoint:ManagementGlobalAssignment\n    name: global_assignment\n    properties:\n      globalDomain: Global\n      dependentDomain: domain2\n      globalAccessPolicy: standard\n      globalThreatPreventionPolicy: standard\n      manageProtectionActions: true\nvariables:\n  dataGlobalAssignment:\n    fn::invoke:\n      function: checkpoint:getManagementGlobalAssignment\n      arguments:\n        dependentDomain: ${globalAssignment.dependentDomain}\n        globalDomain: ${globalAssignment.globalDomain}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGlobalAssignment.\n",
        "properties": {
          "dependentDomain": {
            "type": "string"
          },
          "globalDomain": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGlobalAssignment.\n",
        "properties": {
          "assignmentStatus": {
            "type": "string"
          },
          "assignmentUpToDate": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dependentDomain": {
            "type": "string"
          },
          "globalAccessPolicy": {
            "type": "string"
          },
          "globalDomain": {
            "type": "string"
          },
          "globalThreatPreventionPolicy": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "manageProtectionActions": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "assignmentStatus",
          "assignmentUpToDate",
          "color",
          "comments",
          "globalAccessPolicy",
          "globalThreatPreventionPolicy",
          "id",
          "manageProtectionActions",
          "name",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGlobalDomain:getManagementGlobalDomain": {
      "description": "Use this data source to get information on an existing Check Point Global Domain.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataGlobalDomain = checkpoint.getManagementGlobalDomain({\n    name: \"Global\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_global_domain = checkpoint.get_management_global_domain(name=\"Global\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataGlobalDomain = Checkpoint.GetManagementGlobalDomain.Invoke(new()\n    {\n        Name = \"Global\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementGlobalDomain(ctx, \u0026checkpoint.GetManagementGlobalDomainArgs{\n\t\t\tName: pulumi.StringRef(\"Global\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementGlobalDomainArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataGlobalDomain = CheckpointFunctions.getManagementGlobalDomain(GetManagementGlobalDomainArgs.builder()\n            .name(\"Global\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataGlobalDomain:\n    fn::invoke:\n      function: checkpoint:getManagementGlobalDomain\n      arguments:\n        name: Global\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGlobalDomain.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGlobalDomain.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "domainType": {
            "type": "string"
          },
          "globalDomainAssignments": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGlobalDomainGlobalDomainAssignment:getManagementGlobalDomainGlobalDomainAssignment"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "servers": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGlobalDomainServer:getManagementGlobalDomainServer"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementGlobalDomainTag:getManagementGlobalDomainTag"
            },
            "type": "array"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "domainType",
          "globalDomainAssignments",
          "id",
          "servers",
          "tags",
          "type"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementGsnHandoverGroup:getManagementGsnHandoverGroup": {
      "description": "This resource allows you to execute Check Point Gsn Handover Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst test = new checkpoint.ManagementGsnHandoverGroup(\"test\", {\n    name: \"gsn group\",\n    enforceGtp: true,\n    gtpRate: 2048,\n    members: [\"All_Internet\"],\n});\nconst dataTest = checkpoint.getManagementGsnHandoverGroupOutput({\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest = checkpoint.ManagementGsnHandoverGroup(\"test\",\n    name=\"gsn group\",\n    enforce_gtp=True,\n    gtp_rate=2048,\n    members=[\"All_Internet\"])\ndata_test = checkpoint.get_management_gsn_handover_group_output(name=test.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var test = new Checkpoint.ManagementGsnHandoverGroup(\"test\", new()\n    {\n        Name = \"gsn group\",\n        EnforceGtp = true,\n        GtpRate = 2048,\n        Members = new[]\n        {\n            \"All_Internet\",\n        },\n    });\n\n    var dataTest = Checkpoint.GetManagementGsnHandoverGroup.Invoke(new()\n    {\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttest, err := checkpoint.NewManagementGsnHandoverGroup(ctx, \"test\", \u0026checkpoint.ManagementGsnHandoverGroupArgs{\n\t\t\tName:       pulumi.String(\"gsn group\"),\n\t\t\tEnforceGtp: pulumi.Bool(true),\n\t\t\tGtpRate:    pulumi.Float64(2048),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"All_Internet\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementGsnHandoverGroupOutput(ctx, checkpoint.GetManagementGsnHandoverGroupOutputArgs{\n\t\t\tName: test.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementGsnHandoverGroup;\nimport com.pulumi.checkpoint.ManagementGsnHandoverGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementGsnHandoverGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var test = new ManagementGsnHandoverGroup(\"test\", ManagementGsnHandoverGroupArgs.builder()\n            .name(\"gsn group\")\n            .enforceGtp(true)\n            .gtpRate(2048.0)\n            .members(\"All_Internet\")\n            .build());\n\n        final var dataTest = CheckpointFunctions.getManagementGsnHandoverGroup(GetManagementGsnHandoverGroupArgs.builder()\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  test:\n    type: checkpoint:ManagementGsnHandoverGroup\n    properties:\n      name: gsn group\n      enforceGtp: true\n      gtpRate: 2048\n      members:\n        - All_Internet\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementGsnHandoverGroup\n      arguments:\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementGsnHandoverGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementGsnHandoverGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "enforceGtp": {
            "type": "boolean"
          },
          "gtpRate": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "enforceGtp",
          "gtpRate",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementHosts:getManagementHosts": {
      "description": "Use this data source to get information on hosts.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst myQuery = checkpoint.getManagementHosts({\n    limit: 15,\n});\n// Fetch all results\nconst myQueryFetchAll = checkpoint.getManagementHosts({\n    fetchAll: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmy_query = checkpoint.get_management_hosts(limit=15)\n# Fetch all results\nmy_query_fetch_all = checkpoint.get_management_hosts(fetch_all=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myQuery = Checkpoint.GetManagementHosts.Invoke(new()\n    {\n        Limit = 15,\n    });\n\n    // Fetch all results\n    var myQueryFetchAll = Checkpoint.GetManagementHosts.Invoke(new()\n    {\n        FetchAll = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementHosts(ctx, \u0026checkpoint.GetManagementHostsArgs{\n\t\t\tLimit: pulumi.Float64Ref(15),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Fetch all results\n\t\t_, err = checkpoint.GetManagementHosts(ctx, \u0026checkpoint.GetManagementHostsArgs{\n\t\t\tFetchAll: pulumi.BoolRef(true),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementHostsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var myQuery = CheckpointFunctions.getManagementHosts(GetManagementHostsArgs.builder()\n            .limit(15)\n            .build());\n\n        // Fetch all results\n        final var myQueryFetchAll = CheckpointFunctions.getManagementHosts(GetManagementHostsArgs.builder()\n            .fetchAll(true)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  myQuery:\n    fn::invoke:\n      function: checkpoint:getManagementHosts\n      arguments:\n        limit: 15\n  # Fetch all results\n  myQueryFetchAll:\n    fn::invoke:\n      function: checkpoint:getManagementHosts\n      arguments:\n        fetchAll: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementHosts.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean",
            "description": "If true, fetches all results.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter objects by.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHostsOrder:getManagementHostsOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementHosts.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHostsObject:getManagementHostsObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHostsOrder:getManagementHostsOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementHttpsAdvancedSettings:getManagementHttpsAdvancedSettings": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementHttpsAdvancedSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementHttpsAdvancedSettings.\n",
        "properties": {
          "blockedCertificateTracking": {
            "type": "string"
          },
          "blockedCertificates": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHttpsAdvancedSettingsBlockedCertificate:getManagementHttpsAdvancedSettingsBlockedCertificate"
            },
            "type": "array"
          },
          "bypassOnClientFailure": {
            "type": "boolean"
          },
          "bypassOnFailure": {
            "type": "boolean"
          },
          "bypassUnderLoad": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "bypassUpdateServices": {
            "type": "boolean"
          },
          "certificatePinnedAppsAction": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "logSessions": {
            "type": "boolean"
          },
          "retrieveIntermediateCaCertificates": {
            "type": "boolean"
          },
          "serverCertificateValidationActions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHttpsAdvancedSettingsServerCertificateValidationAction:getManagementHttpsAdvancedSettingsServerCertificateValidationAction"
            },
            "type": "array"
          },
          "siteCategorizationAllowMode": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "blockedCertificateTracking",
          "blockedCertificates",
          "bypassOnClientFailure",
          "bypassOnFailure",
          "bypassUnderLoad",
          "bypassUpdateServices",
          "certificatePinnedAppsAction",
          "id",
          "logSessions",
          "retrieveIntermediateCaCertificates",
          "serverCertificateValidationActions",
          "siteCategorizationAllowMode",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementHttpsRulebase:getManagementHttpsRulebase": {
      "description": "Use this data source to get information on an existing https RuleBase.\n\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementHttpsRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.\n"
          },
          "filterSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Enable enforce end user domain.\u003cspan pulumi-lang-nodejs=\" filterSettings \" pulumi-lang-dotnet=\" FilterSettings \" pulumi-lang-go=\" filterSettings \" pulumi-lang-python=\" filter_settings \" pulumi-lang-yaml=\" filterSettings \" pulumi-lang-java=\" filterSettings \"\u003e filter_settings \u003c/span\u003eblocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHttpsRulebaseOrder:getManagementHttpsRulebaseOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementHttpsRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "filterSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHttpsRulebaseOrder:getManagementHttpsRulebaseOrder"
            },
            "type": "array"
          },
          "package": {
            "type": "string"
          },
          "rulebases": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementHttpsRulebaseRulebase:getManagementHttpsRulebaseRulebase"
            },
            "type": "array"
          },
          "showMembership": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "name",
          "rulebases"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIdentityProvider:getManagementIdentityProvider": {
      "description": "Use this data source to get information on an existing Identity Provider.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementIdentityProvider(\"example\", {\n    name: \"%s\",\n    usage: \"managing_administrator_access\",\n    dataReceiving: \"manually\",\n    receivedIdentifier: \"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\",\n    loginUrl: \"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\",\n    base64Certificate: \"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM4RENDQWRpZ0F3SUJBZ0lRUTBWZVpLdVBLb0pQUWhaNGhDaWRzREFOQmdrcWhraUc5dzBCQVFzRkFEQTBNVEl3TUFZRFZRUURFeWxOYVdOeWIzTnZablFnUVhwMWNtVWdSbVZrWlhKaGRHVmtJRk5UVHlCRFpYSjBhV1pwWTJGMFpUQWVGdzB4T0RBME1UVXhNVEl6TXpOYUZ3MHlNVEEwTVRVeE1USXpNek5hTURReE1qQXdCZ05WQkFNVEtVMXBZM0p2YzI5bWRDQkJlblZ5WlNCR1pXUmxjbUYwWldRZ1UxTlBJRU5sY25ScFptbGpZWFJsTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUE0VXVqYUd0OFhaODl2dXZ5a3lRVzVYb24vOFIvaVB0ejRhYjBNM3RNVXZHWHozVXh0V1pTRStUR1hydjN3VHRLMCs4RmtNeXVKYUhGSXBLLzRVREZpRk1yQmxzR0Z1dmtTc1p5VjIzZlNGN3paaXlUWTZUN0EwcCtnczUwNVhEOUdBYjlWYmR3R0cwK0tDVnlpc1ZRZ1YySXdKZ2l5aHF3RUNvY3dCcmFuN251SytURU5EMmwyZjlZcng1b1JNRU56NzB3bHlIMzZPWkJtdDBrNTk4L1doMEhEWUxaZW8wZHlTV3JOd3dlWXZTeEU4L01kbTQzWEV1U3pialR6ZnNNMHZVUndGQlNyVUxFYURPMS9JUDJVcjdCc2dId1JJL3hmb3FJbUsxS2twVXEwQWxjVEFpM3YxdTl6Qy9xTGdQd0F5UUl2dzlVQ3NpcnJQQTBZMFlPaFFJREFRQUJNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUURjam9qZEd6L0FJQ2pqTTBaN21ZbGdQNXpic2FRNWRDMmNqZjRESnFta21zV3VmUnBDNHNic3VoODcwY0NCS2N1dmgrb0dpekJRSHJQbTRUaEl2ZklsS0w4WGpMQVhiRnVSUG9IQWcwOHNMWGR2UFRCVE52REYxTWhvcU5zMmo2ZUZxL2ROdXF2ZUJIcjVENXRLblYyWEJHRUhFOVJFOVdUa1pRT2MwaEhtQ3dNbWNZb3JYRzhCa3l1OXFwNXhyMDZMQ0htMnJLcnI2ZENRVldBV0R0MzhiS2t5STRobTVSNTVCclR5UldSdzI1RS9YaFEwVksva1FJYW9GZ0hvaWo0ekg5bmxlZnZMbmhaZDVPRzROL29OS2pBKy9LbkVqaTdPQXhKWVNaR1FmRjU0R1AwQTE4VnF1NVVGaFBKMUZFQXZ5YjR0QnZtTzM1NFFVUys5UTY2agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t\",\n});\nconst dataIdentityProvider = checkpoint.getManagementIdentityProviderOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementIdentityProvider(\"example\",\n    name=\"%s\",\n    usage=\"managing_administrator_access\",\n    data_receiving=\"manually\",\n    received_identifier=\"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\",\n    login_url=\"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\",\n    base64_certificate=\"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\")\ndata_identity_provider = checkpoint.get_management_identity_provider_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementIdentityProvider(\"example\", new()\n    {\n        Name = \"%s\",\n        Usage = \"managing_administrator_access\",\n        DataReceiving = \"manually\",\n        ReceivedIdentifier = \"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\",\n        LoginUrl = \"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\",\n        Base64Certificate = \"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\",\n    });\n\n    var dataIdentityProvider = Checkpoint.GetManagementIdentityProvider.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementIdentityProvider(ctx, \"example\", \u0026checkpoint.ManagementIdentityProviderArgs{\n\t\t\tName:               pulumi.String(\"%s\"),\n\t\t\tUsage:              pulumi.String(\"managing_administrator_access\"),\n\t\t\tDataReceiving:      pulumi.String(\"manually\"),\n\t\t\tReceivedIdentifier: pulumi.String(\"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\"),\n\t\t\tLoginUrl:           pulumi.String(\"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\"),\n\t\t\tBase64Certificate:  pulumi.String(\"LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUM4RENDQWRpZ0F3SUJBZ0lRUTBWZVpLdVBLb0pQUWhaNGhDaWRzREFOQmdrcWhraUc5dzBCQVFzRkFEQTBNVEl3TUFZRFZRUURFeWxOYVdOeWIzTnZablFnUVhwMWNtVWdSbVZrWlhKaGRHVmtJRk5UVHlCRFpYSjBhV1pwWTJGMFpUQWVGdzB4T0RBME1UVXhNVEl6TXpOYUZ3MHlNVEEwTVRVeE1USXpNek5hTURReE1qQXdCZ05WQkFNVEtVMXBZM0p2YzI5bWRDQkJlblZ5WlNCR1pXUmxjbUYwWldRZ1UxTlBJRU5sY25ScFptbGpZWFJsTUlJQklqQU5CZ2txaGtpRzl3MEJBUUVGQUFPQ0FROEFNSUlCQ2dLQ0FRRUE0VXVqYUd0OFhaODl2dXZ5a3lRVzVYb24vOFIvaVB0ejRhYjBNM3RNVXZHWHozVXh0V1pTRStUR1hydjN3VHRLMCs4RmtNeXVKYUhGSXBLLzRVREZpRk1yQmxzR0Z1dmtTc1p5VjIzZlNGN3paaXlUWTZUN0EwcCtnczUwNVhEOUdBYjlWYmR3R0cwK0tDVnlpc1ZRZ1YySXdKZ2l5aHF3RUNvY3dCcmFuN251SytURU5EMmwyZjlZcng1b1JNRU56NzB3bHlIMzZPWkJtdDBrNTk4L1doMEhEWUxaZW8wZHlTV3JOd3dlWXZTeEU4L01kbTQzWEV1U3pialR6ZnNNMHZVUndGQlNyVUxFYURPMS9JUDJVcjdCc2dId1JJL3hmb3FJbUsxS2twVXEwQWxjVEFpM3YxdTl6Qy9xTGdQd0F5UUl2dzlVQ3NpcnJQQTBZMFlPaFFJREFRQUJNQTBHQ1NxR1NJYjNEUUVCQ3dVQUE0SUJBUURjam9qZEd6L0FJQ2pqTTBaN21ZbGdQNXpic2FRNWRDMmNqZjRESnFta21zV3VmUnBDNHNic3VoODcwY0NCS2N1dmgrb0dpekJRSHJQbTRUaEl2ZklsS0w4WGpMQVhiRnVSUG9IQWcwOHNMWGR2UFRCVE52REYxTWhvcU5zMmo2ZUZxL2ROdXF2ZUJIcjVENXRLblYyWEJHRUhFOVJFOVdUa1pRT2MwaEhtQ3dNbWNZb3JYRzhCa3l1OXFwNXhyMDZMQ0htMnJLcnI2ZENRVldBV0R0MzhiS2t5STRobTVSNTVCclR5UldSdzI1RS9YaFEwVksva1FJYW9GZ0hvaWo0ekg5bmxlZnZMbmhaZDVPRzROL29OS2pBKy9LbkVqaTdPQXhKWVNaR1FmRjU0R1AwQTE4VnF1NVVGaFBKMUZFQXZ5YjR0QnZtTzM1NFFVUys5UTY2agotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0t\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementIdentityProviderOutput(ctx, checkpoint.GetManagementIdentityProviderOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIdentityProvider;\nimport com.pulumi.checkpoint.ManagementIdentityProviderArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIdentityProviderArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementIdentityProvider(\"example\", ManagementIdentityProviderArgs.builder()\n            .name(\"%s\")\n            .usage(\"managing_administrator_access\")\n            .dataReceiving(\"manually\")\n            .receivedIdentifier(\"https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\")\n            .loginUrl(\"https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\")\n            .base64Certificate(\"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\")\n            .build());\n\n        final var dataIdentityProvider = CheckpointFunctions.getManagementIdentityProvider(GetManagementIdentityProviderArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementIdentityProvider\n    properties:\n      name: '%s'\n      usage: managing_administrator_access\n      dataReceiving: manually\n      receivedIdentifier: https://sts.checkpoint.net/621ac12d-4afb-479c-9c14-13e7b743cd07/\n      loginUrl: https://login.checkpointonline.com/621ac12d-4afb-479c-9c14-13e7b743cd07/saml2\n      base64Certificate: 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\nvariables:\n  dataIdentityProvider:\n    fn::invoke:\n      function: checkpoint:getManagementIdentityProvider\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIdentityProvider.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIdentityProvider.\n",
        "properties": {
          "base64Certificate": {
            "type": "string"
          },
          "base64MetadataFile": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataReceiving": {
            "type": "string"
          },
          "gateway": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "loginUrl": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "receivedIdentifier": {
            "type": "string"
          },
          "replyUrls": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "requiredIdentifier": {
            "type": "string"
          },
          "service": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "usage": {
            "type": "string"
          }
        },
        "required": [
          "base64Certificate",
          "base64MetadataFile",
          "color",
          "comments",
          "dataReceiving",
          "gateway",
          "id",
          "loginUrl",
          "receivedIdentifier",
          "replyUrls",
          "requiredIdentifier",
          "service",
          "tags",
          "usage"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIdentityTag:getManagementIdentityTag": {
      "description": "This resource allows you to execute Check Point Identity Tag.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst test = new checkpoint.ManagementIdentityTag(\"test\", {\n    name: \"my identity tag\",\n    externalIdentifier: \"cisco ise security group\",\n});\nconst dataTest = checkpoint.getManagementIdentityTagOutput({\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest = checkpoint.ManagementIdentityTag(\"test\",\n    name=\"my identity tag\",\n    external_identifier=\"cisco ise security group\")\ndata_test = checkpoint.get_management_identity_tag_output(name=test.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var test = new Checkpoint.ManagementIdentityTag(\"test\", new()\n    {\n        Name = \"my identity tag\",\n        ExternalIdentifier = \"cisco ise security group\",\n    });\n\n    var dataTest = Checkpoint.GetManagementIdentityTag.Invoke(new()\n    {\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttest, err := checkpoint.NewManagementIdentityTag(ctx, \"test\", \u0026checkpoint.ManagementIdentityTagArgs{\n\t\t\tName:               pulumi.String(\"my identity tag\"),\n\t\t\tExternalIdentifier: pulumi.String(\"cisco ise security group\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementIdentityTagOutput(ctx, checkpoint.GetManagementIdentityTagOutputArgs{\n\t\t\tName: test.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIdentityTag;\nimport com.pulumi.checkpoint.ManagementIdentityTagArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIdentityTagArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var test = new ManagementIdentityTag(\"test\", ManagementIdentityTagArgs.builder()\n            .name(\"my identity tag\")\n            .externalIdentifier(\"cisco ise security group\")\n            .build());\n\n        final var dataTest = CheckpointFunctions.getManagementIdentityTag(GetManagementIdentityTagArgs.builder()\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  test:\n    type: checkpoint:ManagementIdentityTag\n    properties:\n      name: my identity tag\n      externalIdentifier: cisco ise security group\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementIdentityTag\n      arguments:\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIdentityTag.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIdentityTag.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "externalIdentifier": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "externalIdentifier",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIdpAdministratorGroup:getManagementIdpAdministratorGroup": {
      "description": "Use this data source to get information on an existing Check Point Idp Administrator Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementIdpAdministratorGroup(\"example\", {\n    name: \"my super group\",\n    groupId: \"it-team\",\n    multiDomainProfile: \"domain super user\",\n});\nconst dataIdpAdministratorGroup = checkpoint.getManagementIdpAdministratorGroupOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementIdpAdministratorGroup(\"example\",\n    name=\"my super group\",\n    group_id=\"it-team\",\n    multi_domain_profile=\"domain super user\")\ndata_idp_administrator_group = checkpoint.get_management_idp_administrator_group_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementIdpAdministratorGroup(\"example\", new()\n    {\n        Name = \"my super group\",\n        GroupId = \"it-team\",\n        MultiDomainProfile = \"domain super user\",\n    });\n\n    var dataIdpAdministratorGroup = Checkpoint.GetManagementIdpAdministratorGroup.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementIdpAdministratorGroup(ctx, \"example\", \u0026checkpoint.ManagementIdpAdministratorGroupArgs{\n\t\t\tName:               pulumi.String(\"my super group\"),\n\t\t\tGroupId:            pulumi.String(\"it-team\"),\n\t\t\tMultiDomainProfile: pulumi.String(\"domain super user\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementIdpAdministratorGroupOutput(ctx, checkpoint.GetManagementIdpAdministratorGroupOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIdpAdministratorGroup;\nimport com.pulumi.checkpoint.ManagementIdpAdministratorGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIdpAdministratorGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementIdpAdministratorGroup(\"example\", ManagementIdpAdministratorGroupArgs.builder()\n            .name(\"my super group\")\n            .groupId(\"it-team\")\n            .multiDomainProfile(\"domain super user\")\n            .build());\n\n        final var dataIdpAdministratorGroup = CheckpointFunctions.getManagementIdpAdministratorGroup(GetManagementIdpAdministratorGroupArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementIdpAdministratorGroup\n    properties:\n      name: my super group\n      groupId: it-team\n      multiDomainProfile: domain super user\nvariables:\n  dataIdpAdministratorGroup:\n    fn::invoke:\n      function: checkpoint:getManagementIdpAdministratorGroup\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIdpAdministratorGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIdpAdministratorGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groupId": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "multiDomainProfile": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "permissionsProfiles": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementIdpAdministratorGroupPermissionsProfile:getManagementIdpAdministratorGroupPermissionsProfile"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "groupId",
          "id",
          "multiDomainProfile",
          "permissionsProfiles",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIdpDefaultAssignment:getManagementIdpDefaultAssignment": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIdpDefaultAssignment.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIdpDefaultAssignment.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "identityProvider": {
            "type": "string"
          },
          "identityProviderSet": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "identityProvider",
          "identityProviderSet",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIdpToDomainAssignment:getManagementIdpToDomainAssignment": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIdpToDomainAssignment.\n",
        "properties": {
          "assignedDomain": {
            "type": "string",
            "description": "Represents the Domain assigned by 'idp-to-domain-assignment', need to be domain name or UID.\n"
          },
          "id": {
            "type": "string"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIdpToDomainAssignment.\n",
        "properties": {
          "assignedDomain": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "identityProvider": {
            "type": "string"
          },
          "identityProviderSet": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "usingDefault": {
            "type": "boolean"
          }
        },
        "required": [
          "id",
          "identityProvider",
          "identityProviderSet",
          "tags",
          "usingDefault"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIfMapServer:getManagementIfMapServer": {
      "description": "Use this data source to get information on an existing IF-MAP Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataIfMapServer = checkpoint.getManagementIfMapServer({\n    name: \"example_if_map_server\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_if_map_server = checkpoint.get_management_if_map_server(name=\"example_if_map_server\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataIfMapServer = Checkpoint.GetManagementIfMapServer.Invoke(new()\n    {\n        Name = \"example_if_map_server\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementIfMapServer(ctx, \u0026checkpoint.LookupManagementIfMapServerArgs{\n\t\t\tName: pulumi.StringRef(\"example_if_map_server\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIfMapServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataIfMapServer = CheckpointFunctions.getManagementIfMapServer(GetManagementIfMapServerArgs.builder()\n            .name(\"example_if_map_server\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataIfMapServer:\n    fn::invoke:\n      function: checkpoint:getManagementIfMapServer\n      arguments:\n        name: example_if_map_server\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIfMapServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIfMapServer.\n",
        "properties": {
          "authentications": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementIfMapServerAuthentication:getManagementIfMapServerAuthentication"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "host": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "monitoredIps": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementIfMapServerMonitoredIp:getManagementIfMapServerMonitoredIp"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "path": {
            "type": "string"
          },
          "port": {
            "type": "number"
          },
          "queryWholeRanges": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "authentications",
          "color",
          "comments",
          "host",
          "id",
          "monitoredIps",
          "path",
          "port",
          "queryWholeRanges",
          "tags",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementInfinityIdp:getManagementInfinityIdp": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementInfinityIdp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementInfinityIdp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "idpDomains": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "idpId": {
            "type": "string"
          },
          "idpName": {
            "type": "string"
          },
          "idpType": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "idpDomains",
          "idpId",
          "idpName",
          "idpType",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementInfinityIdpObject:getManagementInfinityIdpObject": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementInfinityIdpObject.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementInfinityIdpObject.\n",
        "properties": {
          "description": {
            "type": "string"
          },
          "displayName": {
            "type": "string"
          },
          "extId": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "idpDisplayName": {
            "type": "string"
          },
          "idpId": {
            "type": "string"
          },
          "idpName": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "objectType": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "description",
          "displayName",
          "extId",
          "id",
          "idpDisplayName",
          "idpId",
          "idpName",
          "objectType",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementInterface:getManagementInterface": {
      "description": "Use this data source to get information on an existing Check Point Interface.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementInterface(\"example\", {\n    name: \"eth0\",\n    ipv4Address: \"1.1.1.111\",\n    ipv4MaskLength: 24,\n    gatewayUid: \"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\",\n    topology: \"internal\",\n    clusterNetworkType: \"cluster\",\n    antiSpoofing: true,\n    ignoreWarnings: false,\n});\nconst data = checkpoint.getManagementInterfaceOutput({\n    name: example.name,\n    gatewayUid: example.gatewayUid,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementInterface(\"example\",\n    name=\"eth0\",\n    ipv4_address=\"1.1.1.111\",\n    ipv4_mask_length=24,\n    gateway_uid=\"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\",\n    topology=\"internal\",\n    cluster_network_type=\"cluster\",\n    anti_spoofing=True,\n    ignore_warnings=False)\ndata = checkpoint.get_management_interface_output(name=example.name,\n    gateway_uid=example.gateway_uid)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementInterface(\"example\", new()\n    {\n        Name = \"eth0\",\n        Ipv4Address = \"1.1.1.111\",\n        Ipv4MaskLength = 24,\n        GatewayUid = \"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\",\n        Topology = \"internal\",\n        ClusterNetworkType = \"cluster\",\n        AntiSpoofing = true,\n        IgnoreWarnings = false,\n    });\n\n    var data = Checkpoint.GetManagementInterface.Invoke(new()\n    {\n        Name = example.Name,\n        GatewayUid = example.GatewayUid,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementInterface(ctx, \"example\", \u0026checkpoint.ManagementInterfaceArgs{\n\t\t\tName:               pulumi.String(\"eth0\"),\n\t\t\tIpv4Address:        pulumi.String(\"1.1.1.111\"),\n\t\t\tIpv4MaskLength:     pulumi.Float64(24),\n\t\t\tGatewayUid:         pulumi.String(\"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\"),\n\t\t\tTopology:           pulumi.String(\"internal\"),\n\t\t\tClusterNetworkType: pulumi.String(\"cluster\"),\n\t\t\tAntiSpoofing:       pulumi.Bool(true),\n\t\t\tIgnoreWarnings:     pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementInterfaceOutput(ctx, checkpoint.GetManagementInterfaceOutputArgs{\n\t\t\tName:       example.Name,\n\t\t\tGatewayUid: example.GatewayUid,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementInterface;\nimport com.pulumi.checkpoint.ManagementInterfaceArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementInterfaceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementInterface(\"example\", ManagementInterfaceArgs.builder()\n            .name(\"eth0\")\n            .ipv4Address(\"1.1.1.111\")\n            .ipv4MaskLength(24.0)\n            .gatewayUid(\"20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\")\n            .topology(\"internal\")\n            .clusterNetworkType(\"cluster\")\n            .antiSpoofing(true)\n            .ignoreWarnings(false)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementInterface(GetManagementInterfaceArgs.builder()\n            .name(example.name())\n            .gatewayUid(example.gatewayUid())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementInterface\n    properties:\n      name: eth0\n      ipv4Address: 1.1.1.111\n      ipv4MaskLength: 24\n      gatewayUid: 20ec49e8-8cd8-4ad4-b204-0de8ae4e0e17\n      topology: internal\n      clusterNetworkType: cluster\n      antiSpoofing: true\n      ignoreWarnings: false\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementInterface\n      arguments:\n        name: ${example.name}\n        gatewayUid: ${example.gatewayUid}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementInterface.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "gatewayUid": {
            "type": "string",
            "description": "Gateway or cluster object uid that the interface belongs to. \u003cfont color=\"red\"\u003eRequired only if\u003c/font\u003e name was specified.\n"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementInterface.\n",
        "properties": {
          "antiSpoofing": {
            "type": "boolean"
          },
          "antiSpoofingSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInterfaceAntiSpoofingSetting:getManagementInterfaceAntiSpoofingSetting"
            },
            "type": "array"
          },
          "clusterMembers": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInterfaceClusterMember:getManagementInterfaceClusterMember"
            },
            "type": "array"
          },
          "clusterNetworkType": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dynamicIp": {
            "type": "boolean"
          },
          "gatewayUid": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv4MaskLength": {
            "type": "number"
          },
          "ipv4NetworkMask": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "ipv6MaskLength": {
            "type": "number"
          },
          "ipv6NetworkMask": {
            "type": "string"
          },
          "monitoredByCluster": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "networkInterfaceType": {
            "type": "string"
          },
          "securityZoneSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInterfaceSecurityZoneSetting:getManagementInterfaceSecurityZoneSetting"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "topology": {
            "type": "string"
          },
          "topologyAutomatic": {
            "type": "string"
          },
          "topologyManual": {
            "type": "string"
          },
          "topologySettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInterfaceTopologySetting:getManagementInterfaceTopologySetting"
            },
            "type": "array"
          },
          "topologySettingsAutomatics": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInterfaceTopologySettingsAutomatic:getManagementInterfaceTopologySettingsAutomatic"
            },
            "type": "array"
          },
          "topologySettingsManuals": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInterfaceTopologySettingsManual:getManagementInterfaceTopologySettingsManual"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "antiSpoofing",
          "antiSpoofingSettings",
          "clusterMembers",
          "clusterNetworkType",
          "dynamicIp",
          "id",
          "ipv4Address",
          "ipv4MaskLength",
          "ipv4NetworkMask",
          "ipv6Address",
          "ipv6MaskLength",
          "ipv6NetworkMask",
          "monitoredByCluster",
          "networkInterfaceType",
          "securityZoneSettings",
          "tags",
          "topology",
          "topologyAutomatic",
          "topologyManual",
          "topologySettings",
          "topologySettingsAutomatics",
          "topologySettingsManuals"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementInternalTrustedCa:getManagementInternalTrustedCa": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementInternalTrustedCa.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementInternalTrustedCa.\n",
        "properties": {
          "allowCertificatesFromBranches": {
            "type": "boolean"
          },
          "base64Certificate": {
            "type": "string"
          },
          "branches": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "cacheCrl": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "crlCacheMethod": {
            "type": "string"
          },
          "crlCacheTimeout": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "retrieveCrlFromHttpServers": {
            "type": "boolean"
          },
          "retrieveCrlFromLdapServers": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowCertificatesFromBranches",
          "base64Certificate",
          "branches",
          "cacheCrl",
          "color",
          "comments",
          "crlCacheMethod",
          "crlCacheTimeout",
          "id",
          "name",
          "retrieveCrlFromHttpServers",
          "retrieveCrlFromLdapServers",
          "tags",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementInteroperableDevice:getManagementInteroperableDevice": {
      "description": "Use this data source to get information on an existing Check Point Interoperable Device.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementInteroperableDevice(\"example\", {\n    name: \"NewInteroperableDevice\",\n    ipv4Address: \"192.168.1.6\",\n});\nconst dataInteroperableDevice = checkpoint.getManagementInteroperableDeviceOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementInteroperableDevice(\"example\",\n    name=\"NewInteroperableDevice\",\n    ipv4_address=\"192.168.1.6\")\ndata_interoperable_device = checkpoint.get_management_interoperable_device_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementInteroperableDevice(\"example\", new()\n    {\n        Name = \"NewInteroperableDevice\",\n        Ipv4Address = \"192.168.1.6\",\n    });\n\n    var dataInteroperableDevice = Checkpoint.GetManagementInteroperableDevice.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementInteroperableDevice(ctx, \"example\", \u0026checkpoint.ManagementInteroperableDeviceArgs{\n\t\t\tName:        pulumi.String(\"NewInteroperableDevice\"),\n\t\t\tIpv4Address: pulumi.String(\"192.168.1.6\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementInteroperableDeviceOutput(ctx, checkpoint.GetManagementInteroperableDeviceOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementInteroperableDevice;\nimport com.pulumi.checkpoint.ManagementInteroperableDeviceArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementInteroperableDeviceArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementInteroperableDevice(\"example\", ManagementInteroperableDeviceArgs.builder()\n            .name(\"NewInteroperableDevice\")\n            .ipv4Address(\"192.168.1.6\")\n            .build());\n\n        final var dataInteroperableDevice = CheckpointFunctions.getManagementInteroperableDevice(GetManagementInteroperableDeviceArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementInteroperableDevice\n    properties:\n      name: NewInteroperableDevice\n      ipv4Address: 192.168.1.6\nvariables:\n  dataInteroperableDevice:\n    fn::invoke:\n      function: checkpoint:getManagementInteroperableDevice\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementInteroperableDevice.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementInteroperableDevice.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "domainsToProcesses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "groups": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInteroperableDeviceGroup:getManagementInteroperableDeviceGroup"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementInteroperableDeviceInterface:getManagementInteroperableDeviceInterface"
            },
            "type": "array"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "vpnSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          }
        },
        "required": [
          "color",
          "comments",
          "domainsToProcesses",
          "groups",
          "id",
          "interfaces",
          "ipv4Address",
          "ipv6Address",
          "tags",
          "vpnSettings"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIpsProtectionExtendedAttribute:getManagementIpsProtectionExtendedAttribute": {
      "description": "Use this data source to get information on an existing Check Point Ips Protection Extended Attribute.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataIpsProtectionExtendedAttribute = checkpoint.getManagementIpsProtectionExtendedAttribute({\n    name: \"File Type\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_ips_protection_extended_attribute = checkpoint.get_management_ips_protection_extended_attribute(name=\"File Type\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataIpsProtectionExtendedAttribute = Checkpoint.GetManagementIpsProtectionExtendedAttribute.Invoke(new()\n    {\n        Name = \"File Type\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementIpsProtectionExtendedAttribute(ctx, \u0026checkpoint.GetManagementIpsProtectionExtendedAttributeArgs{\n\t\t\tName: pulumi.StringRef(\"File Type\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIpsProtectionExtendedAttributeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataIpsProtectionExtendedAttribute = CheckpointFunctions.getManagementIpsProtectionExtendedAttribute(GetManagementIpsProtectionExtendedAttributeArgs.builder()\n            .name(\"File Type\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataIpsProtectionExtendedAttribute:\n    fn::invoke:\n      function: checkpoint:getManagementIpsProtectionExtendedAttribute\n      arguments:\n        name: File Type\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIpsProtectionExtendedAttribute.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIpsProtectionExtendedAttribute.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "values": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementIpsProtectionExtendedAttributeValue:getManagementIpsProtectionExtendedAttributeValue"
            },
            "type": "array"
          }
        },
        "required": [
          "id",
          "values"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIpsUpdateSchedule:getManagementIpsUpdateSchedule": {
      "description": "Use this data source to get information on an existing Check Point Ips Update Schedule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataIpsUpdateSchedule = checkpoint.getManagementIpsUpdateSchedule({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_ips_update_schedule = checkpoint.get_management_ips_update_schedule()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataIpsUpdateSchedule = Checkpoint.GetManagementIpsUpdateSchedule.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementIpsUpdateSchedule(ctx, \u0026checkpoint.GetManagementIpsUpdateScheduleArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIpsUpdateScheduleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataIpsUpdateSchedule = CheckpointFunctions.getManagementIpsUpdateSchedule(GetManagementIpsUpdateScheduleArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataIpsUpdateSchedule:\n    fn::invoke:\n      function: checkpoint:getManagementIpsUpdateSchedule\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIpsUpdateSchedule.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIpsUpdateSchedule.\n",
        "properties": {
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "recurrences": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementIpsUpdateScheduleRecurrence:getManagementIpsUpdateScheduleRecurrence"
            },
            "type": "array"
          },
          "time": {
            "type": "string"
          }
        },
        "required": [
          "enabled",
          "id",
          "recurrences",
          "time"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementIseDataCenterServer:getManagementIseDataCenterServer": {
      "description": "Use this data source to get information on an existing Cisco ISE Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testIse = new checkpoint.ManagementIseDataCenterServer(\"testIse\", {\n    name: \"MyIse\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostnames: [\n        \"host1\",\n        \"host2\",\n    ],\n});\nconst dataIseDataCenterServer = checkpoint.getManagementIseDataCenterServerOutput({\n    name: testIse.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_ise = checkpoint.ManagementIseDataCenterServer(\"testIse\",\n    name=\"MyIse\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostnames=[\n        \"host1\",\n        \"host2\",\n    ])\ndata_ise_data_center_server = checkpoint.get_management_ise_data_center_server_output(name=test_ise.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testIse = new Checkpoint.ManagementIseDataCenterServer(\"testIse\", new()\n    {\n        Name = \"MyIse\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostnames = new[]\n        {\n            \"host1\",\n            \"host2\",\n        },\n    });\n\n    var dataIseDataCenterServer = Checkpoint.GetManagementIseDataCenterServer.Invoke(new()\n    {\n        Name = testIse.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestIse, err := checkpoint.NewManagementIseDataCenterServer(ctx, \"testIse\", \u0026checkpoint.ManagementIseDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyIse\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tHostnames: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"host1\"),\n\t\t\t\tpulumi.String(\"host2\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementIseDataCenterServerOutput(ctx, checkpoint.GetManagementIseDataCenterServerOutputArgs{\n\t\t\tName: testIse.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementIseDataCenterServer;\nimport com.pulumi.checkpoint.ManagementIseDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementIseDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testIse = new ManagementIseDataCenterServer(\"testIse\", ManagementIseDataCenterServerArgs.builder()\n            .name(\"MyIse\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostnames(            \n                \"host1\",\n                \"host2\")\n            .build());\n\n        final var dataIseDataCenterServer = CheckpointFunctions.getManagementIseDataCenterServer(GetManagementIseDataCenterServerArgs.builder()\n            .name(testIse.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testIse:\n    type: checkpoint:ManagementIseDataCenterServer\n    properties:\n      name: MyIse\n      username: USERNAME\n      password: PASSWORD\n      hostnames:\n        - host1\n        - host2\nvariables:\n  dataIseDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementIseDataCenterServer\n      arguments:\n        name: ${testIse.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementIseDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementIseDataCenterServer.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "hostnames": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "unsafeAutoAccept": {
            "type": "boolean"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "certificateFingerprint",
          "color",
          "comments",
          "hostnames",
          "id",
          "tags",
          "unsafeAutoAccept",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementKubernetesDataCenterServer:getManagementKubernetesDataCenterServer": {
      "description": "Use this data source to get information on an existing Kubernetes Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testKubernetes = new checkpoint.ManagementKubernetesDataCenterServer(\"testKubernetes\", {\n    name: \"MyKubernetes\",\n    hostname: \"MY_HOSTNAME\",\n    tokenFile: \"MY_TOKEN\",\n});\nconst dataKubernetesDataCenterServer = checkpoint.getManagementKubernetesDataCenterServerOutput({\n    name: testKubernetes.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_kubernetes = checkpoint.ManagementKubernetesDataCenterServer(\"testKubernetes\",\n    name=\"MyKubernetes\",\n    hostname=\"MY_HOSTNAME\",\n    token_file=\"MY_TOKEN\")\ndata_kubernetes_data_center_server = checkpoint.get_management_kubernetes_data_center_server_output(name=test_kubernetes.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testKubernetes = new Checkpoint.ManagementKubernetesDataCenterServer(\"testKubernetes\", new()\n    {\n        Name = \"MyKubernetes\",\n        Hostname = \"MY_HOSTNAME\",\n        TokenFile = \"MY_TOKEN\",\n    });\n\n    var dataKubernetesDataCenterServer = Checkpoint.GetManagementKubernetesDataCenterServer.Invoke(new()\n    {\n        Name = testKubernetes.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestKubernetes, err := checkpoint.NewManagementKubernetesDataCenterServer(ctx, \"testKubernetes\", \u0026checkpoint.ManagementKubernetesDataCenterServerArgs{\n\t\t\tName:      pulumi.String(\"MyKubernetes\"),\n\t\t\tHostname:  pulumi.String(\"MY_HOSTNAME\"),\n\t\t\tTokenFile: pulumi.String(\"MY_TOKEN\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementKubernetesDataCenterServerOutput(ctx, checkpoint.GetManagementKubernetesDataCenterServerOutputArgs{\n\t\t\tName: testKubernetes.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementKubernetesDataCenterServer;\nimport com.pulumi.checkpoint.ManagementKubernetesDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementKubernetesDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testKubernetes = new ManagementKubernetesDataCenterServer(\"testKubernetes\", ManagementKubernetesDataCenterServerArgs.builder()\n            .name(\"MyKubernetes\")\n            .hostname(\"MY_HOSTNAME\")\n            .tokenFile(\"MY_TOKEN\")\n            .build());\n\n        final var dataKubernetesDataCenterServer = CheckpointFunctions.getManagementKubernetesDataCenterServer(GetManagementKubernetesDataCenterServerArgs.builder()\n            .name(testKubernetes.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testKubernetes:\n    type: checkpoint:ManagementKubernetesDataCenterServer\n    properties:\n      name: MyKubernetes\n      hostname: MY_HOSTNAME\n      tokenFile: MY_TOKEN\nvariables:\n  dataKubernetesDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementKubernetesDataCenterServer\n      arguments:\n        name: ${testKubernetes.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementKubernetesDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementKubernetesDataCenterServer.\n",
        "properties": {
          "caCertificate": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "hostname": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tokenFile": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "unsafeAutoAccept": {
            "type": "boolean"
          }
        },
        "required": [
          "caCertificate",
          "color",
          "comments",
          "hostname",
          "id",
          "tags",
          "tokenFile",
          "unsafeAutoAccept"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLdapGroup:getManagementLdapGroup": {
      "description": "Use this data source to get information on an existing LDAP Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataLdapGroup = checkpoint.getManagementLdapGroup({\n    name: \"ldap_group_example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_ldap_group = checkpoint.get_management_ldap_group(name=\"ldap_group_example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataLdapGroup = Checkpoint.GetManagementLdapGroup.Invoke(new()\n    {\n        Name = \"ldap_group_example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementLdapGroup(ctx, \u0026checkpoint.LookupManagementLdapGroupArgs{\n\t\t\tName: pulumi.StringRef(\"ldap_group_example\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLdapGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataLdapGroup = CheckpointFunctions.getManagementLdapGroup(GetManagementLdapGroupArgs.builder()\n            .name(\"ldap_group_example\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataLdapGroup:\n    fn::invoke:\n      function: checkpoint:getManagementLdapGroup\n      arguments:\n        name: ldap_group_example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLdapGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLdapGroup.\n",
        "properties": {
          "accountUnit": {
            "type": "string"
          },
          "accountUnitBranch": {
            "type": "string"
          },
          "applyFilterForDynamicGroup": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groupPrefix": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ldapFilter": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "scope": {
            "type": "string"
          },
          "subTreePrefix": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "accountUnit",
          "accountUnitBranch",
          "applyFilterForDynamicGroup",
          "color",
          "comments",
          "groupPrefix",
          "id",
          "ldapFilter",
          "scope",
          "subTreePrefix",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLimit:getManagementLimit": {
      "description": "Use this data source to get information on an existing Check Point Limit.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementLimit(\"example\", {\n    name: \"limit_obj\",\n    enableDownload: true,\n    downloadUnit: \"Gbps\",\n    downloadRate: 3,\n});\nconst data = checkpoint.getManagementLimitOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementLimit(\"example\",\n    name=\"limit_obj\",\n    enable_download=True,\n    download_unit=\"Gbps\",\n    download_rate=3)\ndata = checkpoint.get_management_limit_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementLimit(\"example\", new()\n    {\n        Name = \"limit_obj\",\n        EnableDownload = true,\n        DownloadUnit = \"Gbps\",\n        DownloadRate = 3,\n    });\n\n    var data = Checkpoint.GetManagementLimit.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementLimit(ctx, \"example\", \u0026checkpoint.ManagementLimitArgs{\n\t\t\tName:           pulumi.String(\"limit_obj\"),\n\t\t\tEnableDownload: pulumi.Bool(true),\n\t\t\tDownloadUnit:   pulumi.String(\"Gbps\"),\n\t\t\tDownloadRate:   pulumi.Float64(3),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementLimitOutput(ctx, checkpoint.GetManagementLimitOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLimit;\nimport com.pulumi.checkpoint.ManagementLimitArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLimitArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementLimit(\"example\", ManagementLimitArgs.builder()\n            .name(\"limit_obj\")\n            .enableDownload(true)\n            .downloadUnit(\"Gbps\")\n            .downloadRate(3.0)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementLimit(GetManagementLimitArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementLimit\n    properties:\n      name: limit_obj\n      enableDownload: true\n      downloadUnit: Gbps\n      downloadRate: 3\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementLimit\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLimit.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLimit.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "downloadRate": {
            "type": "number"
          },
          "downloadUnit": {
            "type": "string"
          },
          "enableDownload": {
            "type": "boolean"
          },
          "enableUpload": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "uploadRate": {
            "type": "number"
          },
          "uploadUnit": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "downloadRate",
          "downloadUnit",
          "enableDownload",
          "enableUpload",
          "id",
          "tags",
          "uploadRate",
          "uploadUnit"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLogExporter:getManagementLogExporter": {
      "description": "Use this data source to get information on an existing Log Exporter.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataLogExporter = checkpoint.getManagementLogExporter({\n    name: \"example_log_exporter\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_log_exporter = checkpoint.get_management_log_exporter(name=\"example_log_exporter\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataLogExporter = Checkpoint.GetManagementLogExporter.Invoke(new()\n    {\n        Name = \"example_log_exporter\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementLogExporter(ctx, \u0026checkpoint.LookupManagementLogExporterArgs{\n\t\t\tName: pulumi.StringRef(\"example_log_exporter\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLogExporterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataLogExporter = CheckpointFunctions.getManagementLogExporter(GetManagementLogExporterArgs.builder()\n            .name(\"example_log_exporter\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataLogExporter:\n    fn::invoke:\n      function: checkpoint:getManagementLogExporter\n      arguments:\n        name: example_log_exporter\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLogExporter.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLogExporter.\n",
        "properties": {
          "attachments": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLogExporterAttachment:getManagementLogExporterAttachment"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataManipulations": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLogExporterDataManipulation:getManagementLogExporterDataManipulation"
            },
            "type": "array"
          },
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "protocol": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "targetPort": {
            "type": "number"
          },
          "targetServer": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "attachments",
          "color",
          "comments",
          "dataManipulations",
          "enabled",
          "id",
          "protocol",
          "tags",
          "targetPort",
          "targetServer"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLogicalServer:getManagementLogicalServer": {
      "description": "Use this data source to get information on an existing Check Point Logical Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTest = checkpoint.getManagementLogicalServer({\n    name: \"logical_server1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_test = checkpoint.get_management_logical_server(name=\"logical_server1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTest = Checkpoint.GetManagementLogicalServer.Invoke(new()\n    {\n        Name = \"logical_server1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementLogicalServer(ctx, \u0026checkpoint.LookupManagementLogicalServerArgs{\n\t\t\tName: pulumi.StringRef(\"logical_server1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLogicalServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTest = CheckpointFunctions.getManagementLogicalServer(GetManagementLogicalServerArgs.builder()\n            .name(\"logical_server1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementLogicalServer\n      arguments:\n        name: logical_server1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLogicalServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLogicalServer.\n",
        "properties": {
          "balanceMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "persistenceMode": {
            "type": "boolean"
          },
          "persistencyType": {
            "type": "string"
          },
          "serverGroup": {
            "type": "string"
          },
          "serverType": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "balanceMethod",
          "color",
          "comments",
          "icon",
          "id",
          "ipv4Address",
          "ipv6Address",
          "persistenceMode",
          "persistencyType",
          "serverGroup",
          "serverType",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLoginMessage:getManagementLoginMessage": {
      "description": "Use this data source to get information on an existing Check Point Login Message.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataLoginMessage = checkpoint.getManagementLoginMessage({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_login_message = checkpoint.get_management_login_message()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataLoginMessage = Checkpoint.GetManagementLoginMessage.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementLoginMessage(ctx, \u0026checkpoint.GetManagementLoginMessageArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLoginMessageArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataLoginMessage = CheckpointFunctions.getManagementLoginMessage(GetManagementLoginMessageArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataLoginMessage:\n    fn::invoke:\n      function: checkpoint:getManagementLoginMessage\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLoginMessage.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLoginMessage.\n",
        "properties": {
          "header": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "message": {
            "type": "string"
          },
          "showMessage": {
            "type": "boolean"
          },
          "warning": {
            "type": "boolean"
          }
        },
        "required": [
          "header",
          "id",
          "message",
          "showMessage",
          "warning"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLoginRestrictions:getManagementLoginRestrictions": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLoginRestrictions.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLoginRestrictions.\n",
        "properties": {
          "displayAccessDeniedMessage": {
            "type": "boolean"
          },
          "failedAuthenticationAttempts": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "lockoutAdminAccount": {
            "type": "boolean"
          },
          "lockoutDuration": {
            "type": "number"
          },
          "uid": {
            "type": "string"
          },
          "unlockAdminAccount": {
            "type": "boolean"
          }
        },
        "required": [
          "displayAccessDeniedMessage",
          "failedAuthenticationAttempts",
          "id",
          "lockoutAdminAccount",
          "lockoutDuration",
          "uid",
          "unlockAdminAccount"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLsmCluster:getManagementLsmCluster": {
      "description": "Use this data source to get information on an existing Check Point Lsm Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataCluster = checkpoint.getManagementLsmCluster({\n    uid: cluster1.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_cluster = checkpoint.get_management_lsm_cluster(uid=cluster1[\"id\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataCluster = Checkpoint.GetManagementLsmCluster.Invoke(new()\n    {\n        Uid = cluster1.Id,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementLsmCluster(ctx, \u0026checkpoint.LookupManagementLsmClusterArgs{\n\t\t\tUid: pulumi.StringRef(cluster1.Id),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLsmClusterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataCluster = CheckpointFunctions.getManagementLsmCluster(GetManagementLsmClusterArgs.builder()\n            .uid(cluster1.id())\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataCluster:\n    fn::invoke:\n      function: checkpoint:getManagementLsmCluster\n      arguments:\n        uid: ${cluster1.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLsmCluster.\n",
        "properties": {
          "color": {
            "type": "string",
            "description": "Color of the object. Should be one of existing colors.\n"
          },
          "comments": {
            "type": "string",
            "description": "Comments string.\n"
          },
          "id": {
            "type": "string"
          },
          "ignoreErrors": {
            "type": "boolean"
          },
          "ignoreWarnings": {
            "type": "boolean"
          },
          "interfaces": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterInterface:getManagementLsmClusterInterface"
            },
            "description": "Interfaces.interfaces blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "tags": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Collection of tag identifiers.tags blocks are documented below.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLsmCluster.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dynamicObjects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterDynamicObject:getManagementLsmClusterDynamicObject"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ignoreErrors": {
            "type": "boolean"
          },
          "ignoreWarnings": {
            "type": "boolean"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterInterface:getManagementLsmClusterInterface"
            },
            "type": "array"
          },
          "mainIpAddress": {
            "type": "string"
          },
          "members": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterMember:getManagementLsmClusterMember"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "osName": {
            "type": "string"
          },
          "securityProfile": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "topologies": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterTopology:getManagementLsmClusterTopology"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "dynamicObjects",
          "id",
          "mainIpAddress",
          "members",
          "osName",
          "securityProfile",
          "topologies",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLsmClusterProfile:getManagementLsmClusterProfile": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLsmClusterProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "osName": {
            "type": "string"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLsmClusterProfile.\n",
        "properties": {
          "advancedSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileAdvancedSetting:getManagementLsmClusterProfileAdvancedSetting"
            },
            "type": "array"
          },
          "antiBot": {
            "type": "boolean"
          },
          "antiVirus": {
            "type": "boolean"
          },
          "applicationControl": {
            "type": "boolean"
          },
          "applicationControlAndUrlFilteringSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileApplicationControlAndUrlFilteringSetting:getManagementLsmClusterProfileApplicationControlAndUrlFilteringSetting"
            },
            "type": "array"
          },
          "clusterInterfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileClusterInterface:getManagementLsmClusterProfileClusterInterface"
            },
            "type": "array"
          },
          "clusterMembers": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileClusterMember:getManagementLsmClusterProfileClusterMember"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "contentAwareness": {
            "type": "boolean"
          },
          "dataLossPrevention": {
            "type": "boolean"
          },
          "dynamicIp": {
            "type": "boolean"
          },
          "enableHttpsInspection": {
            "type": "boolean"
          },
          "firewall": {
            "type": "boolean"
          },
          "groups": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileGroup:getManagementLsmClusterProfileGroup"
            },
            "type": "array"
          },
          "hitCount": {
            "type": "boolean"
          },
          "httpsInspections": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmClusterProfileHttpsInspection:getManagementLsmClusterProfileHttpsInspection"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "interfaces": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "ips": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "natHideInternalInterfaces": {
            "type": "boolean"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "osName": {
            "type": "string"
          },
          "proxySettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "qos": {
            "type": "boolean"
          },
          "saveLogsLocally": {
            "type": "boolean"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatEmulation": {
            "type": "boolean"
          },
          "threatExtraction": {
            "type": "boolean"
          },
          "threatPreventionMode": {
            "type": "string"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "urlFiltering": {
            "type": "boolean"
          },
          "version": {
            "type": "string"
          },
          "vpn": {
            "type": "boolean"
          },
          "zeroPhishing": {
            "type": "boolean"
          },
          "zeroPhishingFqdn": {
            "type": "string"
          }
        },
        "required": [
          "advancedSettings",
          "antiBot",
          "antiVirus",
          "applicationControl",
          "applicationControlAndUrlFilteringSettings",
          "clusterInterfaces",
          "clusterMembers",
          "color",
          "comments",
          "contentAwareness",
          "dataLossPrevention",
          "dynamicIp",
          "enableHttpsInspection",
          "firewall",
          "groups",
          "hitCount",
          "httpsInspections",
          "id",
          "interfaces",
          "ips",
          "natHideInternalInterfaces",
          "natSettings",
          "proxySettings",
          "qos",
          "saveLogsLocally",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "tags",
          "threatEmulation",
          "threatExtraction",
          "threatPreventionMode",
          "type",
          "urlFiltering",
          "version",
          "vpn",
          "zeroPhishing",
          "zeroPhishingFqdn"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLsmGateway:getManagementLsmGateway": {
      "description": "Use this data source to get information on an existing Check Point Lsm Gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataLsm = checkpoint.getManagementLsmGateway({\n    name: lsmGw.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_lsm = checkpoint.get_management_lsm_gateway(name=lsm_gw[\"name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataLsm = Checkpoint.GetManagementLsmGateway.Invoke(new()\n    {\n        Name = lsmGw.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementLsmGateway(ctx, \u0026checkpoint.LookupManagementLsmGatewayArgs{\n\t\t\tName: pulumi.StringRef(lsmGw.Name),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLsmGatewayArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataLsm = CheckpointFunctions.getManagementLsmGateway(GetManagementLsmGatewayArgs.builder()\n            .name(lsmGw.name())\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataLsm:\n    fn::invoke:\n      function: checkpoint:getManagementLsmGateway\n      arguments:\n        name: ${lsmGw.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLsmGateway.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLsmGateway.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "deviceId": {
            "type": "string"
          },
          "dynamicObjects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayDynamicObject:getManagementLsmGatewayDynamicObject"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ignoreErrors": {
            "type": "boolean"
          },
          "ignoreWarnings": {
            "type": "boolean"
          },
          "ipAddress": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "osName": {
            "type": "string"
          },
          "provisioningSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "provisioningState": {
            "type": "string"
          },
          "securityProfile": {
            "type": "string"
          },
          "sic": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "sicName": {
            "type": "string"
          },
          "sicState": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "topologies": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayTopology:getManagementLsmGatewayTopology"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "deviceId",
          "dynamicObjects",
          "id",
          "ignoreErrors",
          "ignoreWarnings",
          "ipAddress",
          "osName",
          "provisioningSettings",
          "provisioningState",
          "securityProfile",
          "sic",
          "sicName",
          "sicState",
          "tags",
          "topologies",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLsmGatewayProfile:getManagementLsmGatewayProfile": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLsmGatewayProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "osName": {
            "type": "string"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLsmGatewayProfile.\n",
        "properties": {
          "advancedSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayProfileAdvancedSetting:getManagementLsmGatewayProfileAdvancedSetting"
            },
            "type": "array"
          },
          "antiBot": {
            "type": "boolean"
          },
          "antiVirus": {
            "type": "boolean"
          },
          "applicationControl": {
            "type": "boolean"
          },
          "applicationControlAndUrlFilteringSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayProfileApplicationControlAndUrlFilteringSetting:getManagementLsmGatewayProfileApplicationControlAndUrlFilteringSetting"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "contentAwareness": {
            "type": "boolean"
          },
          "dataLossPrevention": {
            "type": "boolean"
          },
          "dynamicIp": {
            "type": "boolean"
          },
          "enableHttpsInspection": {
            "type": "boolean"
          },
          "firewall": {
            "type": "boolean"
          },
          "groups": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayProfileGroup:getManagementLsmGatewayProfileGroup"
            },
            "type": "array"
          },
          "hitCount": {
            "type": "boolean"
          },
          "httpsInspections": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementLsmGatewayProfileHttpsInspection:getManagementLsmGatewayProfileHttpsInspection"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "interfaces": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "ips": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "natHideInternalInterfaces": {
            "type": "boolean"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "osName": {
            "type": "string"
          },
          "proxySettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "qos": {
            "type": "boolean"
          },
          "saveLogsLocally": {
            "type": "boolean"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatEmulation": {
            "type": "boolean"
          },
          "threatExtraction": {
            "type": "boolean"
          },
          "threatPreventionMode": {
            "type": "string"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "urlFiltering": {
            "type": "boolean"
          },
          "version": {
            "type": "string"
          },
          "vpn": {
            "type": "boolean"
          },
          "zeroPhishing": {
            "type": "boolean"
          },
          "zeroPhishingFqdn": {
            "type": "string"
          }
        },
        "required": [
          "advancedSettings",
          "antiBot",
          "antiVirus",
          "applicationControl",
          "applicationControlAndUrlFilteringSettings",
          "color",
          "comments",
          "contentAwareness",
          "dataLossPrevention",
          "dynamicIp",
          "enableHttpsInspection",
          "firewall",
          "groups",
          "hitCount",
          "httpsInspections",
          "id",
          "interfaces",
          "ips",
          "natHideInternalInterfaces",
          "natSettings",
          "proxySettings",
          "qos",
          "saveLogsLocally",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "tags",
          "threatEmulation",
          "threatExtraction",
          "threatPreventionMode",
          "type",
          "urlFiltering",
          "version",
          "vpn",
          "zeroPhishing",
          "zeroPhishingFqdn"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementLsvProfile:getManagementLsvProfile": {
      "description": "Use this data source to get information on an existing Check Point Lsv Profile.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst lsvProfile = new checkpoint.ManagementLsvProfile(\"lsv_profile\", {\n    name: \"Lsv profile\",\n    certificateAuthority: \"internal_ca\",\n});\nconst dataLsvProfile = checkpoint.getManagementLsvProfileOutput({\n    name: lsvProfile.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nlsv_profile = checkpoint.ManagementLsvProfile(\"lsv_profile\",\n    name=\"Lsv profile\",\n    certificate_authority=\"internal_ca\")\ndata_lsv_profile = checkpoint.get_management_lsv_profile_output(name=lsv_profile.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var lsvProfile = new Checkpoint.ManagementLsvProfile(\"lsv_profile\", new()\n    {\n        Name = \"Lsv profile\",\n        CertificateAuthority = \"internal_ca\",\n    });\n\n    var dataLsvProfile = Checkpoint.GetManagementLsvProfile.Invoke(new()\n    {\n        Name = lsvProfile.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tlsvProfile, err := checkpoint.NewManagementLsvProfile(ctx, \"lsv_profile\", \u0026checkpoint.ManagementLsvProfileArgs{\n\t\t\tName:                 pulumi.String(\"Lsv profile\"),\n\t\t\tCertificateAuthority: pulumi.String(\"internal_ca\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementLsvProfileOutput(ctx, checkpoint.GetManagementLsvProfileOutputArgs{\n\t\t\tName: lsvProfile.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementLsvProfile;\nimport com.pulumi.checkpoint.ManagementLsvProfileArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementLsvProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var lsvProfile = new ManagementLsvProfile(\"lsvProfile\", ManagementLsvProfileArgs.builder()\n            .name(\"Lsv profile\")\n            .certificateAuthority(\"internal_ca\")\n            .build());\n\n        final var dataLsvProfile = CheckpointFunctions.getManagementLsvProfile(GetManagementLsvProfileArgs.builder()\n            .name(lsvProfile.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  lsvProfile:\n    type: checkpoint:ManagementLsvProfile\n    name: lsv_profile\n    properties:\n      name: Lsv profile\n      certificateAuthority: internal_ca\nvariables:\n  dataLsvProfile:\n    fn::invoke:\n      function: checkpoint:getManagementLsvProfile\n      arguments:\n        name: ${lsvProfile.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementLsvProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementLsvProfile.\n",
        "properties": {
          "allowedIpAddresses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "certificateAuthority": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "restrictAllowedAddresses": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "vpnDomain": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          }
        },
        "required": [
          "allowedIpAddresses",
          "certificateAuthority",
          "color",
          "comments",
          "id",
          "restrictAllowedAddresses",
          "tags",
          "vpnDomain"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMdPermissionsProfile:getManagementMdPermissionsProfile": {
      "description": "Use this data source to get information on an existing Check Point Md Permissions Profile.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMdPermissionsProfile(\"example\", {name: \"manager profile\"});\nconst dataMdPermissionsProfile = checkpoint.getManagementMdPermissionsProfileOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMdPermissionsProfile(\"example\", name=\"manager profile\")\ndata_md_permissions_profile = checkpoint.get_management_md_permissions_profile_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementMdPermissionsProfile(\"example\", new()\n    {\n        Name = \"manager profile\",\n    });\n\n    var dataMdPermissionsProfile = Checkpoint.GetManagementMdPermissionsProfile.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementMdPermissionsProfile(ctx, \"example\", \u0026checkpoint.ManagementMdPermissionsProfileArgs{\n\t\t\tName: pulumi.String(\"manager profile\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementMdPermissionsProfileOutput(ctx, checkpoint.GetManagementMdPermissionsProfileOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMdPermissionsProfile;\nimport com.pulumi.checkpoint.ManagementMdPermissionsProfileArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMdPermissionsProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMdPermissionsProfile(\"example\", ManagementMdPermissionsProfileArgs.builder()\n            .name(\"manager profile\")\n            .build());\n\n        final var dataMdPermissionsProfile = CheckpointFunctions.getManagementMdPermissionsProfile(GetManagementMdPermissionsProfileArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMdPermissionsProfile\n    properties:\n      name: manager profile\nvariables:\n  dataMdPermissionsProfile:\n    fn::invoke:\n      function: checkpoint:getManagementMdPermissionsProfile\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMdPermissionsProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMdPermissionsProfile.\n",
        "properties": {
          "cmeOperations": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "defaultProfileGlobalDomains": {
            "type": "string"
          },
          "defaultProfileLocalDomains": {
            "type": "string"
          },
          "domainsToProcesses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "enableDefaultProfileForGlobalDomains": {
            "type": "boolean"
          },
          "enableDefaultProfileForLocalDomains": {
            "type": "boolean"
          },
          "globalVpnManagement": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "manageAdmins": {
            "type": "boolean"
          },
          "manageGlobalAssignments": {
            "type": "boolean"
          },
          "manageSessions": {
            "type": "boolean"
          },
          "managementApiLogin": {
            "type": "boolean"
          },
          "mdsProvisioning": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "permissionLevel": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "viewGlobalObjectsInDomain": {
            "type": "boolean"
          }
        },
        "required": [
          "cmeOperations",
          "color",
          "comments",
          "defaultProfileGlobalDomains",
          "defaultProfileLocalDomains",
          "domainsToProcesses",
          "enableDefaultProfileForGlobalDomains",
          "enableDefaultProfileForLocalDomains",
          "globalVpnManagement",
          "id",
          "manageAdmins",
          "manageGlobalAssignments",
          "manageSessions",
          "managementApiLogin",
          "mdsProvisioning",
          "permissionLevel",
          "tags",
          "viewGlobalObjectsInDomain"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMds:getManagementMds": {
      "description": "This resource allows you to execute Check Point MDS.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst mds = new checkpoint.ManagementMds(\"mds\", {\n    name: \"my mds\",\n    ipv4Address: \"2.2.2.2\",\n});\nconst dataMds = checkpoint.getManagementMdsOutput({\n    name: mds.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmds = checkpoint.ManagementMds(\"mds\",\n    name=\"my mds\",\n    ipv4_address=\"2.2.2.2\")\ndata_mds = checkpoint.get_management_mds_output(name=mds.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var mds = new Checkpoint.ManagementMds(\"mds\", new()\n    {\n        Name = \"my mds\",\n        Ipv4Address = \"2.2.2.2\",\n    });\n\n    var dataMds = Checkpoint.GetManagementMds.Invoke(new()\n    {\n        Name = mds.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tmds, err := checkpoint.NewManagementMds(ctx, \"mds\", \u0026checkpoint.ManagementMdsArgs{\n\t\t\tName:        pulumi.String(\"my mds\"),\n\t\t\tIpv4Address: pulumi.String(\"2.2.2.2\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementMdsOutput(ctx, checkpoint.GetManagementMdsOutputArgs{\n\t\t\tName: mds.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMds;\nimport com.pulumi.checkpoint.ManagementMdsArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMdsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var mds = new ManagementMds(\"mds\", ManagementMdsArgs.builder()\n            .name(\"my mds\")\n            .ipv4Address(\"2.2.2.2\")\n            .build());\n\n        final var dataMds = CheckpointFunctions.getManagementMds(GetManagementMdsArgs.builder()\n            .name(mds.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  mds:\n    type: checkpoint:ManagementMds\n    properties:\n      name: my mds\n      ipv4Address: 2.2.2.2\nvariables:\n  dataMds:\n    fn::invoke:\n      function: checkpoint:getManagementMds\n      arguments:\n        name: ${mds.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMds.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMds.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "domains": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "globalDomains": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "hardware": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ipPoolFirst": {
            "type": "string"
          },
          "ipPoolLast": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "os": {
            "type": "string"
          },
          "serverType": {
            "type": "string"
          },
          "sicName": {
            "type": "string"
          },
          "sicState": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "domains",
          "globalDomains",
          "hardware",
          "id",
          "ipPoolFirst",
          "ipPoolLast",
          "ipv4Address",
          "ipv6Address",
          "os",
          "serverType",
          "sicName",
          "sicState",
          "tags",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMobileAccessProfileRule:getManagementMobileAccessProfileRule": {
      "description": "Use this data source to get information on an existing Check Point Mobile Access Profile Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessProfileRule(\"example\", {\n    name: \"Rule 1\",\n    mobileProfile: \"Default_Profile\",\n    userGroups: [\"my_group\"],\n    position: {\n        top: \"top\",\n    },\n});\nconst data = checkpoint.getManagementMobileAccessProfileRuleOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessProfileRule(\"example\",\n    name=\"Rule 1\",\n    mobile_profile=\"Default_Profile\",\n    user_groups=[\"my_group\"],\n    position={\n        \"top\": \"top\",\n    })\ndata = checkpoint.get_management_mobile_access_profile_rule_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementMobileAccessProfileRule(\"example\", new()\n    {\n        Name = \"Rule 1\",\n        MobileProfile = \"Default_Profile\",\n        UserGroups = new[]\n        {\n            \"my_group\",\n        },\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var data = Checkpoint.GetManagementMobileAccessProfileRule.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementMobileAccessProfileRule(ctx, \"example\", \u0026checkpoint.ManagementMobileAccessProfileRuleArgs{\n\t\t\tName:          pulumi.String(\"Rule 1\"),\n\t\t\tMobileProfile: pulumi.String(\"Default_Profile\"),\n\t\t\tUserGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"my_group\"),\n\t\t\t},\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementMobileAccessProfileRuleOutput(ctx, checkpoint.GetManagementMobileAccessProfileRuleOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileRule;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMobileAccessProfileRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessProfileRule(\"example\", ManagementMobileAccessProfileRuleArgs.builder()\n            .name(\"Rule 1\")\n            .mobileProfile(\"Default_Profile\")\n            .userGroups(\"my_group\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var data = CheckpointFunctions.getManagementMobileAccessProfileRule(GetManagementMobileAccessProfileRuleArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessProfileRule\n    properties:\n      name: Rule 1\n      mobileProfile: Default_Profile\n      userGroups:\n        - my_group\n      position:\n        top: top\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementMobileAccessProfileRule\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMobileAccessProfileRule.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMobileAccessProfileRule.\n",
        "properties": {
          "comments": {
            "type": "string"
          },
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "mobileProfile": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "userGroups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "comments",
          "enabled",
          "id",
          "mobileProfile",
          "tags",
          "userGroups"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMobileAccessProfileSection:getManagementMobileAccessProfileSection": {
      "description": "Use this data source to get information on an existing Check Point Mobile Access Profile Section.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessProfileSection(\"example\", {\n    name: \"New Section 1\",\n    position: {\n        top: \"top\",\n    },\n});\nconst data = checkpoint.getManagementMobileAccessProfileSectionOutput({\n    uid: example.managementMobileAccessProfileSectionId,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessProfileSection(\"example\",\n    name=\"New Section 1\",\n    position={\n        \"top\": \"top\",\n    })\ndata = checkpoint.get_management_mobile_access_profile_section_output(uid=example.management_mobile_access_profile_section_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementMobileAccessProfileSection(\"example\", new()\n    {\n        Name = \"New Section 1\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var data = Checkpoint.GetManagementMobileAccessProfileSection.Invoke(new()\n    {\n        Uid = example.ManagementMobileAccessProfileSectionId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementMobileAccessProfileSection(ctx, \"example\", \u0026checkpoint.ManagementMobileAccessProfileSectionArgs{\n\t\t\tName: pulumi.String(\"New Section 1\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementMobileAccessProfileSectionOutput(ctx, checkpoint.GetManagementMobileAccessProfileSectionOutputArgs{\n\t\t\tUid: example.ManagementMobileAccessProfileSectionId,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileSection;\nimport com.pulumi.checkpoint.ManagementMobileAccessProfileSectionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMobileAccessProfileSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessProfileSection(\"example\", ManagementMobileAccessProfileSectionArgs.builder()\n            .name(\"New Section 1\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var data = CheckpointFunctions.getManagementMobileAccessProfileSection(GetManagementMobileAccessProfileSectionArgs.builder()\n            .uid(example.managementMobileAccessProfileSectionId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessProfileSection\n    properties:\n      name: New Section 1\n      position:\n        top: top\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementMobileAccessProfileSection\n      arguments:\n        uid: ${example.managementMobileAccessProfileSectionId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMobileAccessProfileSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMobileAccessProfileSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMobileAccessRule:getManagementMobileAccessRule": {
      "description": "Use this data source to get information on an existing Check Point Mobile Access Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessRule(\"example\", {\n    name: \"Rule 1\",\n    applications: [\n        \"N\",\n        \"e\",\n        \"w\",\n        \" \",\n        \"A\",\n        \"p\",\n        \"p\",\n        \"l\",\n        \"i\",\n        \"c\",\n        \"a\",\n        \"t\",\n        \"i\",\n        \"o\",\n        \"n\",\n    ],\n    userGroups: [\"my_group\"],\n    position: {\n        top: \"top\",\n    },\n});\nconst data = checkpoint.getManagementMobileAccessRuleOutput({\n    uid: example.managementMobileAccessRuleId,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessRule(\"example\",\n    name=\"Rule 1\",\n    applications=[\n        \"N\",\n        \"e\",\n        \"w\",\n        \" \",\n        \"A\",\n        \"p\",\n        \"p\",\n        \"l\",\n        \"i\",\n        \"c\",\n        \"a\",\n        \"t\",\n        \"i\",\n        \"o\",\n        \"n\",\n    ],\n    user_groups=[\"my_group\"],\n    position={\n        \"top\": \"top\",\n    })\ndata = checkpoint.get_management_mobile_access_rule_output(uid=example.management_mobile_access_rule_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementMobileAccessRule(\"example\", new()\n    {\n        Name = \"Rule 1\",\n        Applications = new[]\n        {\n            \"N\",\n            \"e\",\n            \"w\",\n            \" \",\n            \"A\",\n            \"p\",\n            \"p\",\n            \"l\",\n            \"i\",\n            \"c\",\n            \"a\",\n            \"t\",\n            \"i\",\n            \"o\",\n            \"n\",\n        },\n        UserGroups = new[]\n        {\n            \"my_group\",\n        },\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var data = Checkpoint.GetManagementMobileAccessRule.Invoke(new()\n    {\n        Uid = example.ManagementMobileAccessRuleId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementMobileAccessRule(ctx, \"example\", \u0026checkpoint.ManagementMobileAccessRuleArgs{\n\t\t\tName: pulumi.String(\"Rule 1\"),\n\t\t\tApplications: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"N\"),\n\t\t\t\tpulumi.String(\"e\"),\n\t\t\t\tpulumi.String(\"w\"),\n\t\t\t\tpulumi.String(\" \"),\n\t\t\t\tpulumi.String(\"A\"),\n\t\t\t\tpulumi.String(\"p\"),\n\t\t\t\tpulumi.String(\"p\"),\n\t\t\t\tpulumi.String(\"l\"),\n\t\t\t\tpulumi.String(\"i\"),\n\t\t\t\tpulumi.String(\"c\"),\n\t\t\t\tpulumi.String(\"a\"),\n\t\t\t\tpulumi.String(\"t\"),\n\t\t\t\tpulumi.String(\"i\"),\n\t\t\t\tpulumi.String(\"o\"),\n\t\t\t\tpulumi.String(\"n\"),\n\t\t\t},\n\t\t\tUserGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"my_group\"),\n\t\t\t},\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementMobileAccessRuleOutput(ctx, checkpoint.GetManagementMobileAccessRuleOutputArgs{\n\t\t\tUid: example.ManagementMobileAccessRuleId,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessRule;\nimport com.pulumi.checkpoint.ManagementMobileAccessRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMobileAccessRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessRule(\"example\", ManagementMobileAccessRuleArgs.builder()\n            .name(\"Rule 1\")\n            .applications(            \n                \"N\",\n                \"e\",\n                \"w\",\n                \" \",\n                \"A\",\n                \"p\",\n                \"p\",\n                \"l\",\n                \"i\",\n                \"c\",\n                \"a\",\n                \"t\",\n                \"i\",\n                \"o\",\n                \"n\")\n            .userGroups(\"my_group\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var data = CheckpointFunctions.getManagementMobileAccessRule(GetManagementMobileAccessRuleArgs.builder()\n            .uid(example.managementMobileAccessRuleId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessRule\n    properties:\n      name: Rule 1\n      applications:\n        - N\n        - e\n        - w\n        - ' '\n        - A\n        - p\n        - p\n        - l\n        - i\n        - c\n        - a\n        - t\n        - i\n        - o\n        - n\n      userGroups:\n        - my_group\n      position:\n        top: top\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementMobileAccessRule\n      arguments:\n        uid: ${example.managementMobileAccessRuleId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMobileAccessRule.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMobileAccessRule.\n",
        "properties": {
          "applications": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "comments": {
            "type": "string"
          },
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "userGroups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "applications",
          "comments",
          "enabled",
          "id",
          "installOns",
          "tags",
          "userGroups"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMobileAccessSection:getManagementMobileAccessSection": {
      "description": "Use this data source to get information on an existing Check Point Mobile Access Section.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMobileAccessSection(\"example\", {\n    name: \"New Section 1\",\n    position: {\n        top: \"top\",\n    },\n});\nconst data = checkpoint.getManagementMobileAccessSectionOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMobileAccessSection(\"example\",\n    name=\"New Section 1\",\n    position={\n        \"top\": \"top\",\n    })\ndata = checkpoint.get_management_mobile_access_section_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementMobileAccessSection(\"example\", new()\n    {\n        Name = \"New Section 1\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var data = Checkpoint.GetManagementMobileAccessSection.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementMobileAccessSection(ctx, \"example\", \u0026checkpoint.ManagementMobileAccessSectionArgs{\n\t\t\tName: pulumi.String(\"New Section 1\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementMobileAccessSectionOutput(ctx, checkpoint.GetManagementMobileAccessSectionOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMobileAccessSection;\nimport com.pulumi.checkpoint.ManagementMobileAccessSectionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMobileAccessSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMobileAccessSection(\"example\", ManagementMobileAccessSectionArgs.builder()\n            .name(\"New Section 1\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var data = CheckpointFunctions.getManagementMobileAccessSection(GetManagementMobileAccessSectionArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMobileAccessSection\n    properties:\n      name: New Section 1\n      position:\n        top: top\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementMobileAccessSection\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMobileAccessSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMobileAccessSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMobileProfile:getManagementMobileProfile": {
      "description": "Use this data source to get information on an existing Check Point Mobile Profile.\n\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMobileProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMobileProfile.\n",
        "properties": {
          "applications": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementMobileProfileApplication:getManagementMobileProfileApplication"
            },
            "type": "array"
          },
          "clientCustomizations": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementMobileProfileClientCustomization:getManagementMobileProfileClientCustomization"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataLeakPreventions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementMobileProfileDataLeakPrevention:getManagementMobileProfileDataLeakPrevention"
            },
            "type": "array"
          },
          "harmonyMobiles": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementMobileProfileHarmonyMobile:getManagementMobileProfileHarmonyMobile"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "securities": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementMobileProfileSecurity:getManagementMobileProfileSecurity"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "applications",
          "clientCustomizations",
          "color",
          "comments",
          "dataLeakPreventions",
          "harmonyMobiles",
          "id",
          "securities",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementMultipleKeyExchanges:getManagementMultipleKeyExchanges": {
      "description": "Use this data source to get information on an existing Check Point Multiple Key Exchanges.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementMultipleKeyExchanges(\"example\", {\n    name: \"Multiple Key Exchanges\",\n    keyExchangeMethods: [\"group-2\"],\n    additionalKeyExchange1Methods: [\"kyber-1024\"],\n});\nconst data = checkpoint.getManagementMultipleKeyExchanges({\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementMultipleKeyExchanges(\"example\",\n    name=\"Multiple Key Exchanges\",\n    key_exchange_methods=[\"group-2\"],\n    additional_key_exchange1_methods=[\"kyber-1024\"])\ndata = checkpoint.get_management_multiple_key_exchanges(name=test[\"name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementMultipleKeyExchanges(\"example\", new()\n    {\n        Name = \"Multiple Key Exchanges\",\n        KeyExchangeMethods = new[]\n        {\n            \"group-2\",\n        },\n        AdditionalKeyExchange1Methods = new[]\n        {\n            \"kyber-1024\",\n        },\n    });\n\n    var data = Checkpoint.GetManagementMultipleKeyExchanges.Invoke(new()\n    {\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementMultipleKeyExchanges(ctx, \"example\", \u0026checkpoint.ManagementMultipleKeyExchangesArgs{\n\t\t\tName: pulumi.String(\"Multiple Key Exchanges\"),\n\t\t\tKeyExchangeMethods: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"group-2\"),\n\t\t\t},\n\t\t\tAdditionalKeyExchange1Methods: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"kyber-1024\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementMultipleKeyExchanges(ctx, \u0026checkpoint.LookupManagementMultipleKeyExchangesArgs{\n\t\t\tName: pulumi.StringRef(test.Name),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementMultipleKeyExchanges;\nimport com.pulumi.checkpoint.ManagementMultipleKeyExchangesArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementMultipleKeyExchangesArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementMultipleKeyExchanges(\"example\", ManagementMultipleKeyExchangesArgs.builder()\n            .name(\"Multiple Key Exchanges\")\n            .keyExchangeMethods(\"group-2\")\n            .additionalKeyExchange1Methods(\"kyber-1024\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementMultipleKeyExchanges(GetManagementMultipleKeyExchangesArgs.builder()\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementMultipleKeyExchanges\n    properties:\n      name: Multiple Key Exchanges\n      keyExchangeMethods:\n        - group-2\n      additionalKeyExchange1Methods:\n        - kyber-1024\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementMultipleKeyExchanges\n      arguments:\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementMultipleKeyExchanges.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementMultipleKeyExchanges.\n",
        "properties": {
          "additionalKeyExchange1Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "additionalKeyExchange2Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "additionalKeyExchange3Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "additionalKeyExchange4Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "additionalKeyExchange5Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "additionalKeyExchange6Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "additionalKeyExchange7Methods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "keyExchangeMethods": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "additionalKeyExchange1Methods",
          "additionalKeyExchange2Methods",
          "additionalKeyExchange3Methods",
          "additionalKeyExchange4Methods",
          "additionalKeyExchange5Methods",
          "additionalKeyExchange6Methods",
          "additionalKeyExchange7Methods",
          "color",
          "comments",
          "id",
          "keyExchangeMethods",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNatRule:getManagementNatRule": {
      "description": "This resource allows you to execute Check Point NAT Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testManagementNatRule = new checkpoint.ManagementNatRule(\"test\", {\n    name: \"natrule\",\n    \"package\": \"Standard\",\n    position: {\n        top: \"top\",\n    },\n});\nconst test = checkpoint.getManagementNatRuleOutput({\n    \"package\": testManagementNatRule[\"package\"],\n    name: testManagementNatRule.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_management_nat_rule = checkpoint.ManagementNatRule(\"test\",\n    name=\"natrule\",\n    package=\"Standard\",\n    position={\n        \"top\": \"top\",\n    })\ntest = checkpoint.get_management_nat_rule_output(package=test_management_nat_rule.package,\n    name=test_management_nat_rule.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testManagementNatRule = new Checkpoint.ManagementNatRule(\"test\", new()\n    {\n        Name = \"natrule\",\n        Package = \"Standard\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var test = Checkpoint.GetManagementNatRule.Invoke(new()\n    {\n        Package = testManagementNatRule.Package,\n        Name = testManagementNatRule.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestManagementNatRule, err := checkpoint.NewManagementNatRule(ctx, \"test\", \u0026checkpoint.ManagementNatRuleArgs{\n\t\t\tName:    pulumi.String(\"natrule\"),\n\t\t\tPackage: pulumi.String(\"Standard\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementNatRuleOutput(ctx, checkpoint.GetManagementNatRuleOutputArgs{\n\t\t\tPackage: testManagementNatRule.Package,\n\t\t\tName:    testManagementNatRule.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNatRule;\nimport com.pulumi.checkpoint.ManagementNatRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNatRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testManagementNatRule = new ManagementNatRule(\"testManagementNatRule\", ManagementNatRuleArgs.builder()\n            .name(\"natrule\")\n            .package_(\"Standard\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var test = CheckpointFunctions.getManagementNatRule(GetManagementNatRuleArgs.builder()\n            .package_(testManagementNatRule.package())\n            .name(testManagementNatRule.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testManagementNatRule:\n    type: checkpoint:ManagementNatRule\n    name: test\n    properties:\n      name: natrule\n      package: Standard\n      position:\n        top: top\nvariables:\n  test:\n    fn::invoke:\n      function: checkpoint:getManagementNatRule\n      arguments:\n        package: ${testManagementNatRule.package}\n        name: ${testManagementNatRule.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNatRule.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Rule name.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "package"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNatRule.\n",
        "properties": {
          "autoGenerated": {
            "type": "boolean"
          },
          "comments": {
            "type": "string"
          },
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "method": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "originalDestination": {
            "type": "string"
          },
          "originalService": {
            "type": "string"
          },
          "originalSource": {
            "type": "string"
          },
          "package": {
            "type": "string"
          },
          "translatedDestination": {
            "type": "string"
          },
          "translatedService": {
            "type": "string"
          },
          "translatedSource": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "autoGenerated",
          "comments",
          "enabled",
          "id",
          "installOns",
          "method",
          "originalDestination",
          "originalService",
          "originalSource",
          "package",
          "translatedDestination",
          "translatedService",
          "translatedSource"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNatRulebase:getManagementNatRulebase": {
      "description": "Use this data source to get information on an existing nat RuleBase.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst natRulebase = checkpoint.getManagementNatRulebase({\n    \"package\": \"Standard\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nnat_rulebase = checkpoint.get_management_nat_rulebase(package=\"Standard\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var natRulebase = Checkpoint.GetManagementNatRulebase.Invoke(new()\n    {\n        Package = \"Standard\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementNatRulebase(ctx, \u0026checkpoint.GetManagementNatRulebaseArgs{\n\t\t\tPackage: \"Standard\",\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNatRulebaseArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var natRulebase = CheckpointFunctions.getManagementNatRulebase(GetManagementNatRulebaseArgs.builder()\n            .package_(\"Standard\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  natRulebase:\n    fn::invoke:\n      function: checkpoint:getManagementNatRulebase\n      arguments:\n        package: Standard\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNatRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in\nreply.\n"
          },
          "filter": {
            "type": "string",
            "description": "APN name.\n"
          },
          "filterSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Enable enforce end user domain.\u003cspan pulumi-lang-nodejs=\" filterSettings \" pulumi-lang-dotnet=\" FilterSettings \" pulumi-lang-go=\" filterSettings \" pulumi-lang-python=\" filter_settings \" pulumi-lang-yaml=\" filterSettings \" pulumi-lang-java=\" filterSettings \"\u003e filter_settings \u003c/span\u003eblocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNatRulebaseOrder:getManagementNatRulebaseOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order.\norders blocks are documented below.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object",
        "required": [
          "package"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNatRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "filterSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNatRulebaseOrder:getManagementNatRulebaseOrder"
            },
            "type": "array"
          },
          "package": {
            "type": "string"
          },
          "rulebases": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNatRulebaseRulebase:getManagementNatRulebaseRulebase"
            },
            "type": "array"
          },
          "showMembership": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "package",
          "rulebases"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNatSection:getManagementNatSection": {
      "description": "This resource allows you to execute Check Point NAT section.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst test = new checkpoint.ManagementNatSection(\"test\", {\n    name: \"nat section\",\n    \"package\": \"Standard\",\n    position: {\n        top: \"top\",\n    },\n});\nconst natSection = checkpoint.getManagementNatSectionOutput({\n    \"package\": test[\"package\"],\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest = checkpoint.ManagementNatSection(\"test\",\n    name=\"nat section\",\n    package=\"Standard\",\n    position={\n        \"top\": \"top\",\n    })\nnat_section = checkpoint.get_management_nat_section_output(package=test.package,\n    name=test.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var test = new Checkpoint.ManagementNatSection(\"test\", new()\n    {\n        Name = \"nat section\",\n        Package = \"Standard\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var natSection = Checkpoint.GetManagementNatSection.Invoke(new()\n    {\n        Package = test.Package,\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttest, err := checkpoint.NewManagementNatSection(ctx, \"test\", \u0026checkpoint.ManagementNatSectionArgs{\n\t\t\tName:    pulumi.String(\"nat section\"),\n\t\t\tPackage: pulumi.String(\"Standard\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementNatSectionOutput(ctx, checkpoint.GetManagementNatSectionOutputArgs{\n\t\t\tPackage: test.Package,\n\t\t\tName:    test.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNatSection;\nimport com.pulumi.checkpoint.ManagementNatSectionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNatSectionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var test = new ManagementNatSection(\"test\", ManagementNatSectionArgs.builder()\n            .name(\"nat section\")\n            .package_(\"Standard\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var natSection = CheckpointFunctions.getManagementNatSection(GetManagementNatSectionArgs.builder()\n            .package_(test.package())\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  test:\n    type: checkpoint:ManagementNatSection\n    properties:\n      name: nat section\n      package: Standard\n      position:\n        top: top\nvariables:\n  natSection:\n    fn::invoke:\n      function: checkpoint:getManagementNatSection\n      arguments:\n        package: ${test.package}\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNatSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "package"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNatSection.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "package": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "package"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNetworkFeed:getManagementNetworkFeed": {
      "description": "Use this data source to get information on an existing Check Point Network Feed.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementNetworkFeed(\"example\", {\n    name: \"network_feed\",\n    feedUrl: \"https://www.feedsresource.com/resource\",\n    username: \"feed_username\",\n    password: \"feed_password\",\n    feedFormat: \"Flat List\",\n    feedType: \"IP Address\",\n    updateInterval: 60,\n    dataColumn: 1,\n    useGatewayProxy: false,\n    fieldsDelimiter: \"\\x09\",\n    ignoreLinesThatStartWith: \"!\",\n});\nconst dataNetworkFeed = checkpoint.getManagementNetworkFeedOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementNetworkFeed(\"example\",\n    name=\"network_feed\",\n    feed_url=\"https://www.feedsresource.com/resource\",\n    username=\"feed_username\",\n    password=\"feed_password\",\n    feed_format=\"Flat List\",\n    feed_type=\"IP Address\",\n    update_interval=60,\n    data_column=1,\n    use_gateway_proxy=False,\n    fields_delimiter=\"\\x09\",\n    ignore_lines_that_start_with=\"!\")\ndata_network_feed = checkpoint.get_management_network_feed_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementNetworkFeed(\"example\", new()\n    {\n        Name = \"network_feed\",\n        FeedUrl = \"https://www.feedsresource.com/resource\",\n        Username = \"feed_username\",\n        Password = \"feed_password\",\n        FeedFormat = \"Flat List\",\n        FeedType = \"IP Address\",\n        UpdateInterval = 60,\n        DataColumn = 1,\n        UseGatewayProxy = false,\n        FieldsDelimiter = \"\t\",\n        IgnoreLinesThatStartWith = \"!\",\n    });\n\n    var dataNetworkFeed = Checkpoint.GetManagementNetworkFeed.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementNetworkFeed(ctx, \"example\", \u0026checkpoint.ManagementNetworkFeedArgs{\n\t\t\tName:                     pulumi.String(\"network_feed\"),\n\t\t\tFeedUrl:                  pulumi.String(\"https://www.feedsresource.com/resource\"),\n\t\t\tUsername:                 pulumi.String(\"feed_username\"),\n\t\t\tPassword:                 pulumi.String(\"feed_password\"),\n\t\t\tFeedFormat:               pulumi.String(\"Flat List\"),\n\t\t\tFeedType:                 pulumi.String(\"IP Address\"),\n\t\t\tUpdateInterval:           pulumi.Float64(60),\n\t\t\tDataColumn:               pulumi.Float64(1),\n\t\t\tUseGatewayProxy:          pulumi.Bool(false),\n\t\t\tFieldsDelimiter:          pulumi.String(\"\t\"),\n\t\t\tIgnoreLinesThatStartWith: pulumi.String(\"!\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementNetworkFeedOutput(ctx, checkpoint.GetManagementNetworkFeedOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNetworkFeed;\nimport com.pulumi.checkpoint.ManagementNetworkFeedArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNetworkFeedArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementNetworkFeed(\"example\", ManagementNetworkFeedArgs.builder()\n            .name(\"network_feed\")\n            .feedUrl(\"https://www.feedsresource.com/resource\")\n            .username(\"feed_username\")\n            .password(\"feed_password\")\n            .feedFormat(\"Flat List\")\n            .feedType(\"IP Address\")\n            .updateInterval(60.0)\n            .dataColumn(1.0)\n            .useGatewayProxy(false)\n            .fieldsDelimiter(\"\t\")\n            .ignoreLinesThatStartWith(\"!\")\n            .build());\n\n        final var dataNetworkFeed = CheckpointFunctions.getManagementNetworkFeed(GetManagementNetworkFeedArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementNetworkFeed\n    properties:\n      name: network_feed\n      feedUrl: https://www.feedsresource.com/resource\n      username: feed_username\n      password: feed_password\n      feedFormat: Flat List\n      feedType: IP Address\n      updateInterval: 60\n      dataColumn: 1\n      useGatewayProxy: false\n      fieldsDelimiter: \"\\t\"\n      ignoreLinesThatStartWith: '!'\nvariables:\n  dataNetworkFeed:\n    fn::invoke:\n      function: checkpoint:getManagementNetworkFeed\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNetworkFeed.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNetworkFeed.\n",
        "properties": {
          "certificateId": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "customHeaders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNetworkFeedCustomHeader:getManagementNetworkFeedCustomHeader"
            },
            "type": "array"
          },
          "dataColumn": {
            "type": "number"
          },
          "domainsToProcesses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "feedFormat": {
            "type": "string"
          },
          "feedType": {
            "type": "string"
          },
          "feedUrl": {
            "type": "string"
          },
          "fieldsDelimiter": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ignoreLinesThatStartWith": {
            "type": "string"
          },
          "jsonQuery": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "updateInterval": {
            "type": "number"
          },
          "useGatewayProxy": {
            "type": "boolean"
          },
          "username": {
            "secret": true,
            "type": "string"
          }
        },
        "required": [
          "certificateId",
          "color",
          "comments",
          "customHeaders",
          "dataColumn",
          "domainsToProcesses",
          "feedFormat",
          "feedType",
          "feedUrl",
          "fieldsDelimiter",
          "id",
          "ignoreLinesThatStartWith",
          "jsonQuery",
          "tags",
          "updateInterval",
          "useGatewayProxy",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNetworkProbe:getManagementNetworkProbe": {
      "description": "Use this data source to get information on an existing Check Point Network Probe.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementNetworkProbe(\"example\", {\n    name: \"network1\",\n    icmpOptions: {\n        source: \"host1\",\n        destination: \"host2\",\n    },\n    installOns: [\n        \"gw1\",\n        \"gw2\",\n    ],\n    interval: 20,\n    protocol: \"icmp\",\n});\nconst data = checkpoint.getManagementNetworkProbeOutput({\n    uid: example.managementNetworkProbeId,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementNetworkProbe(\"example\",\n    name=\"network1\",\n    icmp_options={\n        \"source\": \"host1\",\n        \"destination\": \"host2\",\n    },\n    install_ons=[\n        \"gw1\",\n        \"gw2\",\n    ],\n    interval=20,\n    protocol=\"icmp\")\ndata = checkpoint.get_management_network_probe_output(uid=example.management_network_probe_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementNetworkProbe(\"example\", new()\n    {\n        Name = \"network1\",\n        IcmpOptions = \n        {\n            { \"source\", \"host1\" },\n            { \"destination\", \"host2\" },\n        },\n        InstallOns = new[]\n        {\n            \"gw1\",\n            \"gw2\",\n        },\n        Interval = 20,\n        Protocol = \"icmp\",\n    });\n\n    var data = Checkpoint.GetManagementNetworkProbe.Invoke(new()\n    {\n        Uid = example.ManagementNetworkProbeId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementNetworkProbe(ctx, \"example\", \u0026checkpoint.ManagementNetworkProbeArgs{\n\t\t\tName: pulumi.String(\"network1\"),\n\t\t\tIcmpOptions: pulumi.StringMap{\n\t\t\t\t\"source\":      pulumi.String(\"host1\"),\n\t\t\t\t\"destination\": pulumi.String(\"host2\"),\n\t\t\t},\n\t\t\tInstallOns: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"gw1\"),\n\t\t\t\tpulumi.String(\"gw2\"),\n\t\t\t},\n\t\t\tInterval: pulumi.Float64(20),\n\t\t\tProtocol: pulumi.String(\"icmp\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementNetworkProbeOutput(ctx, checkpoint.GetManagementNetworkProbeOutputArgs{\n\t\t\tUid: example.ManagementNetworkProbeId,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNetworkProbe;\nimport com.pulumi.checkpoint.ManagementNetworkProbeArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNetworkProbeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementNetworkProbe(\"example\", ManagementNetworkProbeArgs.builder()\n            .name(\"network1\")\n            .icmpOptions(Map.ofEntries(\n                Map.entry(\"source\", \"host1\"),\n                Map.entry(\"destination\", \"host2\")\n            ))\n            .installOns(            \n                \"gw1\",\n                \"gw2\")\n            .interval(20.0)\n            .protocol(\"icmp\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementNetworkProbe(GetManagementNetworkProbeArgs.builder()\n            .uid(example.managementNetworkProbeId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementNetworkProbe\n    properties:\n      name: network1\n      icmpOptions:\n        source: host1\n        destination: host2\n      installOns:\n        - gw1\n        - gw2\n      interval: '20'\n      protocol: icmp\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementNetworkProbe\n      arguments:\n        uid: ${example.managementNetworkProbeId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNetworkProbe.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNetworkProbe.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "httpOptions": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "icmpOptions": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "interval": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "protocol": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "timeout": {
            "type": "number"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "httpOptions",
          "icmpOptions",
          "id",
          "installOns",
          "interval",
          "protocol",
          "tags",
          "timeout"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNetworks:getManagementNetworks": {
      "description": "Use this data source to get information on networks.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst myQuery = checkpoint.getManagementNetworks({\n    limit: 15,\n});\n// Fetch all results\nconst myQueryFetchAll = checkpoint.getManagementNetworks({\n    fetchAll: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmy_query = checkpoint.get_management_networks(limit=15)\n# Fetch all results\nmy_query_fetch_all = checkpoint.get_management_networks(fetch_all=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myQuery = Checkpoint.GetManagementNetworks.Invoke(new()\n    {\n        Limit = 15,\n    });\n\n    // Fetch all results\n    var myQueryFetchAll = Checkpoint.GetManagementNetworks.Invoke(new()\n    {\n        FetchAll = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementNetworks(ctx, \u0026checkpoint.GetManagementNetworksArgs{\n\t\t\tLimit: pulumi.Float64Ref(15),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Fetch all results\n\t\t_, err = checkpoint.GetManagementNetworks(ctx, \u0026checkpoint.GetManagementNetworksArgs{\n\t\t\tFetchAll: pulumi.BoolRef(true),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNetworksArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var myQuery = CheckpointFunctions.getManagementNetworks(GetManagementNetworksArgs.builder()\n            .limit(15)\n            .build());\n\n        // Fetch all results\n        final var myQueryFetchAll = CheckpointFunctions.getManagementNetworks(GetManagementNetworksArgs.builder()\n            .fetchAll(true)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  myQuery:\n    fn::invoke:\n      function: checkpoint:getManagementNetworks\n      arguments:\n        limit: 15\n  # Fetch all results\n  myQueryFetchAll:\n    fn::invoke:\n      function: checkpoint:getManagementNetworks\n      arguments:\n        fetchAll: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNetworks.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean",
            "description": "If true, fetches all results.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter objects by.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNetworksOrder:getManagementNetworksOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNetworks.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNetworksObject:getManagementNetworksObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNetworksOrder:getManagementNetworksOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNuageDataCenterServer:getManagementNuageDataCenterServer": {
      "description": "Use this data source to get information on an existing Nuage Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testNuage = new checkpoint.ManagementNuageDataCenterServer(\"testNuage\", {\n    name: \"MyNuage\",\n    organization: \"MY_ORG\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n});\nconst dataNuageDataCenterServer = checkpoint.getManagementNuageDataCenterServerOutput({\n    name: testNuage.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_nuage = checkpoint.ManagementNuageDataCenterServer(\"testNuage\",\n    name=\"MyNuage\",\n    organization=\"MY_ORG\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\")\ndata_nuage_data_center_server = checkpoint.get_management_nuage_data_center_server_output(name=test_nuage.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testNuage = new Checkpoint.ManagementNuageDataCenterServer(\"testNuage\", new()\n    {\n        Name = \"MyNuage\",\n        Organization = \"MY_ORG\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n    });\n\n    var dataNuageDataCenterServer = Checkpoint.GetManagementNuageDataCenterServer.Invoke(new()\n    {\n        Name = testNuage.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestNuage, err := checkpoint.NewManagementNuageDataCenterServer(ctx, \"testNuage\", \u0026checkpoint.ManagementNuageDataCenterServerArgs{\n\t\t\tName:         pulumi.String(\"MyNuage\"),\n\t\t\tOrganization: pulumi.String(\"MY_ORG\"),\n\t\t\tUsername:     pulumi.String(\"USERNAME\"),\n\t\t\tPassword:     pulumi.String(\"PASSWORD\"),\n\t\t\tHostname:     pulumi.String(\"HOSTNAME\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementNuageDataCenterServerOutput(ctx, checkpoint.GetManagementNuageDataCenterServerOutputArgs{\n\t\t\tName: testNuage.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNuageDataCenterServer;\nimport com.pulumi.checkpoint.ManagementNuageDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNuageDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testNuage = new ManagementNuageDataCenterServer(\"testNuage\", ManagementNuageDataCenterServerArgs.builder()\n            .name(\"MyNuage\")\n            .organization(\"MY_ORG\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .build());\n\n        final var dataNuageDataCenterServer = CheckpointFunctions.getManagementNuageDataCenterServer(GetManagementNuageDataCenterServerArgs.builder()\n            .name(testNuage.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testNuage:\n    type: checkpoint:ManagementNuageDataCenterServer\n    properties:\n      name: MyNuage\n      organization: MY_ORG\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\nvariables:\n  dataNuageDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementNuageDataCenterServer\n      arguments:\n        name: ${testNuage.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNuageDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNuageDataCenterServer.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "hostname": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "organization": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "unsafeAutoAccept": {
            "type": "boolean"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "certificateFingerprint",
          "color",
          "comments",
          "hostname",
          "id",
          "organization",
          "tags",
          "unsafeAutoAccept",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementNutanixDataCenterServer:getManagementNutanixDataCenterServer": {
      "description": "Use this data source to get information on an existing Nutanix Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testNutanix = new checkpoint.ManagementNutanixDataCenterServer(\"testNutanix\", {\n    name: \"MY-NUTANIX\",\n    hostname: \"127.0.0.1\",\n    username: \"admin\",\n    password: \"admin\",\n});\nconst dataNutanixDataCenterServer = checkpoint.getManagementNutanixDataCenterServerOutput({\n    name: testNutanix.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_nutanix = checkpoint.ManagementNutanixDataCenterServer(\"testNutanix\",\n    name=\"MY-NUTANIX\",\n    hostname=\"127.0.0.1\",\n    username=\"admin\",\n    password=\"admin\")\ndata_nutanix_data_center_server = checkpoint.get_management_nutanix_data_center_server_output(name=test_nutanix.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testNutanix = new Checkpoint.ManagementNutanixDataCenterServer(\"testNutanix\", new()\n    {\n        Name = \"MY-NUTANIX\",\n        Hostname = \"127.0.0.1\",\n        Username = \"admin\",\n        Password = \"admin\",\n    });\n\n    var dataNutanixDataCenterServer = Checkpoint.GetManagementNutanixDataCenterServer.Invoke(new()\n    {\n        Name = testNutanix.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestNutanix, err := checkpoint.NewManagementNutanixDataCenterServer(ctx, \"testNutanix\", \u0026checkpoint.ManagementNutanixDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MY-NUTANIX\"),\n\t\t\tHostname: pulumi.String(\"127.0.0.1\"),\n\t\t\tUsername: pulumi.String(\"admin\"),\n\t\t\tPassword: pulumi.String(\"admin\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementNutanixDataCenterServerOutput(ctx, checkpoint.GetManagementNutanixDataCenterServerOutputArgs{\n\t\t\tName: testNutanix.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementNutanixDataCenterServer;\nimport com.pulumi.checkpoint.ManagementNutanixDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementNutanixDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testNutanix = new ManagementNutanixDataCenterServer(\"testNutanix\", ManagementNutanixDataCenterServerArgs.builder()\n            .name(\"MY-NUTANIX\")\n            .hostname(\"127.0.0.1\")\n            .username(\"admin\")\n            .password(\"admin\")\n            .build());\n\n        final var dataNutanixDataCenterServer = CheckpointFunctions.getManagementNutanixDataCenterServer(GetManagementNutanixDataCenterServerArgs.builder()\n            .name(testNutanix.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testNutanix:\n    type: checkpoint:ManagementNutanixDataCenterServer\n    properties:\n      name: MY-NUTANIX\n      hostname: 127.0.0.1\n      username: admin\n      password: admin\nvariables:\n  dataNutanixDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementNutanixDataCenterServer\n      arguments:\n        name: ${testNutanix.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementNutanixDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementNutanixDataCenterServer.\n",
        "properties": {
          "automaticRefresh": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataCenterType": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "properties": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementNutanixDataCenterServerProperty:getManagementNutanixDataCenterServerProperty"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "automaticRefresh",
          "color",
          "comments",
          "dataCenterType",
          "id",
          "properties",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementObjects:getManagementObjects": {
      "description": "Use this data source to get information on an existing Check Point Objects.\n\u003cb\u003eNOTE: This data source is deprecated. Use instead data source \u003cspan pulumi-lang-nodejs=\"`checkpoint.getManagementShowObjects`\" pulumi-lang-dotnet=\"`checkpoint.getManagementShowObjects`\" pulumi-lang-go=\"`getManagementShowObjects`\" pulumi-lang-python=\"`get_management_show_objects`\" pulumi-lang-yaml=\"`checkpoint.getManagementShowObjects`\" pulumi-lang-java=\"`checkpoint.getManagementShowObjects`\"\u003e`checkpoint.getManagementShowObjects`\u003c/span\u003e.\u003c/b\u003e\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataObjects = checkpoint.getManagementObjects({\n    limit: 10,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_objects = checkpoint.get_management_objects(limit=10)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataObjects = Checkpoint.GetManagementObjects.Invoke(new()\n    {\n        Limit = 10,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementObjects(ctx, \u0026checkpoint.GetManagementObjectsArgs{\n\t\t\tLimit: pulumi.Float64Ref(10),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementObjectsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataObjects = CheckpointFunctions.getManagementObjects(GetManagementObjectsArgs.builder()\n            .limit(10)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataObjects:\n    fn::invoke:\n      function: checkpoint:getManagementObjects\n      arguments:\n        limit: 10\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementObjects.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter objects by. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. By default, the search involves both a textual search and a IP search. To use IP search only, set the \"ip-only\" parameter to true.\n"
          },
          "id": {
            "type": "string"
          },
          "ipOnly": {
            "type": "boolean",
            "description": "If using \"filter\", use this field to search objects by their IP address only, without involving the textual search.\n"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementObjectsOrder:getManagementObjectsOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          },
          "type": {
            "type": "string",
            "description": "The objects' type, e.g.: host, service-tcp, network, address-range...\n"
          },
          "uids": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of UIDs of the objects to retrieve.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementObjects.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean"
          },
          "domainsToProcesses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "filter": {
            "type": "string"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "ipOnly": {
            "type": "boolean"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementObjectsObject:getManagementObjectsObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementObjectsOrder:getManagementObjectsOrder"
            },
            "type": "array"
          },
          "showMembership": {
            "type": "boolean"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          },
          "type": {
            "type": "string"
          },
          "uids": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementOpenstackDataCenterServer:getManagementOpenstackDataCenterServer": {
      "description": "Use this data source to get information on an existing OpenStack Data Center Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testOpenStack = new checkpoint.ManagementOpenstackDataCenterServer(\"testOpenStack\", {\n    name: \"MyOpenStack\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n});\nconst dataOpenstackDataCenterServer = checkpoint.getManagementOpenstackDataCenterServerOutput({\n    name: testOpenStack.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_open_stack = checkpoint.ManagementOpenstackDataCenterServer(\"testOpenStack\",\n    name=\"MyOpenStack\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\")\ndata_openstack_data_center_server = checkpoint.get_management_openstack_data_center_server_output(name=test_open_stack.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testOpenStack = new Checkpoint.ManagementOpenstackDataCenterServer(\"testOpenStack\", new()\n    {\n        Name = \"MyOpenStack\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n    });\n\n    var dataOpenstackDataCenterServer = Checkpoint.GetManagementOpenstackDataCenterServer.Invoke(new()\n    {\n        Name = testOpenStack.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestOpenStack, err := checkpoint.NewManagementOpenstackDataCenterServer(ctx, \"testOpenStack\", \u0026checkpoint.ManagementOpenstackDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyOpenStack\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tHostname: pulumi.String(\"HOSTNAME\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementOpenstackDataCenterServerOutput(ctx, checkpoint.GetManagementOpenstackDataCenterServerOutputArgs{\n\t\t\tName: testOpenStack.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOpenstackDataCenterServer;\nimport com.pulumi.checkpoint.ManagementOpenstackDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementOpenstackDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testOpenStack = new ManagementOpenstackDataCenterServer(\"testOpenStack\", ManagementOpenstackDataCenterServerArgs.builder()\n            .name(\"MyOpenStack\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .build());\n\n        final var dataOpenstackDataCenterServer = CheckpointFunctions.getManagementOpenstackDataCenterServer(GetManagementOpenstackDataCenterServerArgs.builder()\n            .name(testOpenStack.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testOpenStack:\n    type: checkpoint:ManagementOpenstackDataCenterServer\n    properties:\n      name: MyOpenStack\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\nvariables:\n  dataOpenstackDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementOpenstackDataCenterServer\n      arguments:\n        name: ${testOpenStack.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementOpenstackDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementOpenstackDataCenterServer.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "hostname": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "unsafeAutoAccept": {
            "type": "boolean"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "certificateFingerprint",
          "color",
          "comments",
          "hostname",
          "id",
          "tags",
          "unsafeAutoAccept",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementOpsecTrustedCa:getManagementOpsecTrustedCa": {
      "description": "Use this data source to get information on an existing Check Point Opsec Trusted Ca.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOpsecTrustedCa(\"example\", {\n    name: \"opsec_ca\",\n    base64Certificate: \"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\",\n});\nconst data1 = checkpoint.getManagementOpsecTrustedCaOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOpsecTrustedCa(\"example\",\n    name=\"opsec_ca\",\n    base64_certificate=\"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\")\ndata1 = checkpoint.get_management_opsec_trusted_ca_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementOpsecTrustedCa(\"example\", new()\n    {\n        Name = \"opsec_ca\",\n        Base64Certificate = \"MIICwjCCAaqgAwIBAgIILdexblpVEMIwDQYJKoZIhvcNAQELBQAwGDEWMBQGA1UEAxMNd3d3Lm9wc2VjLmNvbTAeFw0yMzA2MjUwOTE3MDBaFw0yNTAzMzExNjAwMDBaMBgxFjAUBgNVBAMTDXd3dy5vcHNlYy5jb20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQCjpqCxDaVg+I1b+wqnmjjYtL3v7Tlu/YpMbsKnv+M1gRz6QFUOoSVnxKLo0A7Y4kCqa1OPcHO/LtXuok43F1YZPVKm3xWpY8FmqGqf5ZuGmSwm1HPObcMjwGOyFgwpwEDF5e0UMZ7xtJF8BZ5KKBh3ZfQ1FbmbVqSUPcmOi+NE4JspPlHxX+m6es/yeSGR1A2ezKY7KePTlwVtDe8hiLrYyKG92nka5rkD1QyEIVJ0W5wrnU4nGEDIHeOfT09zroQxaNLkb51sl4Tog/qw+EraVGIBe/iFnSJoDF37i2mLJqI/t8bel+aGDAxgMx1pO85OClgjPSWL0UIXGI2xrR+JAgMBAAGjEDAOMAwGA1UdEwQFMAMBAf8wDQYJKoZIhvcNAQELBQADggEBAHTs1AutAmSLHF2KRLJtrRNkso0lMyA7XI7k1TNpTk7TCZLNY0VbUliGbcl+POH4EG8ARUrftnwRDCTBd2BdJTqG2CyNADi+bw8aLvbxok7KH0GlQvGjyfq+sHK12wTl4ULNyYoAPZ01GhXOvkobROdSyjxvBVhxdVo90kj7mHFv3N83huNhfstDFUBcQCmMkbLuzDUZrl2a1OtqlOdNC6mNvb7Jq9W9vRxGA514e7jqyoM+PwHu5fILx/jmGT8suOUnvbtcDdFhjqixAPer6uSPR0CSbiJvuDy72DPH5mjZK5dQKewNYOZ/BQEsRIBe+Q6eGAoJqi+cD63cwlw0DCc=\",\n    });\n\n    var data1 = Checkpoint.GetManagementOpsecTrustedCa.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementOpsecTrustedCa(ctx, \"example\", \u0026checkpoint.ManagementOpsecTrustedCaArgs{\n\t\t\tName:              pulumi.String(\"opsec_ca\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementOpsecTrustedCaOutput(ctx, checkpoint.GetManagementOpsecTrustedCaOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOpsecTrustedCa;\nimport com.pulumi.checkpoint.ManagementOpsecTrustedCaArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementOpsecTrustedCaArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOpsecTrustedCa(\"example\", ManagementOpsecTrustedCaArgs.builder()\n            .name(\"opsec_ca\")\n            .base64Certificate(\"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\")\n            .build());\n\n        final var data1 = CheckpointFunctions.getManagementOpsecTrustedCa(GetManagementOpsecTrustedCaArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOpsecTrustedCa\n    properties:\n      name: opsec_ca\n      base64Certificate: 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\nvariables:\n  data1:\n    fn::invoke:\n      function: checkpoint:getManagementOpsecTrustedCa\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementOpsecTrustedCa.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementOpsecTrustedCa.\n",
        "properties": {
          "allowCertificatesFromBranches": {
            "type": "boolean"
          },
          "automaticEnrollments": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementOpsecTrustedCaAutomaticEnrollment:getManagementOpsecTrustedCaAutomaticEnrollment"
            },
            "type": "array"
          },
          "base64Certificate": {
            "type": "string"
          },
          "branches": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "cacheCrl": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "crlCacheMethod": {
            "type": "string"
          },
          "crlCacheTimeout": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "retrieveCrlFromHttpServers": {
            "type": "boolean"
          },
          "retrieveCrlFromLdapServers": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowCertificatesFromBranches",
          "automaticEnrollments",
          "base64Certificate",
          "branches",
          "cacheCrl",
          "color",
          "comments",
          "crlCacheMethod",
          "crlCacheTimeout",
          "id",
          "retrieveCrlFromHttpServers",
          "retrieveCrlFromLdapServers",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementOracleCloudDataCenterServer:getManagementOracleCloudDataCenterServer": {
      "description": "Use this data source to get information on an existing Oracle Cloud Data Center Server.\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testOracleCloud = new checkpoint.ManagementOracleCloudDataCenterServer(\"testOracleCloud\", {\n    name: \"MY-ORACLE-CLOUD\",\n    authenticationMethod: \"key-authentication\",\n    privateKey: \"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\",\n    keyUser: \"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\",\n    keyTenant: \"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\",\n    keyRegion: \"eu-frankfurt-1\",\n});\nconst dataOracleCloudDataCenterServer = checkpoint.getManagementOracleCloudDataCenterServerOutput({\n    name: testOracleCloud.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_oracle_cloud = checkpoint.ManagementOracleCloudDataCenterServer(\"testOracleCloud\",\n    name=\"MY-ORACLE-CLOUD\",\n    authentication_method=\"key-authentication\",\n    private_key=\"0SLtLS1CRUdJTiBQUklWQVRFIEtS0FWtLS0tDQpNSUlFdkFJQkFEQU5CZ2txaGtpRzl3AAAAUUVGQUFTQ0JLWXdnZ1NpQWdFQUFvSUJBUURUdmVrK1laMmNSekVmDQp1QkNoMkFxS2hzUFcrQUhUajY4dE5VbVl4OUFTRXBsREhnMkF0bCtMRWRRWUFRSUtLMUZ5L1JHRitkK3RkWjUrDQpabmprN0hESTQ5V3Rib0xodWN3YjBpNU4xbEVKWHVhOHhEN0FROTJXQy9PdzhzVktPRlJGNVJhMmxSa0svRS8xDQpxeDhKYnRoMGdXdHg0NHBQaWJwU3crMTB0QUhHR2FTLzVwN3hNUXhzajZTOThwL1hnalg5NzN4VStZZ2dLNUx3DQp6WlkzSDQ3UVREcmpyZzhOVmpDSFU3b3IrcEpCbjdldGF0V3psK3BQcVd4ODZub2tjdG5abUQxcHNnWnkwTEdDDQpRYys5ejdURGhEOFhuVERwckxiRGZXRnZqOTVKSmc3Q1krd29zN05vSENEOG5RWjFZZURVQkJjUkVlZXJVRlhBDQpaZ1I3UGNCN0FnTUJBQUVDZ2dFQUdkUWxCZVFER3ROMXJaTXNERGRUU2RudDU3b2NWdXlac2grNW1PRVVMakF3DQptOXhTOUt3ZnlYeTZRaXlxb3JKQ3REa2trR2c0OHhWOFBrVDN1RTBUTzU0aDF1UmxJMjNMbjcvVmFzOUZnVlFmDQpQS1dLVmdwYjdFMWhtT2gwVFNmRDRwRnpETlh4SzhMaXYycWVxdTJTTlRGWVR1M2RBRWpNL3EyWERmdXJQN2tiDQprZ3FKRFBwd2g4RWRXMVg1VVAyVE9CVWxwQllDTndxUkFJQ1E3eWlzbW5xeFlZS3RKc21MK21IQ3JYM3hNRHVTDQp4NHJCVDUvcXVrdVc4MmwrbGZmU3ZTNGpsb0VhajJ2QmozSk1udy9lYlNucFplU3FENTFjOUZlOCtocU4rU3NoDQozTnc0QXVybE1RRG5vZy9STUF3QUR3KzBRUlIwNVdaWDhMVXllVTBVVVFLQmdRRHd6R2I0b25BWHlNeUNkbHB3DQpRRnFCR0pwQnlsWEJjSkZnMGpCd1JMV2tQL3VjWnNoZlFlbkFWbkRZZS9yQ0FnWWxSdFFOVFRvb3BFSjlGcGgyDQp6TkVzd1EwcnV4WjFrVm41U1hwS2dF4668KalUxT3dGa3R1WFlJcEtBNGk5dFoxT04zb1lqdVRtMUlzb2xWZXVTDQpqK3Mwd1o3ZDAyYTNXcDN1UXJ3TFUwVjdpUUtCZ1FEaEcrc2xsNDYveGxONldWWEs3RVpkOGFEcTlTNEU0aEQvDQpvTmUwS0dVcHhZYngyTnFWN1VLSEwzOE41eG5qNGllWGt2U1BnL0twVUpqUmtLN0xJMnZsNmlndUJkdW01VUR1DQp5dW4rL1dNcVdnb2p4anZBbmxsS2lIa0JRMTJ2UFRqcE9HSGIrY0RqVWxROGVnOThFOEJ0ZktUQjFkRlcxUnBlDQorMXY0aXR3RzR3S0JnQzJLeXpMZExnd2hpeVJsbEFkRTlKa1QrU0RXVHMvT0pZREZZQ25ycE5zU3l0aXl5OVRRDQpWNUJzQ04yNDNSMVNXcTAwTHlqdzRUNE1peEt6Y2xTTnVrWVhvUkVUU2xVa0QzdEpmVnFYMVUrTE1XY0c2T1dPDQpmZndaMWRHUWRkM2dPL3BLQ3Q2NHlvUkt0eWJHa0U1ZzcrQkRlbk9ENXhwb2hoUXBCUDJ6V3lIWkFvR0FURndqDQpGUHBuUXVoc3Nza1JFQ2U3NnV3bkVPeWdjcW1ZNkkzUC9kM2lDeHhsSFM3Wlh4Zy9oQW41aUdiSFlvVDV0ekh6DQpZYWQ1cmpPWDB5YklGRUpzdkc0RXVTL2xoYVNvdFJnQjdpeFg4aXJlMjZuSDVSd1IzL1dSVG50aWtTb3NYdmh3DQpRYVZqNS9pcWVHVlRVVnlGM3QzMEtZaDFYWVltVHVmbkY5VktzODhDZ1lCTTNVN2QwOU9MemhMZTh3cnp1dEpuDQpGdmRGWlhCRnhXRGwyNXdteElWTFdpM0kvaWg2QXN5YlRNNWMzbFpTTUVvcjJYeXJqNnFUNzZ6amQ2eGE2NlN3DQpXMEVyL2lEY3dWK244MHpuU3lPSW5lRThIVkh1SGtNYVpPeHkvVzdVWDFqL0RmUnJPZG1iS1NWN2NBV2dVTlBrDQpnd1V5RkM2OTRKTR41Vko0WXZEZU13PT0NCi0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0=\",\n    key_user=\"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\",\n    key_tenant=\"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\",\n    key_region=\"eu-frankfurt-1\")\ndata_oracle_cloud_data_center_server = checkpoint.get_management_oracle_cloud_data_center_server_output(name=test_oracle_cloud.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testOracleCloud = new Checkpoint.ManagementOracleCloudDataCenterServer(\"testOracleCloud\", new()\n    {\n        Name = \"MY-ORACLE-CLOUD\",\n        AuthenticationMethod = \"key-authentication\",\n        PrivateKey = \"0SLtLS1CRUdJTiBQUklWQVRFIEtS0FWtLS0tDQpNSUlFdkFJQkFEQU5CZ2txaGtpRzl3AAAAUUVGQUFTQ0JLWXdnZ1NpQWdFQUFvSUJBUURUdmVrK1laMmNSekVmDQp1QkNoMkFxS2hzUFcrQUhUajY4dE5VbVl4OUFTRXBsREhnMkF0bCtMRWRRWUFRSUtLMUZ5L1JHRitkK3RkWjUrDQpabmprN0hESTQ5V3Rib0xodWN3YjBpNU4xbEVKWHVhOHhEN0FROTJXQy9PdzhzVktPRlJGNVJhMmxSa0svRS8xDQpxeDhKYnRoMGdXdHg0NHBQaWJwU3crMTB0QUhHR2FTLzVwN3hNUXhzajZTOThwL1hnalg5NzN4VStZZ2dLNUx3DQp6WlkzSDQ3UVREcmpyZzhOVmpDSFU3b3IrcEpCbjdldGF0V3psK3BQcVd4ODZub2tjdG5abUQxcHNnWnkwTEdDDQpRYys5ejdURGhEOFhuVERwckxiRGZXRnZqOTVKSmc3Q1krd29zN05vSENEOG5RWjFZZURVQkJjUkVlZXJVRlhBDQpaZ1I3UGNCN0FnTUJBQUVDZ2dFQUdkUWxCZVFER3ROMXJaTXNERGRUU2RudDU3b2NWdXlac2grNW1PRVVMakF3DQptOXhTOUt3ZnlYeTZRaXlxb3JKQ3REa2trR2c0OHhWOFBrVDN1RTBUTzU0aDF1UmxJMjNMbjcvVmFzOUZnVlFmDQpQS1dLVmdwYjdFMWhtT2gwVFNmRDRwRnpETlh4SzhMaXYycWVxdTJTTlRGWVR1M2RBRWpNL3EyWERmdXJQN2tiDQprZ3FKRFBwd2g4RWRXMVg1VVAyVE9CVWxwQllDTndxUkFJQ1E3eWlzbW5xeFlZS3RKc21MK21IQ3JYM3hNRHVTDQp4NHJCVDUvcXVrdVc4MmwrbGZmU3ZTNGpsb0VhajJ2QmozSk1udy9lYlNucFplU3FENTFjOUZlOCtocU4rU3NoDQozTnc0QXVybE1RRG5vZy9STUF3QUR3KzBRUlIwNVdaWDhMVXllVTBVVVFLQmdRRHd6R2I0b25BWHlNeUNkbHB3DQpRRnFCR0pwQnlsWEJjSkZnMGpCd1JMV2tQL3VjWnNoZlFlbkFWbkRZZS9yQ0FnWWxSdFFOVFRvb3BFSjlGcGgyDQp6TkVzd1EwcnV4WjFrVm41U1hwS2dF4668KalUxT3dGa3R1WFlJcEtBNGk5dFoxT04zb1lqdVRtMUlzb2xWZXVTDQpqK3Mwd1o3ZDAyYTNXcDN1UXJ3TFUwVjdpUUtCZ1FEaEcrc2xsNDYveGxONldWWEs3RVpkOGFEcTlTNEU0aEQvDQpvTmUwS0dVcHhZYngyTnFWN1VLSEwzOE41eG5qNGllWGt2U1BnL0twVUpqUmtLN0xJMnZsNmlndUJkdW01VUR1DQp5dW4rL1dNcVdnb2p4anZBbmxsS2lIa0JRMTJ2UFRqcE9HSGIrY0RqVWxROGVnOThFOEJ0ZktUQjFkRlcxUnBlDQorMXY0aXR3RzR3S0JnQzJLeXpMZExnd2hpeVJsbEFkRTlKa1QrU0RXVHMvT0pZREZZQ25ycE5zU3l0aXl5OVRRDQpWNUJzQ04yNDNSMVNXcTAwTHlqdzRUNE1peEt6Y2xTTnVrWVhvUkVUU2xVa0QzdEpmVnFYMVUrTE1XY0c2T1dPDQpmZndaMWRHUWRkM2dPL3BLQ3Q2NHlvUkt0eWJHa0U1ZzcrQkRlbk9ENXhwb2hoUXBCUDJ6V3lIWkFvR0FURndqDQpGUHBuUXVoc3Nza1JFQ2U3NnV3bkVPeWdjcW1ZNkkzUC9kM2lDeHhsSFM3Wlh4Zy9oQW41aUdiSFlvVDV0ekh6DQpZYWQ1cmpPWDB5YklGRUpzdkc0RXVTL2xoYVNvdFJnQjdpeFg4aXJlMjZuSDVSd1IzL1dSVG50aWtTb3NYdmh3DQpRYVZqNS9pcWVHVlRVVnlGM3QzMEtZaDFYWVltVHVmbkY5VktzODhDZ1lCTTNVN2QwOU9MemhMZTh3cnp1dEpuDQpGdmRGWlhCRnhXRGwyNXdteElWTFdpM0kvaWg2QXN5YlRNNWMzbFpTTUVvcjJYeXJqNnFUNzZ6amQ2eGE2NlN3DQpXMEVyL2lEY3dWK244MHpuU3lPSW5lRThIVkh1SGtNYVpPeHkvVzdVWDFqL0RmUnJPZG1iS1NWN2NBV2dVTlBrDQpnd1V5RkM2OTRKTR41Vko0WXZEZU13PT0NCi0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0=\",\n        KeyUser = \"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\",\n        KeyTenant = \"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\",\n        KeyRegion = \"eu-frankfurt-1\",\n    });\n\n    var dataOracleCloudDataCenterServer = Checkpoint.GetManagementOracleCloudDataCenterServer.Invoke(new()\n    {\n        Name = testOracleCloud.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestOracleCloud, err := checkpoint.NewManagementOracleCloudDataCenterServer(ctx, \"testOracleCloud\", \u0026checkpoint.ManagementOracleCloudDataCenterServerArgs{\n\t\t\tName:                 pulumi.String(\"MY-ORACLE-CLOUD\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"key-authentication\"),\n\t\t\tPrivateKey:           pulumi.String(\"0SLtLS1CRUdJTiBQUklWQVRFIEtS0FWtLS0tDQpNSUlFdkFJQkFEQU5CZ2txaGtpRzl3AAAAUUVGQUFTQ0JLWXdnZ1NpQWdFQUFvSUJBUURUdmVrK1laMmNSekVmDQp1QkNoMkFxS2hzUFcrQUhUajY4dE5VbVl4OUFTRXBsREhnMkF0bCtMRWRRWUFRSUtLMUZ5L1JHRitkK3RkWjUrDQpabmprN0hESTQ5V3Rib0xodWN3YjBpNU4xbEVKWHVhOHhEN0FROTJXQy9PdzhzVktPRlJGNVJhMmxSa0svRS8xDQpxeDhKYnRoMGdXdHg0NHBQaWJwU3crMTB0QUhHR2FTLzVwN3hNUXhzajZTOThwL1hnalg5NzN4VStZZ2dLNUx3DQp6WlkzSDQ3UVREcmpyZzhOVmpDSFU3b3IrcEpCbjdldGF0V3psK3BQcVd4ODZub2tjdG5abUQxcHNnWnkwTEdDDQpRYys5ejdURGhEOFhuVERwckxiRGZXRnZqOTVKSmc3Q1krd29zN05vSENEOG5RWjFZZURVQkJjUkVlZXJVRlhBDQpaZ1I3UGNCN0FnTUJBQUVDZ2dFQUdkUWxCZVFER3ROMXJaTXNERGRUU2RudDU3b2NWdXlac2grNW1PRVVMakF3DQptOXhTOUt3ZnlYeTZRaXlxb3JKQ3REa2trR2c0OHhWOFBrVDN1RTBUTzU0aDF1UmxJMjNMbjcvVmFzOUZnVlFmDQpQS1dLVmdwYjdFMWhtT2gwVFNmRDRwRnpETlh4SzhMaXYycWVxdTJTTlRGWVR1M2RBRWpNL3EyWERmdXJQN2tiDQprZ3FKRFBwd2g4RWRXMVg1VVAyVE9CVWxwQllDTndxUkFJQ1E3eWlzbW5xeFlZS3RKc21MK21IQ3JYM3hNRHVTDQp4NHJCVDUvcXVrdVc4MmwrbGZmU3ZTNGpsb0VhajJ2QmozSk1udy9lYlNucFplU3FENTFjOUZlOCtocU4rU3NoDQozTnc0QXVybE1RRG5vZy9STUF3QUR3KzBRUlIwNVdaWDhMVXllVTBVVVFLQmdRRHd6R2I0b25BWHlNeUNkbHB3DQpRRnFCR0pwQnlsWEJjSkZnMGpCd1JMV2tQL3VjWnNoZlFlbkFWbkRZZS9yQ0FnWWxSdFFOVFRvb3BFSjlGcGgyDQp6TkVzd1EwcnV4WjFrVm41U1hwS2dF4668KalUxT3dGa3R1WFlJcEtBNGk5dFoxT04zb1lqdVRtMUlzb2xWZXVTDQpqK3Mwd1o3ZDAyYTNXcDN1UXJ3TFUwVjdpUUtCZ1FEaEcrc2xsNDYveGxONldWWEs3RVpkOGFEcTlTNEU0aEQvDQpvTmUwS0dVcHhZYngyTnFWN1VLSEwzOE41eG5qNGllWGt2U1BnL0twVUpqUmtLN0xJMnZsNmlndUJkdW01VUR1DQp5dW4rL1dNcVdnb2p4anZBbmxsS2lIa0JRMTJ2UFRqcE9HSGIrY0RqVWxROGVnOThFOEJ0ZktUQjFkRlcxUnBlDQorMXY0aXR3RzR3S0JnQzJLeXpMZExnd2hpeVJsbEFkRTlKa1QrU0RXVHMvT0pZREZZQ25ycE5zU3l0aXl5OVRRDQpWNUJzQ04yNDNSMVNXcTAwTHlqdzRUNE1peEt6Y2xTTnVrWVhvUkVUU2xVa0QzdEpmVnFYMVUrTE1XY0c2T1dPDQpmZndaMWRHUWRkM2dPL3BLQ3Q2NHlvUkt0eWJHa0U1ZzcrQkRlbk9ENXhwb2hoUXBCUDJ6V3lIWkFvR0FURndqDQpGUHBuUXVoc3Nza1JFQ2U3NnV3bkVPeWdjcW1ZNkkzUC9kM2lDeHhsSFM3Wlh4Zy9oQW41aUdiSFlvVDV0ekh6DQpZYWQ1cmpPWDB5YklGRUpzdkc0RXVTL2xoYVNvdFJnQjdpeFg4aXJlMjZuSDVSd1IzL1dSVG50aWtTb3NYdmh3DQpRYVZqNS9pcWVHVlRVVnlGM3QzMEtZaDFYWVltVHVmbkY5VktzODhDZ1lCTTNVN2QwOU9MemhMZTh3cnp1dEpuDQpGdmRGWlhCRnhXRGwyNXdteElWTFdpM0kvaWg2QXN5YlRNNWMzbFpTTUVvcjJYeXJqNnFUNzZ6amQ2eGE2NlN3DQpXMEVyL2lEY3dWK244MHpuU3lPSW5lRThIVkh1SGtNYVpPeHkvVzdVWDFqL0RmUnJPZG1iS1NWN2NBV2dVTlBrDQpnd1V5RkM2OTRKTR41Vko0WXZEZU13PT0NCi0tLS0tRU5EIFBSSVZBVEUgS0VZLS0tLS0=\"),\n\t\t\tKeyUser:              pulumi.String(\"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\"),\n\t\t\tKeyTenant:            pulumi.String(\"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\"),\n\t\t\tKeyRegion:            pulumi.String(\"eu-frankfurt-1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementOracleCloudDataCenterServerOutput(ctx, checkpoint.GetManagementOracleCloudDataCenterServerOutputArgs{\n\t\t\tName: testOracleCloud.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOracleCloudDataCenterServer;\nimport com.pulumi.checkpoint.ManagementOracleCloudDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementOracleCloudDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testOracleCloud = new ManagementOracleCloudDataCenterServer(\"testOracleCloud\", ManagementOracleCloudDataCenterServerArgs.builder()\n            .name(\"MY-ORACLE-CLOUD\")\n            .authenticationMethod(\"key-authentication\")\n            .privateKey(\"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\")\n            .keyUser(\"ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\")\n            .keyTenant(\"ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\")\n            .keyRegion(\"eu-frankfurt-1\")\n            .build());\n\n        final var dataOracleCloudDataCenterServer = CheckpointFunctions.getManagementOracleCloudDataCenterServer(GetManagementOracleCloudDataCenterServerArgs.builder()\n            .name(testOracleCloud.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testOracleCloud:\n    type: checkpoint:ManagementOracleCloudDataCenterServer\n    properties:\n      name: MY-ORACLE-CLOUD\n      authenticationMethod: key-authentication\n      privateKey: 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\n      keyUser: ocid1.user.oc1..aaaaaaaad6n7rniiwgxehy6coo4ax2ti7pr5yr53cbdxdyp6sx6dhrttcz4a\n      keyTenant: ocid1.tenancy.oc1..aaaaaaaaft6hqvl367uh4e3pmdxnzmca6cxamwjfaag5lm7bnhuwu6ypajca\n      keyRegion: eu-frankfurt-1\nvariables:\n  dataOracleCloudDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementOracleCloudDataCenterServer\n      arguments:\n        name: ${testOracleCloud.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementOracleCloudDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementOracleCloudDataCenterServer.\n",
        "properties": {
          "automaticRefresh": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "dataCenterType": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "properties": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementOracleCloudDataCenterServerProperty:getManagementOracleCloudDataCenterServerProperty"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "automaticRefresh",
          "color",
          "comments",
          "dataCenterType",
          "id",
          "properties",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementOutboundInspectionCertificate:getManagementOutboundInspectionCertificate": {
      "description": "Use this data source to get information on an existing Check Point Outbound Inspection Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOutboundInspectionCertificate(\"example\", {\n    name: \"cert2\",\n    issuedBy: \"www.checkpoint.com\",\n    base64Password: \"bXlfcGFzc3dvcmQ=\",\n    validFrom: \"2021-04-17\",\n    validTo: \"2028-04-17\",\n});\nconst data = checkpoint.getManagementOutboundInspectionCertificateOutput({\n    uid: example.managementOutboundInspectionCertificateId,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOutboundInspectionCertificate(\"example\",\n    name=\"cert2\",\n    issued_by=\"www.checkpoint.com\",\n    base64_password=\"bXlfcGFzc3dvcmQ=\",\n    valid_from=\"2021-04-17\",\n    valid_to=\"2028-04-17\")\ndata = checkpoint.get_management_outbound_inspection_certificate_output(uid=example.management_outbound_inspection_certificate_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementOutboundInspectionCertificate(\"example\", new()\n    {\n        Name = \"cert2\",\n        IssuedBy = \"www.checkpoint.com\",\n        Base64Password = \"bXlfcGFzc3dvcmQ=\",\n        ValidFrom = \"2021-04-17\",\n        ValidTo = \"2028-04-17\",\n    });\n\n    var data = Checkpoint.GetManagementOutboundInspectionCertificate.Invoke(new()\n    {\n        Uid = example.ManagementOutboundInspectionCertificateId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementOutboundInspectionCertificate(ctx, \"example\", \u0026checkpoint.ManagementOutboundInspectionCertificateArgs{\n\t\t\tName:           pulumi.String(\"cert2\"),\n\t\t\tIssuedBy:       pulumi.String(\"www.checkpoint.com\"),\n\t\t\tBase64Password: pulumi.String(\"bXlfcGFzc3dvcmQ=\"),\n\t\t\tValidFrom:      pulumi.String(\"2021-04-17\"),\n\t\t\tValidTo:        pulumi.String(\"2028-04-17\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementOutboundInspectionCertificateOutput(ctx, checkpoint.GetManagementOutboundInspectionCertificateOutputArgs{\n\t\t\tUid: example.ManagementOutboundInspectionCertificateId,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOutboundInspectionCertificate;\nimport com.pulumi.checkpoint.ManagementOutboundInspectionCertificateArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementOutboundInspectionCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOutboundInspectionCertificate(\"example\", ManagementOutboundInspectionCertificateArgs.builder()\n            .name(\"cert2\")\n            .issuedBy(\"www.checkpoint.com\")\n            .base64Password(\"bXlfcGFzc3dvcmQ=\")\n            .validFrom(\"2021-04-17\")\n            .validTo(\"2028-04-17\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementOutboundInspectionCertificate(GetManagementOutboundInspectionCertificateArgs.builder()\n            .uid(example.managementOutboundInspectionCertificateId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOutboundInspectionCertificate\n    properties:\n      name: cert2\n      issuedBy: www.checkpoint.com\n      base64Password: bXlfcGFzc3dvcmQ=\n      validFrom: 2021-04-17\n      validTo: 2028-04-17\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementOutboundInspectionCertificate\n      arguments:\n        uid: ${example.managementOutboundInspectionCertificateId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementOutboundInspectionCertificate.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementOutboundInspectionCertificate.\n",
        "properties": {
          "base64Certificate": {
            "type": "string"
          },
          "base64PublicCertificate": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "isDefault": {
            "type": "boolean"
          },
          "issuedBy": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "validFrom": {
            "type": "string"
          },
          "validTo": {
            "type": "string"
          }
        },
        "required": [
          "base64Certificate",
          "base64PublicCertificate",
          "color",
          "comments",
          "id",
          "isDefault",
          "issuedBy",
          "tags",
          "validFrom",
          "validTo"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementOverrideCategorization:getManagementOverrideCategorization": {
      "description": "Use this data source to get information on an existing Check Point Override Categorization.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementOverrideCategorization(\"example\", {\n    url: \"newOverride\",\n    newPrimaryCategory: \"Botnets\",\n    risk: \"low\",\n});\nconst data = checkpoint.getManagementOverrideCategorizationOutput({\n    url: example.url,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementOverrideCategorization(\"example\",\n    url=\"newOverride\",\n    new_primary_category=\"Botnets\",\n    risk=\"low\")\ndata = checkpoint.get_management_override_categorization_output(url=example.url)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementOverrideCategorization(\"example\", new()\n    {\n        Url = \"newOverride\",\n        NewPrimaryCategory = \"Botnets\",\n        Risk = \"low\",\n    });\n\n    var data = Checkpoint.GetManagementOverrideCategorization.Invoke(new()\n    {\n        Url = example.Url,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementOverrideCategorization(ctx, \"example\", \u0026checkpoint.ManagementOverrideCategorizationArgs{\n\t\t\tUrl:                pulumi.String(\"newOverride\"),\n\t\t\tNewPrimaryCategory: pulumi.String(\"Botnets\"),\n\t\t\tRisk:               pulumi.String(\"low\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementOverrideCategorizationOutput(ctx, checkpoint.GetManagementOverrideCategorizationOutputArgs{\n\t\t\tUrl: example.Url,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementOverrideCategorization;\nimport com.pulumi.checkpoint.ManagementOverrideCategorizationArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementOverrideCategorizationArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementOverrideCategorization(\"example\", ManagementOverrideCategorizationArgs.builder()\n            .url(\"newOverride\")\n            .newPrimaryCategory(\"Botnets\")\n            .risk(\"low\")\n            .build());\n\n        final var data = CheckpointFunctions.getManagementOverrideCategorization(GetManagementOverrideCategorizationArgs.builder()\n            .url(example.url())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementOverrideCategorization\n    properties:\n      url: newOverride\n      newPrimaryCategory: Botnets\n      risk: low\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementOverrideCategorization\n      arguments:\n        url: ${example.url}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementOverrideCategorization.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          },
          "url": {
            "type": "string",
            "description": "The URL for which we want to update the category and risk definitions, the URL and the object name are the same for Override Categorization.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementOverrideCategorization.\n",
        "properties": {
          "additionalCategories": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "newPrimaryCategory": {
            "type": "string"
          },
          "risk": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "url": {
            "type": "string"
          },
          "urlDefinedAsRegularExpression": {
            "type": "boolean"
          }
        },
        "required": [
          "additionalCategories",
          "color",
          "comments",
          "id",
          "newPrimaryCategory",
          "risk",
          "tags",
          "urlDefinedAsRegularExpression"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementPasscodeProfile:getManagementPasscodeProfile": {
      "description": "Use this data source to get information on an existing Check Point Passcode Profile.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementPasscodeProfile(\"example\", {\n    name: \"New App Passcode Policy\",\n    allowSimplePasscode: false,\n    minPasscodeLength: 10,\n    requireAlphanumericPasscode: true,\n    minPasscodeComplexCharacters: 3,\n    forcePasscodeExpiration: false,\n    passcodeExpirationPeriod: 190,\n    enableInactivityTimeLock: true,\n    maxInactivityTimeLock: 10,\n    enablePasscodeFailedAttempts: false,\n});\nconst data = checkpoint.getManagementPasscodeProfile({\n    uid: test.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementPasscodeProfile(\"example\",\n    name=\"New App Passcode Policy\",\n    allow_simple_passcode=False,\n    min_passcode_length=10,\n    require_alphanumeric_passcode=True,\n    min_passcode_complex_characters=3,\n    force_passcode_expiration=False,\n    passcode_expiration_period=190,\n    enable_inactivity_time_lock=True,\n    max_inactivity_time_lock=10,\n    enable_passcode_failed_attempts=False)\ndata = checkpoint.get_management_passcode_profile(uid=test[\"id\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementPasscodeProfile(\"example\", new()\n    {\n        Name = \"New App Passcode Policy\",\n        AllowSimplePasscode = false,\n        MinPasscodeLength = 10,\n        RequireAlphanumericPasscode = true,\n        MinPasscodeComplexCharacters = 3,\n        ForcePasscodeExpiration = false,\n        PasscodeExpirationPeriod = 190,\n        EnableInactivityTimeLock = true,\n        MaxInactivityTimeLock = 10,\n        EnablePasscodeFailedAttempts = false,\n    });\n\n    var data = Checkpoint.GetManagementPasscodeProfile.Invoke(new()\n    {\n        Uid = test.Id,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementPasscodeProfile(ctx, \"example\", \u0026checkpoint.ManagementPasscodeProfileArgs{\n\t\t\tName:                         pulumi.String(\"New App Passcode Policy\"),\n\t\t\tAllowSimplePasscode:          pulumi.Bool(false),\n\t\t\tMinPasscodeLength:            pulumi.Float64(10),\n\t\t\tRequireAlphanumericPasscode:  pulumi.Bool(true),\n\t\t\tMinPasscodeComplexCharacters: pulumi.Float64(3),\n\t\t\tForcePasscodeExpiration:      pulumi.Bool(false),\n\t\t\tPasscodeExpirationPeriod:     pulumi.Float64(190),\n\t\t\tEnableInactivityTimeLock:     pulumi.Bool(true),\n\t\t\tMaxInactivityTimeLock:        pulumi.Float64(10),\n\t\t\tEnablePasscodeFailedAttempts: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementPasscodeProfile(ctx, \u0026checkpoint.LookupManagementPasscodeProfileArgs{\n\t\t\tUid: pulumi.StringRef(test.Id),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementPasscodeProfile;\nimport com.pulumi.checkpoint.ManagementPasscodeProfileArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementPasscodeProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementPasscodeProfile(\"example\", ManagementPasscodeProfileArgs.builder()\n            .name(\"New App Passcode Policy\")\n            .allowSimplePasscode(false)\n            .minPasscodeLength(10.0)\n            .requireAlphanumericPasscode(true)\n            .minPasscodeComplexCharacters(3.0)\n            .forcePasscodeExpiration(false)\n            .passcodeExpirationPeriod(190.0)\n            .enableInactivityTimeLock(true)\n            .maxInactivityTimeLock(10.0)\n            .enablePasscodeFailedAttempts(false)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementPasscodeProfile(GetManagementPasscodeProfileArgs.builder()\n            .uid(test.id())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementPasscodeProfile\n    properties:\n      name: New App Passcode Policy\n      allowSimplePasscode: false\n      minPasscodeLength: 10\n      requireAlphanumericPasscode: true\n      minPasscodeComplexCharacters: 3\n      forcePasscodeExpiration: false\n      passcodeExpirationPeriod: 190\n      enableInactivityTimeLock: true\n      maxInactivityTimeLock: 10\n      enablePasscodeFailedAttempts: false\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementPasscodeProfile\n      arguments:\n        uid: ${test.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementPasscodeProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementPasscodeProfile.\n",
        "properties": {
          "allowSimplePasscode": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "enableInactivityTimeLock": {
            "type": "boolean"
          },
          "enablePasscodeFailedAttempts": {
            "type": "boolean"
          },
          "enablePasscodeHistory": {
            "type": "boolean"
          },
          "forcePasscodeExpiration": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "maxInactivityTimeLock": {
            "type": "number"
          },
          "maxPasscodeFailedAttempts": {
            "type": "number"
          },
          "minPasscodeComplexCharacters": {
            "type": "number"
          },
          "minPasscodeLength": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "passcodeExpirationPeriod": {
            "type": "number"
          },
          "passcodeHistory": {
            "type": "number"
          },
          "requireAlphanumericPasscode": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowSimplePasscode",
          "color",
          "comments",
          "enableInactivityTimeLock",
          "enablePasscodeFailedAttempts",
          "enablePasscodeHistory",
          "forcePasscodeExpiration",
          "id",
          "maxInactivityTimeLock",
          "maxPasscodeFailedAttempts",
          "minPasscodeComplexCharacters",
          "minPasscodeLength",
          "passcodeExpirationPeriod",
          "passcodeHistory",
          "requireAlphanumericPasscode",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementPolicySettings:getManagementPolicySettings": {
      "description": "Use this data source to get information on an existing Check Point Policy Settings.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataPolicySettings = checkpoint.getManagementPolicySettings({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_policy_settings = checkpoint.get_management_policy_settings()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataPolicySettings = Checkpoint.GetManagementPolicySettings.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementPolicySettings(ctx, \u0026checkpoint.GetManagementPolicySettingsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementPolicySettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataPolicySettings = CheckpointFunctions.getManagementPolicySettings(GetManagementPolicySettingsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataPolicySettings:\n    fn::invoke:\n      function: checkpoint:getManagementPolicySettings\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementPolicySettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementPolicySettings.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "lastInCell": {
            "type": "string"
          },
          "noneObjectBehavior": {
            "type": "string"
          },
          "securityAccessDefaults": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          }
        },
        "required": [
          "id",
          "lastInCell",
          "noneObjectBehavior",
          "securityAccessDefaults"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementProvisioningProfile:getManagementProvisioningProfile": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementProvisioningProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementProvisioningProfile.\n",
        "properties": {
          "configurationScript": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "dns": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "domainName": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "groups": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementProvisioningProfileGroup:getManagementProvisioningProfileGroup"
            },
            "type": "array"
          },
          "hosts": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementProvisioningProfileHost:getManagementProvisioningProfileHost"
            },
            "type": "array"
          },
          "hotspots": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementProvisioningProfileHotspot:getManagementProvisioningProfileHotspot"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "radii": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementProvisioningProfileRadius:getManagementProvisioningProfileRadius"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "configurationScript",
          "dns",
          "domainName",
          "groups",
          "hosts",
          "hotspots",
          "id",
          "radii",
          "tags",
          "type"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementRadiusGroup:getManagementRadiusGroup": {
      "description": "Use this data source to get information on an existing Check Point Radius Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst host = new checkpoint.ManagementHost(\"host\", {\n    name: \"My Host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst radiusServer = new checkpoint.ManagementRadiusServer(\"radius_server\", {\n    name: \"New Radius Server\",\n    server: host.name,\n    sharedSecret: \"123\",\n});\nconst radiusGroup = new checkpoint.ManagementRadiusGroup(\"radius_group\", {\n    name: \"New Radius Group\",\n    members: [radiusServer.name],\n});\nconst dataRadiusGroup = checkpoint.getManagementRadiusGroupOutput({\n    name: radiusGroup.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhost = checkpoint.ManagementHost(\"host\",\n    name=\"My Host\",\n    ipv4_address=\"1.2.3.4\")\nradius_server = checkpoint.ManagementRadiusServer(\"radius_server\",\n    name=\"New Radius Server\",\n    server=host.name,\n    shared_secret=\"123\")\nradius_group = checkpoint.ManagementRadiusGroup(\"radius_group\",\n    name=\"New Radius Group\",\n    members=[radius_server.name])\ndata_radius_group = checkpoint.get_management_radius_group_output(name=radius_group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var host = new Checkpoint.ManagementHost(\"host\", new()\n    {\n        Name = \"My Host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var radiusServer = new Checkpoint.ManagementRadiusServer(\"radius_server\", new()\n    {\n        Name = \"New Radius Server\",\n        Server = host.Name,\n        SharedSecret = \"123\",\n    });\n\n    var radiusGroup = new Checkpoint.ManagementRadiusGroup(\"radius_group\", new()\n    {\n        Name = \"New Radius Group\",\n        Members = new[]\n        {\n            radiusServer.Name,\n        },\n    });\n\n    var dataRadiusGroup = Checkpoint.GetManagementRadiusGroup.Invoke(new()\n    {\n        Name = radiusGroup.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thost, err := checkpoint.NewManagementHost(ctx, \"host\", \u0026checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"My Host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tradiusServer, err := checkpoint.NewManagementRadiusServer(ctx, \"radius_server\", \u0026checkpoint.ManagementRadiusServerArgs{\n\t\t\tName:         pulumi.String(\"New Radius Server\"),\n\t\t\tServer:       host.Name,\n\t\t\tSharedSecret: pulumi.String(\"123\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tradiusGroup, err := checkpoint.NewManagementRadiusGroup(ctx, \"radius_group\", \u0026checkpoint.ManagementRadiusGroupArgs{\n\t\t\tName: pulumi.String(\"New Radius Group\"),\n\t\t\tMembers: pulumi.StringArray{\n\t\t\t\tradiusServer.Name,\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementRadiusGroupOutput(ctx, checkpoint.GetManagementRadiusGroupOutputArgs{\n\t\t\tName: radiusGroup.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.ManagementRadiusServer;\nimport com.pulumi.checkpoint.ManagementRadiusServerArgs;\nimport com.pulumi.checkpoint.ManagementRadiusGroup;\nimport com.pulumi.checkpoint.ManagementRadiusGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementRadiusGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var host = new ManagementHost(\"host\", ManagementHostArgs.builder()\n            .name(\"My Host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        var radiusServer = new ManagementRadiusServer(\"radiusServer\", ManagementRadiusServerArgs.builder()\n            .name(\"New Radius Server\")\n            .server(host.name())\n            .sharedSecret(\"123\")\n            .build());\n\n        var radiusGroup = new ManagementRadiusGroup(\"radiusGroup\", ManagementRadiusGroupArgs.builder()\n            .name(\"New Radius Group\")\n            .members(radiusServer.name())\n            .build());\n\n        final var dataRadiusGroup = CheckpointFunctions.getManagementRadiusGroup(GetManagementRadiusGroupArgs.builder()\n            .name(radiusGroup.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  host:\n    type: checkpoint:ManagementHost\n    properties:\n      name: My Host\n      ipv4Address: 1.2.3.4\n  radiusServer:\n    type: checkpoint:ManagementRadiusServer\n    name: radius_server\n    properties:\n      name: New Radius Server\n      server: ${host.name}\n      sharedSecret: '123'\n  radiusGroup:\n    type: checkpoint:ManagementRadiusGroup\n    name: radius_group\n    properties:\n      name: New Radius Group\n      members:\n        - ${radiusServer.name}\nvariables:\n  dataRadiusGroup:\n    fn::invoke:\n      function: checkpoint:getManagementRadiusGroup\n      arguments:\n        name: ${radiusGroup.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementRadiusGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementRadiusGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementRadiusServer:getManagementRadiusServer": {
      "description": "Use this data source to get information on an existing Check Point Radius Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst host = new checkpoint.ManagementHost(\"host\", {\n    name: \"My Host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst radiusServer = new checkpoint.ManagementRadiusServer(\"radius_server\", {\n    name: \"New Radius Server\",\n    server: host.name,\n    sharedSecret: \"123\",\n});\nconst dataRadiusServer = checkpoint.getManagementRadiusServerOutput({\n    name: radiusServer.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhost = checkpoint.ManagementHost(\"host\",\n    name=\"My Host\",\n    ipv4_address=\"1.2.3.4\")\nradius_server = checkpoint.ManagementRadiusServer(\"radius_server\",\n    name=\"New Radius Server\",\n    server=host.name,\n    shared_secret=\"123\")\ndata_radius_server = checkpoint.get_management_radius_server_output(name=radius_server.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var host = new Checkpoint.ManagementHost(\"host\", new()\n    {\n        Name = \"My Host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var radiusServer = new Checkpoint.ManagementRadiusServer(\"radius_server\", new()\n    {\n        Name = \"New Radius Server\",\n        Server = host.Name,\n        SharedSecret = \"123\",\n    });\n\n    var dataRadiusServer = Checkpoint.GetManagementRadiusServer.Invoke(new()\n    {\n        Name = radiusServer.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\thost, err := checkpoint.NewManagementHost(ctx, \"host\", \u0026checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"My Host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tradiusServer, err := checkpoint.NewManagementRadiusServer(ctx, \"radius_server\", \u0026checkpoint.ManagementRadiusServerArgs{\n\t\t\tName:         pulumi.String(\"New Radius Server\"),\n\t\t\tServer:       host.Name,\n\t\t\tSharedSecret: pulumi.String(\"123\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementRadiusServerOutput(ctx, checkpoint.GetManagementRadiusServerOutputArgs{\n\t\t\tName: radiusServer.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.ManagementRadiusServer;\nimport com.pulumi.checkpoint.ManagementRadiusServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementRadiusServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var host = new ManagementHost(\"host\", ManagementHostArgs.builder()\n            .name(\"My Host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        var radiusServer = new ManagementRadiusServer(\"radiusServer\", ManagementRadiusServerArgs.builder()\n            .name(\"New Radius Server\")\n            .server(host.name())\n            .sharedSecret(\"123\")\n            .build());\n\n        final var dataRadiusServer = CheckpointFunctions.getManagementRadiusServer(GetManagementRadiusServerArgs.builder()\n            .name(radiusServer.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  host:\n    type: checkpoint:ManagementHost\n    properties:\n      name: My Host\n      ipv4Address: 1.2.3.4\n  radiusServer:\n    type: checkpoint:ManagementRadiusServer\n    name: radius_server\n    properties:\n      name: New Radius Server\n      server: ${host.name}\n      sharedSecret: '123'\nvariables:\n  dataRadiusServer:\n    fn::invoke:\n      function: checkpoint:getManagementRadiusServer\n      arguments:\n        name: ${radiusServer.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementRadiusServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementRadiusServer.\n",
        "properties": {
          "accounting": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "priority": {
            "type": "number"
          },
          "protocol": {
            "type": "string"
          },
          "server": {
            "type": "string"
          },
          "service": {
            "type": "string"
          },
          "sharedSecret": {
            "secret": true,
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "accounting",
          "color",
          "comments",
          "id",
          "priority",
          "protocol",
          "server",
          "service",
          "sharedSecret",
          "tags",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementRepositoryPackage:getManagementRepositoryPackage": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementRepositoryPackage.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "The name of the repository package.\n"
          }
        },
        "type": "object",
        "required": [
          "name"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementRepositoryPackage.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "taskId": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "name",
          "taskId"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementRepositoryScript:getManagementRepositoryScript": {
      "description": "Use this data source to get information on an existing Check Point Repository Script.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementRepositoryScript(\"example\", {\n    name: \"New Script 1\",\n    scriptBody: \"ls -l /\",\n});\nconst dataRepositoryScript = checkpoint.getManagementRepositoryScriptOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementRepositoryScript(\"example\",\n    name=\"New Script 1\",\n    script_body=\"ls -l /\")\ndata_repository_script = checkpoint.get_management_repository_script_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementRepositoryScript(\"example\", new()\n    {\n        Name = \"New Script 1\",\n        ScriptBody = \"ls -l /\",\n    });\n\n    var dataRepositoryScript = Checkpoint.GetManagementRepositoryScript.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementRepositoryScript(ctx, \"example\", \u0026checkpoint.ManagementRepositoryScriptArgs{\n\t\t\tName:       pulumi.String(\"New Script 1\"),\n\t\t\tScriptBody: pulumi.String(\"ls -l /\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementRepositoryScriptOutput(ctx, checkpoint.GetManagementRepositoryScriptOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementRepositoryScript;\nimport com.pulumi.checkpoint.ManagementRepositoryScriptArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementRepositoryScriptArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementRepositoryScript(\"example\", ManagementRepositoryScriptArgs.builder()\n            .name(\"New Script 1\")\n            .scriptBody(\"ls -l /\")\n            .build());\n\n        final var dataRepositoryScript = CheckpointFunctions.getManagementRepositoryScript(GetManagementRepositoryScriptArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementRepositoryScript\n    properties:\n      name: New Script 1\n      scriptBody: ls -l /\nvariables:\n  dataRepositoryScript:\n    fn::invoke:\n      function: checkpoint:getManagementRepositoryScript\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementRepositoryScript.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementRepositoryScript.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "scriptBody": {
            "type": "string"
          },
          "scriptBodyBase64": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "scriptBody",
          "scriptBodyBase64",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceCifs:getManagementResourceCifs": {
      "description": "Use this data source to get information on an existing Check Point Resource Cifs.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst cifs = new checkpoint.ManagementResourceCifs(\"cifs\", {\n    name: \"newCifsResource\",\n    allowedDiskAndPrintShares: [\n        {\n            serverName: \"server1\",\n            shareName: \"share1\",\n        },\n        {\n            serverName: \"server2\",\n            shareName: \"share2\",\n        },\n    ],\n    logMappedShares: true,\n    logAccessViolation: true,\n    blockRemoteRegistryAccess: false,\n});\nconst data = checkpoint.getManagementResourceCifs({\n    uid: test.id,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ncifs = checkpoint.ManagementResourceCifs(\"cifs\",\n    name=\"newCifsResource\",\n    allowed_disk_and_print_shares=[\n        {\n            \"server_name\": \"server1\",\n            \"share_name\": \"share1\",\n        },\n        {\n            \"server_name\": \"server2\",\n            \"share_name\": \"share2\",\n        },\n    ],\n    log_mapped_shares=True,\n    log_access_violation=True,\n    block_remote_registry_access=False)\ndata = checkpoint.get_management_resource_cifs(uid=test[\"id\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var cifs = new Checkpoint.ManagementResourceCifs(\"cifs\", new()\n    {\n        Name = \"newCifsResource\",\n        AllowedDiskAndPrintShares = new[]\n        {\n            new Checkpoint.Inputs.ManagementResourceCifsAllowedDiskAndPrintShareArgs\n            {\n                ServerName = \"server1\",\n                ShareName = \"share1\",\n            },\n            new Checkpoint.Inputs.ManagementResourceCifsAllowedDiskAndPrintShareArgs\n            {\n                ServerName = \"server2\",\n                ShareName = \"share2\",\n            },\n        },\n        LogMappedShares = true,\n        LogAccessViolation = true,\n        BlockRemoteRegistryAccess = false,\n    });\n\n    var data = Checkpoint.GetManagementResourceCifs.Invoke(new()\n    {\n        Uid = test.Id,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceCifs(ctx, \"cifs\", \u0026checkpoint.ManagementResourceCifsArgs{\n\t\t\tName: pulumi.String(\"newCifsResource\"),\n\t\t\tAllowedDiskAndPrintShares: checkpoint.ManagementResourceCifsAllowedDiskAndPrintShareArray{\n\t\t\t\t\u0026checkpoint.ManagementResourceCifsAllowedDiskAndPrintShareArgs{\n\t\t\t\t\tServerName: pulumi.String(\"server1\"),\n\t\t\t\t\tShareName:  pulumi.String(\"share1\"),\n\t\t\t\t},\n\t\t\t\t\u0026checkpoint.ManagementResourceCifsAllowedDiskAndPrintShareArgs{\n\t\t\t\t\tServerName: pulumi.String(\"server2\"),\n\t\t\t\t\tShareName:  pulumi.String(\"share2\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLogMappedShares:           pulumi.Bool(true),\n\t\t\tLogAccessViolation:        pulumi.Bool(true),\n\t\t\tBlockRemoteRegistryAccess: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementResourceCifs(ctx, \u0026checkpoint.LookupManagementResourceCifsArgs{\n\t\t\tUid: pulumi.StringRef(test.Id),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceCifs;\nimport com.pulumi.checkpoint.ManagementResourceCifsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceCifsAllowedDiskAndPrintShareArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementResourceCifsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var cifs = new ManagementResourceCifs(\"cifs\", ManagementResourceCifsArgs.builder()\n            .name(\"newCifsResource\")\n            .allowedDiskAndPrintShares(            \n                ManagementResourceCifsAllowedDiskAndPrintShareArgs.builder()\n                    .serverName(\"server1\")\n                    .shareName(\"share1\")\n                    .build(),\n                ManagementResourceCifsAllowedDiskAndPrintShareArgs.builder()\n                    .serverName(\"server2\")\n                    .shareName(\"share2\")\n                    .build())\n            .logMappedShares(true)\n            .logAccessViolation(true)\n            .blockRemoteRegistryAccess(false)\n            .build());\n\n        final var data = CheckpointFunctions.getManagementResourceCifs(GetManagementResourceCifsArgs.builder()\n            .uid(test.id())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  cifs:\n    type: checkpoint:ManagementResourceCifs\n    properties:\n      name: newCifsResource\n      allowedDiskAndPrintShares:\n        - serverName: server1\n          shareName: share1\n        - serverName: server2\n          shareName: share2\n      logMappedShares: true\n      logAccessViolation: true\n      blockRemoteRegistryAccess: false\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementResourceCifs\n      arguments:\n        uid: ${test.id}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceCifs.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceCifs.\n",
        "properties": {
          "allowedDiskAndPrintShares": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceCifsAllowedDiskAndPrintShare:getManagementResourceCifsAllowedDiskAndPrintShare"
            },
            "type": "array"
          },
          "blockRemoteRegistryAccess": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "logAccessViolation": {
            "type": "boolean"
          },
          "logMappedShares": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowedDiskAndPrintShares",
          "blockRemoteRegistryAccess",
          "color",
          "comments",
          "id",
          "logAccessViolation",
          "logMappedShares",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceFtp:getManagementResourceFtp": {
      "description": "Use this data source to get information on an existing Check Point Resource Ftp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementResourceFtp(\"example\", {\n    name: \"newFtpResource\",\n    resourceMatchingMethod: \"get_and_put\",\n    exceptionTrack: \"exception log\",\n    resourcesPath: \"path\",\n    cvp: {\n        allowedToModifyContent: true,\n        enableCvp: false,\n        replyOrder: \"return_data_before_content_is_approved\",\n        server: \"serverName\",\n    },\n});\nconst data = checkpoint.getManagementResourceFtpOutput({\n    uid: example.managementResourceFtpId,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementResourceFtp(\"example\",\n    name=\"newFtpResource\",\n    resource_matching_method=\"get_and_put\",\n    exception_track=\"exception log\",\n    resources_path=\"path\",\n    cvp={\n        \"allowed_to_modify_content\": True,\n        \"enable_cvp\": False,\n        \"reply_order\": \"return_data_before_content_is_approved\",\n        \"server\": \"serverName\",\n    })\ndata = checkpoint.get_management_resource_ftp_output(uid=example.management_resource_ftp_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementResourceFtp(\"example\", new()\n    {\n        Name = \"newFtpResource\",\n        ResourceMatchingMethod = \"get_and_put\",\n        ExceptionTrack = \"exception log\",\n        ResourcesPath = \"path\",\n        Cvp = new Checkpoint.Inputs.ManagementResourceFtpCvpArgs\n        {\n            AllowedToModifyContent = true,\n            EnableCvp = false,\n            ReplyOrder = \"return_data_before_content_is_approved\",\n            Server = \"serverName\",\n        },\n    });\n\n    var data = Checkpoint.GetManagementResourceFtp.Invoke(new()\n    {\n        Uid = example.ManagementResourceFtpId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementResourceFtp(ctx, \"example\", \u0026checkpoint.ManagementResourceFtpArgs{\n\t\t\tName:                   pulumi.String(\"newFtpResource\"),\n\t\t\tResourceMatchingMethod: pulumi.String(\"get_and_put\"),\n\t\t\tExceptionTrack:         pulumi.String(\"exception log\"),\n\t\t\tResourcesPath:          pulumi.String(\"path\"),\n\t\t\tCvp: \u0026checkpoint.ManagementResourceFtpCvpArgs{\n\t\t\t\tAllowedToModifyContent: pulumi.Bool(true),\n\t\t\t\tEnableCvp:              pulumi.Bool(false),\n\t\t\t\tReplyOrder:             pulumi.String(\"return_data_before_content_is_approved\"),\n\t\t\t\tServer:                 pulumi.String(\"serverName\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementResourceFtpOutput(ctx, checkpoint.GetManagementResourceFtpOutputArgs{\n\t\t\tUid: example.ManagementResourceFtpId,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceFtp;\nimport com.pulumi.checkpoint.ManagementResourceFtpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceFtpCvpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementResourceFtpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementResourceFtp(\"example\", ManagementResourceFtpArgs.builder()\n            .name(\"newFtpResource\")\n            .resourceMatchingMethod(\"get_and_put\")\n            .exceptionTrack(\"exception log\")\n            .resourcesPath(\"path\")\n            .cvp(ManagementResourceFtpCvpArgs.builder()\n                .allowedToModifyContent(true)\n                .enableCvp(false)\n                .replyOrder(\"return_data_before_content_is_approved\")\n                .server(\"serverName\")\n                .build())\n            .build());\n\n        final var data = CheckpointFunctions.getManagementResourceFtp(GetManagementResourceFtpArgs.builder()\n            .uid(example.managementResourceFtpId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementResourceFtp\n    properties:\n      name: newFtpResource\n      resourceMatchingMethod: get_and_put\n      exceptionTrack: exception log\n      resourcesPath: path\n      cvp:\n        allowedToModifyContent: true\n        enableCvp: false\n        replyOrder: return_data_before_content_is_approved\n        server: serverName\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementResourceFtp\n      arguments:\n        uid: ${example.managementResourceFtpId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceFtp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceFtp.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "cvps": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceFtpCvp:getManagementResourceFtpCvp"
            },
            "type": "array"
          },
          "exceptionTrack": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "resourceMatchingMethod": {
            "type": "string"
          },
          "resourcesPath": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "cvps",
          "exceptionTrack",
          "id",
          "resourceMatchingMethod",
          "resourcesPath",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceMms:getManagementResourceMms": {
      "description": "Use this data source to get information on an existing MMS resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataMms = checkpoint.getManagementResourceMms({\n    name: \"resource_mms_example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_mms = checkpoint.get_management_resource_mms(name=\"resource_mms_example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataMms = Checkpoint.GetManagementResourceMms.Invoke(new()\n    {\n        Name = \"resource_mms_example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementResourceMms(ctx, \u0026checkpoint.LookupManagementResourceMmsArgs{\n\t\t\tName: pulumi.StringRef(\"resource_mms_example\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementResourceMmsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataMms = CheckpointFunctions.getManagementResourceMms(GetManagementResourceMmsArgs.builder()\n            .name(\"resource_mms_example\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataMms:\n    fn::invoke:\n      function: checkpoint:getManagementResourceMms\n      arguments:\n        name: resource_mms_example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceMms.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceMms.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "track": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "action",
          "color",
          "comments",
          "id",
          "tags",
          "track"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceSmtp:getManagementResourceSmtp": {
      "description": "Use this data source to get information on an existing Check Point Resource Smtp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst smtp = new checkpoint.ManagementResourceSmtp(\"smtp\", {\n    name: \"newSmtpResource\",\n    mailDeliveryServer: \"deliverServer\",\n    exceptionTrack: \"exception log\",\n    match: {\n        sender: \"expr1\",\n        recipient: \"expr2\",\n    },\n    action1: {\n        sender: {\n            original: \"one\",\n            rewritten: \"two\",\n        },\n        recipient: {\n            original: \"three\",\n            rewritten: \"four\",\n        },\n        customField: {\n            field: \"field\",\n            original: \"five\",\n            rewritten: \"six\",\n        },\n    },\n    cvp: {\n        allowedToModifyContent: true,\n        enableCvp: false,\n        replyOrder: \"return_data_after_content_is_approved\",\n        server: \"serverName\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsmtp = checkpoint.ManagementResourceSmtp(\"smtp\",\n    name=\"newSmtpResource\",\n    mail_delivery_server=\"deliverServer\",\n    exception_track=\"exception log\",\n    match={\n        \"sender\": \"expr1\",\n        \"recipient\": \"expr2\",\n    },\n    action1={\n        \"sender\": {\n            \"original\": \"one\",\n            \"rewritten\": \"two\",\n        },\n        \"recipient\": {\n            \"original\": \"three\",\n            \"rewritten\": \"four\",\n        },\n        \"custom_field\": {\n            \"field\": \"field\",\n            \"original\": \"five\",\n            \"rewritten\": \"six\",\n        },\n    },\n    cvp={\n        \"allowed_to_modify_content\": True,\n        \"enable_cvp\": False,\n        \"reply_order\": \"return_data_after_content_is_approved\",\n        \"server\": \"serverName\",\n    })\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var smtp = new Checkpoint.ManagementResourceSmtp(\"smtp\", new()\n    {\n        Name = \"newSmtpResource\",\n        MailDeliveryServer = \"deliverServer\",\n        ExceptionTrack = \"exception log\",\n        Match = \n        {\n            { \"sender\", \"expr1\" },\n            { \"recipient\", \"expr2\" },\n        },\n        Action1 = new Checkpoint.Inputs.ManagementResourceSmtpAction1Args\n        {\n            Sender = new Checkpoint.Inputs.ManagementResourceSmtpAction1SenderArgs\n            {\n                Original = \"one\",\n                Rewritten = \"two\",\n            },\n            Recipient = new Checkpoint.Inputs.ManagementResourceSmtpAction1RecipientArgs\n            {\n                Original = \"three\",\n                Rewritten = \"four\",\n            },\n            CustomField = new Checkpoint.Inputs.ManagementResourceSmtpAction1CustomFieldArgs\n            {\n                Field = \"field\",\n                Original = \"five\",\n                Rewritten = \"six\",\n            },\n        },\n        Cvp = new Checkpoint.Inputs.ManagementResourceSmtpCvpArgs\n        {\n            AllowedToModifyContent = true,\n            EnableCvp = false,\n            ReplyOrder = \"return_data_after_content_is_approved\",\n            Server = \"serverName\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementResourceSmtp(ctx, \"smtp\", \u0026checkpoint.ManagementResourceSmtpArgs{\n\t\t\tName:               pulumi.String(\"newSmtpResource\"),\n\t\t\tMailDeliveryServer: pulumi.String(\"deliverServer\"),\n\t\t\tExceptionTrack:     pulumi.String(\"exception log\"),\n\t\t\tMatch: pulumi.StringMap{\n\t\t\t\t\"sender\":    pulumi.String(\"expr1\"),\n\t\t\t\t\"recipient\": pulumi.String(\"expr2\"),\n\t\t\t},\n\t\t\tAction1: \u0026checkpoint.ManagementResourceSmtpAction1Args{\n\t\t\t\tSender: \u0026checkpoint.ManagementResourceSmtpAction1SenderArgs{\n\t\t\t\t\tOriginal:  pulumi.String(\"one\"),\n\t\t\t\t\tRewritten: pulumi.String(\"two\"),\n\t\t\t\t},\n\t\t\t\tRecipient: \u0026checkpoint.ManagementResourceSmtpAction1RecipientArgs{\n\t\t\t\t\tOriginal:  pulumi.String(\"three\"),\n\t\t\t\t\tRewritten: pulumi.String(\"four\"),\n\t\t\t\t},\n\t\t\t\tCustomField: \u0026checkpoint.ManagementResourceSmtpAction1CustomFieldArgs{\n\t\t\t\t\tField:     pulumi.String(\"field\"),\n\t\t\t\t\tOriginal:  pulumi.String(\"five\"),\n\t\t\t\t\tRewritten: pulumi.String(\"six\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tCvp: \u0026checkpoint.ManagementResourceSmtpCvpArgs{\n\t\t\t\tAllowedToModifyContent: pulumi.Bool(true),\n\t\t\t\tEnableCvp:              pulumi.Bool(false),\n\t\t\t\tReplyOrder:             pulumi.String(\"return_data_after_content_is_approved\"),\n\t\t\t\tServer:                 pulumi.String(\"serverName\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceSmtp;\nimport com.pulumi.checkpoint.ManagementResourceSmtpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1Args;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1SenderArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1RecipientArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpAction1CustomFieldArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceSmtpCvpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var smtp = new ManagementResourceSmtp(\"smtp\", ManagementResourceSmtpArgs.builder()\n            .name(\"newSmtpResource\")\n            .mailDeliveryServer(\"deliverServer\")\n            .exceptionTrack(\"exception log\")\n            .match(Map.ofEntries(\n                Map.entry(\"sender\", \"expr1\"),\n                Map.entry(\"recipient\", \"expr2\")\n            ))\n            .action1(ManagementResourceSmtpAction1Args.builder()\n                .sender(ManagementResourceSmtpAction1SenderArgs.builder()\n                    .original(\"one\")\n                    .rewritten(\"two\")\n                    .build())\n                .recipient(ManagementResourceSmtpAction1RecipientArgs.builder()\n                    .original(\"three\")\n                    .rewritten(\"four\")\n                    .build())\n                .customField(ManagementResourceSmtpAction1CustomFieldArgs.builder()\n                    .field(\"field\")\n                    .original(\"five\")\n                    .rewritten(\"six\")\n                    .build())\n                .build())\n            .cvp(ManagementResourceSmtpCvpArgs.builder()\n                .allowedToModifyContent(true)\n                .enableCvp(false)\n                .replyOrder(\"return_data_after_content_is_approved\")\n                .server(\"serverName\")\n                .build())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  smtp:\n    type: checkpoint:ManagementResourceSmtp\n    properties:\n      name: newSmtpResource\n      mailDeliveryServer: deliverServer\n      exceptionTrack: exception log\n      match:\n        sender: expr1\n        recipient: expr2\n      action1:\n        sender:\n          original: one\n          rewritten: two\n        recipient:\n          original: three\n          rewritten: four\n        customField:\n          field: field\n          original: five\n          rewritten: six\n      cvp:\n        allowedToModifyContent: true\n        enableCvp: false\n        replyOrder: return_data_after_content_is_approved\n        server: serverName\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceSmtp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceSmtp.\n",
        "properties": {
          "action1s": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceSmtpAction1:getManagementResourceSmtpAction1"
            },
            "type": "array"
          },
          "action2s": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceSmtpAction2:getManagementResourceSmtpAction2"
            },
            "type": "array"
          },
          "checkRulebaseWithNewDestination": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "cvps": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceSmtpCvp:getManagementResourceSmtpCvp"
            },
            "type": "array"
          },
          "deliverMessagesUsingDnsMxRecords": {
            "type": "boolean"
          },
          "errorCheckRulebaseWithNewDestination": {
            "type": "boolean"
          },
          "errorDeliverMessagesUsingDnsMxRecords": {
            "type": "boolean"
          },
          "errorMailDeliveryServer": {
            "type": "string"
          },
          "exceptionTrack": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "mailDeliveryServer": {
            "type": "string"
          },
          "match": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "notifySenderOnError": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "action1s",
          "action2s",
          "checkRulebaseWithNewDestination",
          "color",
          "comments",
          "cvps",
          "deliverMessagesUsingDnsMxRecords",
          "errorCheckRulebaseWithNewDestination",
          "errorDeliverMessagesUsingDnsMxRecords",
          "errorMailDeliveryServer",
          "exceptionTrack",
          "id",
          "mailDeliveryServer",
          "match",
          "notifySenderOnError",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceTcp:getManagementResourceTcp": {
      "description": "Use this data source to get information on an existing TCP resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTcp = checkpoint.getManagementResourceTcp({\n    name: \"tcp_example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_tcp = checkpoint.get_management_resource_tcp(name=\"tcp_example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTcp = Checkpoint.GetManagementResourceTcp.Invoke(new()\n    {\n        Name = \"tcp_example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementResourceTcp(ctx, \u0026checkpoint.LookupManagementResourceTcpArgs{\n\t\t\tName: pulumi.StringRef(\"tcp_example\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementResourceTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTcp = CheckpointFunctions.getManagementResourceTcp(GetManagementResourceTcpArgs.builder()\n            .name(\"tcp_example\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTcp:\n    fn::invoke:\n      function: checkpoint:getManagementResourceTcp\n      arguments:\n        name: tcp_example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceTcp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceTcp.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "cvpSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceTcpCvpSetting:getManagementResourceTcpCvpSetting"
            },
            "type": "array"
          },
          "exceptionTrack": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "resourceType": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "ufpSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceTcpUfpSetting:getManagementResourceTcpUfpSetting"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "cvpSettings",
          "exceptionTrack",
          "id",
          "resourceType",
          "tags",
          "ufpSettings"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceUri:getManagementResourceUri": {
      "description": "Use this data source to get information on an existing Check Point Resource Uri.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst uri = new checkpoint.ManagementResourceUri(\"uri\", {\n    name: \"newUriResource\",\n    useThisResourceTo: \"optimize_url_logging\",\n    connectionMethods: {\n        transparent: \"false\",\n        tunneling: \"true\",\n        proxy: \"false\",\n    },\n    uriMatchSpecificationType: \"wildcards\",\n    matchWildcards: {\n        host: \"hostName\",\n        path: \"pathName\",\n        query: \"query\",\n        schemes: {\n            gopher: true,\n            other: \"string2\",\n        },\n        methods: {\n            get: true,\n            post: true,\n            head: true,\n            put: true,\n            other: \"done7\",\n        },\n    },\n    action: {\n        stripActivexTags: true,\n        stripAppletTags: true,\n        stripFtpLinks: true,\n        stripPortStrings: true,\n        stripScriptTags: true,\n    },\n    soap: {\n        inspection: \"allow_all_soap_requests\",\n        file_id: \"scheme1\",\n        track_connections: \"mail_alert\",\n    },\n    cvp: {\n        allowedToModifyContent: true,\n        enableCvp: false,\n        replyOrder: \"return_data_after_content_is_approved\",\n        server: \"serverName\",\n    },\n});\nconst data = checkpoint.getManagementResourceUriOutput({\n    uid: uri.managementResourceUriId,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nuri = checkpoint.ManagementResourceUri(\"uri\",\n    name=\"newUriResource\",\n    use_this_resource_to=\"optimize_url_logging\",\n    connection_methods={\n        \"transparent\": \"false\",\n        \"tunneling\": \"true\",\n        \"proxy\": \"false\",\n    },\n    uri_match_specification_type=\"wildcards\",\n    match_wildcards={\n        \"host\": \"hostName\",\n        \"path\": \"pathName\",\n        \"query\": \"query\",\n        \"schemes\": {\n            \"gopher\": True,\n            \"other\": \"string2\",\n        },\n        \"methods\": {\n            \"get\": True,\n            \"post\": True,\n            \"head\": True,\n            \"put\": True,\n            \"other\": \"done7\",\n        },\n    },\n    action={\n        \"strip_activex_tags\": True,\n        \"strip_applet_tags\": True,\n        \"strip_ftp_links\": True,\n        \"strip_port_strings\": True,\n        \"strip_script_tags\": True,\n    },\n    soap={\n        \"inspection\": \"allow_all_soap_requests\",\n        \"file_id\": \"scheme1\",\n        \"track_connections\": \"mail_alert\",\n    },\n    cvp={\n        \"allowed_to_modify_content\": True,\n        \"enable_cvp\": False,\n        \"reply_order\": \"return_data_after_content_is_approved\",\n        \"server\": \"serverName\",\n    })\ndata = checkpoint.get_management_resource_uri_output(uid=uri.management_resource_uri_id)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var uri = new Checkpoint.ManagementResourceUri(\"uri\", new()\n    {\n        Name = \"newUriResource\",\n        UseThisResourceTo = \"optimize_url_logging\",\n        ConnectionMethods = \n        {\n            { \"transparent\", \"false\" },\n            { \"tunneling\", \"true\" },\n            { \"proxy\", \"false\" },\n        },\n        UriMatchSpecificationType = \"wildcards\",\n        MatchWildcards = new Checkpoint.Inputs.ManagementResourceUriMatchWildcardsArgs\n        {\n            Host = \"hostName\",\n            Path = \"pathName\",\n            Query = \"query\",\n            Schemes = new Checkpoint.Inputs.ManagementResourceUriMatchWildcardsSchemesArgs\n            {\n                Gopher = true,\n                Other = \"string2\",\n            },\n            Methods = new Checkpoint.Inputs.ManagementResourceUriMatchWildcardsMethodsArgs\n            {\n                Get = true,\n                Post = true,\n                Head = true,\n                Put = true,\n                Other = \"done7\",\n            },\n        },\n        Action = new Checkpoint.Inputs.ManagementResourceUriActionArgs\n        {\n            StripActivexTags = true,\n            StripAppletTags = true,\n            StripFtpLinks = true,\n            StripPortStrings = true,\n            StripScriptTags = true,\n        },\n        Soap = \n        {\n            { \"inspection\", \"allow_all_soap_requests\" },\n            { \"file_id\", \"scheme1\" },\n            { \"track_connections\", \"mail_alert\" },\n        },\n        Cvp = new Checkpoint.Inputs.ManagementResourceUriCvpArgs\n        {\n            AllowedToModifyContent = true,\n            EnableCvp = false,\n            ReplyOrder = \"return_data_after_content_is_approved\",\n            Server = \"serverName\",\n        },\n    });\n\n    var data = Checkpoint.GetManagementResourceUri.Invoke(new()\n    {\n        Uid = uri.ManagementResourceUriId,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\turi, err := checkpoint.NewManagementResourceUri(ctx, \"uri\", \u0026checkpoint.ManagementResourceUriArgs{\n\t\t\tName:              pulumi.String(\"newUriResource\"),\n\t\t\tUseThisResourceTo: pulumi.String(\"optimize_url_logging\"),\n\t\t\tConnectionMethods: pulumi.StringMap{\n\t\t\t\t\"transparent\": pulumi.String(\"false\"),\n\t\t\t\t\"tunneling\":   pulumi.String(\"true\"),\n\t\t\t\t\"proxy\":       pulumi.String(\"false\"),\n\t\t\t},\n\t\t\tUriMatchSpecificationType: pulumi.String(\"wildcards\"),\n\t\t\tMatchWildcards: \u0026checkpoint.ManagementResourceUriMatchWildcardsArgs{\n\t\t\t\tHost:  pulumi.String(\"hostName\"),\n\t\t\t\tPath:  pulumi.String(\"pathName\"),\n\t\t\t\tQuery: pulumi.String(\"query\"),\n\t\t\t\tSchemes: \u0026checkpoint.ManagementResourceUriMatchWildcardsSchemesArgs{\n\t\t\t\t\tGopher: pulumi.Bool(true),\n\t\t\t\t\tOther:  pulumi.String(\"string2\"),\n\t\t\t\t},\n\t\t\t\tMethods: \u0026checkpoint.ManagementResourceUriMatchWildcardsMethodsArgs{\n\t\t\t\t\tGet:   pulumi.Bool(true),\n\t\t\t\t\tPost:  pulumi.Bool(true),\n\t\t\t\t\tHead:  pulumi.Bool(true),\n\t\t\t\t\tPut:   pulumi.Bool(true),\n\t\t\t\t\tOther: pulumi.String(\"done7\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tAction: \u0026checkpoint.ManagementResourceUriActionArgs{\n\t\t\t\tStripActivexTags: pulumi.Bool(true),\n\t\t\t\tStripAppletTags:  pulumi.Bool(true),\n\t\t\t\tStripFtpLinks:    pulumi.Bool(true),\n\t\t\t\tStripPortStrings: pulumi.Bool(true),\n\t\t\t\tStripScriptTags:  pulumi.Bool(true),\n\t\t\t},\n\t\t\tSoap: pulumi.StringMap{\n\t\t\t\t\"inspection\":        pulumi.String(\"allow_all_soap_requests\"),\n\t\t\t\t\"file_id\":           pulumi.String(\"scheme1\"),\n\t\t\t\t\"track_connections\": pulumi.String(\"mail_alert\"),\n\t\t\t},\n\t\t\tCvp: \u0026checkpoint.ManagementResourceUriCvpArgs{\n\t\t\t\tAllowedToModifyContent: pulumi.Bool(true),\n\t\t\t\tEnableCvp:              pulumi.Bool(false),\n\t\t\t\tReplyOrder:             pulumi.String(\"return_data_after_content_is_approved\"),\n\t\t\t\tServer:                 pulumi.String(\"serverName\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementResourceUriOutput(ctx, checkpoint.GetManagementResourceUriOutputArgs{\n\t\t\tUid: uri.ManagementResourceUriId,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementResourceUri;\nimport com.pulumi.checkpoint.ManagementResourceUriArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriMatchWildcardsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriMatchWildcardsSchemesArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriMatchWildcardsMethodsArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriActionArgs;\nimport com.pulumi.checkpoint.inputs.ManagementResourceUriCvpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementResourceUriArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var uri = new ManagementResourceUri(\"uri\", ManagementResourceUriArgs.builder()\n            .name(\"newUriResource\")\n            .useThisResourceTo(\"optimize_url_logging\")\n            .connectionMethods(Map.ofEntries(\n                Map.entry(\"transparent\", \"false\"),\n                Map.entry(\"tunneling\", \"true\"),\n                Map.entry(\"proxy\", \"false\")\n            ))\n            .uriMatchSpecificationType(\"wildcards\")\n            .matchWildcards(ManagementResourceUriMatchWildcardsArgs.builder()\n                .host(\"hostName\")\n                .path(\"pathName\")\n                .query(\"query\")\n                .schemes(ManagementResourceUriMatchWildcardsSchemesArgs.builder()\n                    .gopher(true)\n                    .other(\"string2\")\n                    .build())\n                .methods(ManagementResourceUriMatchWildcardsMethodsArgs.builder()\n                    .get(true)\n                    .post(true)\n                    .head(true)\n                    .put(true)\n                    .other(\"done7\")\n                    .build())\n                .build())\n            .action(ManagementResourceUriActionArgs.builder()\n                .stripActivexTags(true)\n                .stripAppletTags(true)\n                .stripFtpLinks(true)\n                .stripPortStrings(true)\n                .stripScriptTags(true)\n                .build())\n            .soap(Map.ofEntries(\n                Map.entry(\"inspection\", \"allow_all_soap_requests\"),\n                Map.entry(\"file_id\", \"scheme1\"),\n                Map.entry(\"track_connections\", \"mail_alert\")\n            ))\n            .cvp(ManagementResourceUriCvpArgs.builder()\n                .allowedToModifyContent(true)\n                .enableCvp(false)\n                .replyOrder(\"return_data_after_content_is_approved\")\n                .server(\"serverName\")\n                .build())\n            .build());\n\n        final var data = CheckpointFunctions.getManagementResourceUri(GetManagementResourceUriArgs.builder()\n            .uid(uri.managementResourceUriId())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  uri:\n    type: checkpoint:ManagementResourceUri\n    properties:\n      name: newUriResource\n      useThisResourceTo: optimize_url_logging\n      connectionMethods:\n        transparent: 'false'\n        tunneling: 'true'\n        proxy: false\n      uriMatchSpecificationType: wildcards\n      matchWildcards:\n        host: hostName\n        path: pathName\n        query: query\n        schemes:\n          gopher: true\n          other: string2\n        methods:\n          get: true\n          post: true\n          head: true\n          put: true\n          other: done7\n      action:\n        stripActivexTags: true\n        stripAppletTags: true\n        stripFtpLinks: true\n        stripPortStrings: true\n        stripScriptTags: true\n      soap:\n        inspection: allow_all_soap_requests\n        file_id: scheme1\n        track_connections: mail_alert\n      cvp:\n        allowedToModifyContent: true\n        enableCvp: false\n        replyOrder: return_data_after_content_is_approved\n        server: serverName\nvariables:\n  data:\n    fn::invoke:\n      function: checkpoint:getManagementResourceUri\n      arguments:\n        uid: ${uri.managementResourceUriId}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceUri.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceUri.\n",
        "properties": {
          "actions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceUriAction:getManagementResourceUriAction"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "connectionMethods": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "cvps": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceUriCvp:getManagementResourceUriCvp"
            },
            "type": "array"
          },
          "exceptionTrack": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "matchUfps": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceUriMatchUfp:getManagementResourceUriMatchUfp"
            },
            "type": "array"
          },
          "matchWildcards": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementResourceUriMatchWildcard:getManagementResourceUriMatchWildcard"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "soap": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "uriMatchSpecificationType": {
            "type": "string"
          },
          "useThisResourceTo": {
            "type": "string"
          }
        },
        "required": [
          "actions",
          "color",
          "comments",
          "connectionMethods",
          "cvps",
          "exceptionTrack",
          "id",
          "matchUfps",
          "matchWildcards",
          "soap",
          "tags",
          "uriMatchSpecificationType",
          "useThisResourceTo"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementResourceUriForQos:getManagementResourceUriForQos": {
      "description": "Use this data source to get information on an existing Uri For QoS resource.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataUriForQos = checkpoint.getManagementResourceUriForQos({\n    name: \"uri_for_qos_example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_uri_for_qos = checkpoint.get_management_resource_uri_for_qos(name=\"uri_for_qos_example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataUriForQos = Checkpoint.GetManagementResourceUriForQos.Invoke(new()\n    {\n        Name = \"uri_for_qos_example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementResourceUriForQos(ctx, \u0026checkpoint.LookupManagementResourceUriForQosArgs{\n\t\t\tName: pulumi.StringRef(\"uri_for_qos_example\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementResourceUriForQosArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataUriForQos = CheckpointFunctions.getManagementResourceUriForQos(GetManagementResourceUriForQosArgs.builder()\n            .name(\"uri_for_qos_example\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataUriForQos:\n    fn::invoke:\n      function: checkpoint:getManagementResourceUriForQos\n      arguments:\n        name: uri_for_qos_example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementResourceUriForQos.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementResourceUriForQos.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "searchForUrl": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "searchForUrl",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSecuremoteDnsServer:getManagementSecuremoteDnsServer": {
      "description": "Use this data source to get information on an existing SecurRemote DNS Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataSecuremoteDnsServer = checkpoint.getManagementSecuremoteDnsServer({\n    name: \"TestSecuRemoteDNSSever\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_securemote_dns_server = checkpoint.get_management_securemote_dns_server(name=\"TestSecuRemoteDNSSever\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataSecuremoteDnsServer = Checkpoint.GetManagementSecuremoteDnsServer.Invoke(new()\n    {\n        Name = \"TestSecuRemoteDNSSever\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementSecuremoteDnsServer(ctx, \u0026checkpoint.LookupManagementSecuremoteDnsServerArgs{\n\t\t\tName: pulumi.StringRef(\"TestSecuRemoteDNSSever\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSecuremoteDnsServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataSecuremoteDnsServer = CheckpointFunctions.getManagementSecuremoteDnsServer(GetManagementSecuremoteDnsServerArgs.builder()\n            .name(\"TestSecuRemoteDNSSever\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataSecuremoteDnsServer:\n    fn::invoke:\n      function: checkpoint:getManagementSecuremoteDnsServer\n      arguments:\n        name: TestSecuRemoteDNSSever\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSecuremoteDnsServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSecuremoteDnsServer.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "domains": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSecuremoteDnsServerDomain:getManagementSecuremoteDnsServerDomain"
            },
            "type": "array"
          },
          "host": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "domains",
          "host",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSecuridServer:getManagementSecuridServer": {
      "description": "Use this data source to get information on an existing SecurID Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataSecuridServer = checkpoint.getManagementSecuridServer({\n    name: \"securid_server_example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_securid_server = checkpoint.get_management_securid_server(name=\"securid_server_example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataSecuridServer = Checkpoint.GetManagementSecuridServer.Invoke(new()\n    {\n        Name = \"securid_server_example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementSecuridServer(ctx, \u0026checkpoint.LookupManagementSecuridServerArgs{\n\t\t\tName: pulumi.StringRef(\"securid_server_example\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSecuridServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataSecuridServer = CheckpointFunctions.getManagementSecuridServer(GetManagementSecuridServerArgs.builder()\n            .name(\"securid_server_example\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataSecuridServer:\n    fn::invoke:\n      function: checkpoint:getManagementSecuridServer\n      arguments:\n        name: securid_server_example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSecuridServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSecuridServer.\n",
        "properties": {
          "base64ConfigFileContent": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "configFileName": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "base64ConfigFileContent",
          "color",
          "comments",
          "configFileName",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementServerCertificate:getManagementServerCertificate": {
      "description": "Use this data source to get information on an existing Check Point Server Certificate.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementServerCertificate(\"example\", {\n    name: \"MyServerCertificate\",\n    base64Certificate: \"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\",\n    base64Password: \"bXlfcGFzc3dvcmQ=\",\n    comments: \"this is a comment\",\n});\nconst dataCert1 = checkpoint.getManagementServerCertificate({\n    name: cert1.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementServerCertificate(\"example\",\n    name=\"MyServerCertificate\",\n    base64_certificate=\"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\",\n    base64_password=\"bXlfcGFzc3dvcmQ=\",\n    comments=\"this is a comment\")\ndata_cert1 = checkpoint.get_management_server_certificate(name=cert1[\"name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementServerCertificate(\"example\", new()\n    {\n        Name = \"MyServerCertificate\",\n        Base64Certificate = \"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\",\n        Base64Password = \"bXlfcGFzc3dvcmQ=\",\n        Comments = \"this is a comment\",\n    });\n\n    var dataCert1 = Checkpoint.GetManagementServerCertificate.Invoke(new()\n    {\n        Name = cert1.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementServerCertificate(ctx, \"example\", \u0026checkpoint.ManagementServerCertificateArgs{\n\t\t\tName:              pulumi.String(\"MyServerCertificate\"),\n\t\t\tBase64Certificate: pulumi.String(\"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\"),\n\t\t\tBase64Password:    pulumi.String(\"bXlfcGFzc3dvcmQ=\"),\n\t\t\tComments:          pulumi.String(\"this is a comment\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementServerCertificate(ctx, \u0026checkpoint.LookupManagementServerCertificateArgs{\n\t\t\tName: pulumi.StringRef(cert1.Name),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServerCertificate;\nimport com.pulumi.checkpoint.ManagementServerCertificateArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementServerCertificateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementServerCertificate(\"example\", ManagementServerCertificateArgs.builder()\n            .name(\"MyServerCertificate\")\n            .base64Certificate(\"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\")\n            .base64Password(\"bXlfcGFzc3dvcmQ=\")\n            .comments(\"this is a comment\")\n            .build());\n\n        final var dataCert1 = CheckpointFunctions.getManagementServerCertificate(GetManagementServerCertificateArgs.builder()\n            .name(cert1.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementServerCertificate\n    properties:\n      name: MyServerCertificate\n      base64Certificate: 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\n      base64Password: bXlfcGFzc3dvcmQ=\n      comments: this is a comment\nvariables:\n  dataCert1:\n    fn::invoke:\n      function: checkpoint:getManagementServerCertificate\n      arguments:\n        name: ${cert1.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementServerCertificate.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object Uid.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementServerCertificate.\n",
        "properties": {
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "subject": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "validFrom": {
            "type": "string"
          },
          "validTo": {
            "type": "string"
          }
        },
        "required": [
          "comments",
          "id",
          "subject",
          "validFrom",
          "validTo"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementServiceCitrixTcp:getManagementServiceCitrixTcp": {
      "description": "This resource allows you to execute Check Point Service Citrix Tcp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceCitrixTcp = new checkpoint.ManagementServiceCitrixTcp(\"service_citrix_tcp\", {\n    name: \"citrix tcp\",\n    application: \"app name\",\n});\nconst test = checkpoint.getManagementServiceCitrixTcpOutput({\n    name: serviceCitrixTcp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_citrix_tcp = checkpoint.ManagementServiceCitrixTcp(\"service_citrix_tcp\",\n    name=\"citrix tcp\",\n    application=\"app name\")\ntest = checkpoint.get_management_service_citrix_tcp_output(name=service_citrix_tcp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceCitrixTcp = new Checkpoint.ManagementServiceCitrixTcp(\"service_citrix_tcp\", new()\n    {\n        Name = \"citrix tcp\",\n        Application = \"app name\",\n    });\n\n    var test = Checkpoint.GetManagementServiceCitrixTcp.Invoke(new()\n    {\n        Name = serviceCitrixTcp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceCitrixTcp, err := checkpoint.NewManagementServiceCitrixTcp(ctx, \"service_citrix_tcp\", \u0026checkpoint.ManagementServiceCitrixTcpArgs{\n\t\t\tName:        pulumi.String(\"citrix tcp\"),\n\t\t\tApplication: pulumi.String(\"app name\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementServiceCitrixTcpOutput(ctx, checkpoint.GetManagementServiceCitrixTcpOutputArgs{\n\t\t\tName: serviceCitrixTcp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceCitrixTcp;\nimport com.pulumi.checkpoint.ManagementServiceCitrixTcpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementServiceCitrixTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceCitrixTcp = new ManagementServiceCitrixTcp(\"serviceCitrixTcp\", ManagementServiceCitrixTcpArgs.builder()\n            .name(\"citrix tcp\")\n            .application(\"app name\")\n            .build());\n\n        final var test = CheckpointFunctions.getManagementServiceCitrixTcp(GetManagementServiceCitrixTcpArgs.builder()\n            .name(serviceCitrixTcp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceCitrixTcp:\n    type: checkpoint:ManagementServiceCitrixTcp\n    name: service_citrix_tcp\n    properties:\n      name: citrix tcp\n      application: app name\nvariables:\n  test:\n    fn::invoke:\n      function: checkpoint:getManagementServiceCitrixTcp\n      arguments:\n        name: ${serviceCitrixTcp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementServiceCitrixTcp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementServiceCitrixTcp.\n",
        "properties": {
          "application": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "application",
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementServiceCompoundTcp:getManagementServiceCompoundTcp": {
      "description": "This resource allows you to execute Check Point Service Compound Tcp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceCompoundTcp = new checkpoint.ManagementServiceCompoundTcp(\"service_compound_tcp\", {\n    name: \"service compound tcp\",\n    compoundService: \"pointcast\",\n    keepConnectionsOpenAfterPolicyInstallation: true,\n});\nconst test = checkpoint.getManagementServiceCompoundTcpOutput({\n    name: serviceCompoundTcp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_compound_tcp = checkpoint.ManagementServiceCompoundTcp(\"service_compound_tcp\",\n    name=\"service compound tcp\",\n    compound_service=\"pointcast\",\n    keep_connections_open_after_policy_installation=True)\ntest = checkpoint.get_management_service_compound_tcp_output(name=service_compound_tcp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceCompoundTcp = new Checkpoint.ManagementServiceCompoundTcp(\"service_compound_tcp\", new()\n    {\n        Name = \"service compound tcp\",\n        CompoundService = \"pointcast\",\n        KeepConnectionsOpenAfterPolicyInstallation = true,\n    });\n\n    var test = Checkpoint.GetManagementServiceCompoundTcp.Invoke(new()\n    {\n        Name = serviceCompoundTcp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceCompoundTcp, err := checkpoint.NewManagementServiceCompoundTcp(ctx, \"service_compound_tcp\", \u0026checkpoint.ManagementServiceCompoundTcpArgs{\n\t\t\tName:            pulumi.String(\"service compound tcp\"),\n\t\t\tCompoundService: pulumi.String(\"pointcast\"),\n\t\t\tKeepConnectionsOpenAfterPolicyInstallation: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementServiceCompoundTcpOutput(ctx, checkpoint.GetManagementServiceCompoundTcpOutputArgs{\n\t\t\tName: serviceCompoundTcp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceCompoundTcp;\nimport com.pulumi.checkpoint.ManagementServiceCompoundTcpArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementServiceCompoundTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceCompoundTcp = new ManagementServiceCompoundTcp(\"serviceCompoundTcp\", ManagementServiceCompoundTcpArgs.builder()\n            .name(\"service compound tcp\")\n            .compoundService(\"pointcast\")\n            .keepConnectionsOpenAfterPolicyInstallation(true)\n            .build());\n\n        final var test = CheckpointFunctions.getManagementServiceCompoundTcp(GetManagementServiceCompoundTcpArgs.builder()\n            .name(serviceCompoundTcp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceCompoundTcp:\n    type: checkpoint:ManagementServiceCompoundTcp\n    name: service_compound_tcp\n    properties:\n      name: service compound tcp\n      compoundService: pointcast\n      keepConnectionsOpenAfterPolicyInstallation: true\nvariables:\n  test:\n    fn::invoke:\n      function: checkpoint:getManagementServiceCompoundTcp\n      arguments:\n        name: ${serviceCompoundTcp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementServiceCompoundTcp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementServiceCompoundTcp.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "compoundService": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "keepConnectionsOpenAfterPolicyInstallation": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "compoundService",
          "id",
          "keepConnectionsOpenAfterPolicyInstallation",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementServiceGtp:getManagementServiceGtp": {
      "description": "Use this data source to get information on an existing Check Point Service Gtp.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst serviceGtp = new checkpoint.ManagementServiceGtp(\"service_gtp\", {\n    name: \"gtp_svc1\",\n    version: \"v2\",\n    reverseService: true,\n    traceManagement: true,\n    imsiPrefix: {\n        enable: \"true\",\n        prefix: \"123\",\n    },\n    interfaceProfile: {\n        profile: \"Custom\",\n        custom_message_types: \"32-35\",\n    },\n    selectionMode: {\n        enable: true,\n        mode: 1,\n    },\n    msIsdn: {\n        enable: \"true\",\n        ms_isdn: \"312\",\n    },\n    accessPointName: {\n        enable: \"true\",\n        apn: \"AccP2\",\n    },\n    applyAccessPolicyOnUserTraffic: {\n        enable: \"true\",\n        add_imsi_field_to_log: \"true\",\n    },\n    radioAccessTechnology: {\n        otherTypesRange: {\n            enable: true,\n            types: \"11-50\",\n        },\n    },\n    ldapGroup: {\n        enable: \"true\",\n        group: \"ldap_group_1\",\n        according_to: \"MS-ISDN\",\n    },\n});\nconst dataServiceGtp = checkpoint.getManagementServiceGtpOutput({\n    name: serviceGtp.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nservice_gtp = checkpoint.ManagementServiceGtp(\"service_gtp\",\n    name=\"gtp_svc1\",\n    version=\"v2\",\n    reverse_service=True,\n    trace_management=True,\n    imsi_prefix={\n        \"enable\": \"true\",\n        \"prefix\": \"123\",\n    },\n    interface_profile={\n        \"profile\": \"Custom\",\n        \"custom_message_types\": \"32-35\",\n    },\n    selection_mode={\n        \"enable\": True,\n        \"mode\": 1,\n    },\n    ms_isdn={\n        \"enable\": \"true\",\n        \"ms_isdn\": \"312\",\n    },\n    access_point_name={\n        \"enable\": \"true\",\n        \"apn\": \"AccP2\",\n    },\n    apply_access_policy_on_user_traffic={\n        \"enable\": \"true\",\n        \"add_imsi_field_to_log\": \"true\",\n    },\n    radio_access_technology={\n        \"other_types_range\": {\n            \"enable\": True,\n            \"types\": \"11-50\",\n        },\n    },\n    ldap_group={\n        \"enable\": \"true\",\n        \"group\": \"ldap_group_1\",\n        \"according_to\": \"MS-ISDN\",\n    })\ndata_service_gtp = checkpoint.get_management_service_gtp_output(name=service_gtp.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var serviceGtp = new Checkpoint.ManagementServiceGtp(\"service_gtp\", new()\n    {\n        Name = \"gtp_svc1\",\n        Version = \"v2\",\n        ReverseService = true,\n        TraceManagement = true,\n        ImsiPrefix = \n        {\n            { \"enable\", \"true\" },\n            { \"prefix\", \"123\" },\n        },\n        InterfaceProfile = \n        {\n            { \"profile\", \"Custom\" },\n            { \"custom_message_types\", \"32-35\" },\n        },\n        SelectionMode = new Checkpoint.Inputs.ManagementServiceGtpSelectionModeArgs\n        {\n            Enable = true,\n            Mode = 1,\n        },\n        MsIsdn = \n        {\n            { \"enable\", \"true\" },\n            { \"ms_isdn\", \"312\" },\n        },\n        AccessPointName = \n        {\n            { \"enable\", \"true\" },\n            { \"apn\", \"AccP2\" },\n        },\n        ApplyAccessPolicyOnUserTraffic = \n        {\n            { \"enable\", \"true\" },\n            { \"add_imsi_field_to_log\", \"true\" },\n        },\n        RadioAccessTechnology = new Checkpoint.Inputs.ManagementServiceGtpRadioAccessTechnologyArgs\n        {\n            OtherTypesRange = new Checkpoint.Inputs.ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs\n            {\n                Enable = true,\n                Types = \"11-50\",\n            },\n        },\n        LdapGroup = \n        {\n            { \"enable\", \"true\" },\n            { \"group\", \"ldap_group_1\" },\n            { \"according_to\", \"MS-ISDN\" },\n        },\n    });\n\n    var dataServiceGtp = Checkpoint.GetManagementServiceGtp.Invoke(new()\n    {\n        Name = serviceGtp.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tserviceGtp, err := checkpoint.NewManagementServiceGtp(ctx, \"service_gtp\", \u0026checkpoint.ManagementServiceGtpArgs{\n\t\t\tName:            pulumi.String(\"gtp_svc1\"),\n\t\t\tVersion:         pulumi.String(\"v2\"),\n\t\t\tReverseService:  pulumi.Bool(true),\n\t\t\tTraceManagement: pulumi.Bool(true),\n\t\t\tImsiPrefix: pulumi.StringMap{\n\t\t\t\t\"enable\": pulumi.String(\"true\"),\n\t\t\t\t\"prefix\": pulumi.String(\"123\"),\n\t\t\t},\n\t\t\tInterfaceProfile: pulumi.StringMap{\n\t\t\t\t\"profile\":              pulumi.String(\"Custom\"),\n\t\t\t\t\"custom_message_types\": pulumi.String(\"32-35\"),\n\t\t\t},\n\t\t\tSelectionMode: \u0026checkpoint.ManagementServiceGtpSelectionModeArgs{\n\t\t\t\tEnable: pulumi.Bool(true),\n\t\t\t\tMode:   pulumi.Float64(1),\n\t\t\t},\n\t\t\tMsIsdn: pulumi.StringMap{\n\t\t\t\t\"enable\":  pulumi.String(\"true\"),\n\t\t\t\t\"ms_isdn\": pulumi.String(\"312\"),\n\t\t\t},\n\t\t\tAccessPointName: pulumi.StringMap{\n\t\t\t\t\"enable\": pulumi.String(\"true\"),\n\t\t\t\t\"apn\":    pulumi.String(\"AccP2\"),\n\t\t\t},\n\t\t\tApplyAccessPolicyOnUserTraffic: pulumi.StringMap{\n\t\t\t\t\"enable\":                pulumi.String(\"true\"),\n\t\t\t\t\"add_imsi_field_to_log\": pulumi.String(\"true\"),\n\t\t\t},\n\t\t\tRadioAccessTechnology: \u0026checkpoint.ManagementServiceGtpRadioAccessTechnologyArgs{\n\t\t\t\tOtherTypesRange: \u0026checkpoint.ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs{\n\t\t\t\t\tEnable: pulumi.Bool(true),\n\t\t\t\t\tTypes:  pulumi.String(\"11-50\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tLdapGroup: pulumi.StringMap{\n\t\t\t\t\"enable\":       pulumi.String(\"true\"),\n\t\t\t\t\"group\":        pulumi.String(\"ldap_group_1\"),\n\t\t\t\t\"according_to\": pulumi.String(\"MS-ISDN\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementServiceGtpOutput(ctx, checkpoint.GetManagementServiceGtpOutputArgs{\n\t\t\tName: serviceGtp.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementServiceGtp;\nimport com.pulumi.checkpoint.ManagementServiceGtpArgs;\nimport com.pulumi.checkpoint.inputs.ManagementServiceGtpSelectionModeArgs;\nimport com.pulumi.checkpoint.inputs.ManagementServiceGtpRadioAccessTechnologyArgs;\nimport com.pulumi.checkpoint.inputs.ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementServiceGtpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var serviceGtp = new ManagementServiceGtp(\"serviceGtp\", ManagementServiceGtpArgs.builder()\n            .name(\"gtp_svc1\")\n            .version(\"v2\")\n            .reverseService(true)\n            .traceManagement(true)\n            .imsiPrefix(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"prefix\", \"123\")\n            ))\n            .interfaceProfile(Map.ofEntries(\n                Map.entry(\"profile\", \"Custom\"),\n                Map.entry(\"custom_message_types\", \"32-35\")\n            ))\n            .selectionMode(ManagementServiceGtpSelectionModeArgs.builder()\n                .enable(true)\n                .mode(1.0)\n                .build())\n            .msIsdn(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"ms_isdn\", \"312\")\n            ))\n            .accessPointName(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"apn\", \"AccP2\")\n            ))\n            .applyAccessPolicyOnUserTraffic(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"add_imsi_field_to_log\", \"true\")\n            ))\n            .radioAccessTechnology(ManagementServiceGtpRadioAccessTechnologyArgs.builder()\n                .otherTypesRange(ManagementServiceGtpRadioAccessTechnologyOtherTypesRangeArgs.builder()\n                    .enable(true)\n                    .types(\"11-50\")\n                    .build())\n                .build())\n            .ldapGroup(Map.ofEntries(\n                Map.entry(\"enable\", \"true\"),\n                Map.entry(\"group\", \"ldap_group_1\"),\n                Map.entry(\"according_to\", \"MS-ISDN\")\n            ))\n            .build());\n\n        final var dataServiceGtp = CheckpointFunctions.getManagementServiceGtp(GetManagementServiceGtpArgs.builder()\n            .name(serviceGtp.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  serviceGtp:\n    type: checkpoint:ManagementServiceGtp\n    name: service_gtp\n    properties:\n      name: gtp_svc1\n      version: v2\n      reverseService: true\n      traceManagement: true\n      imsiPrefix:\n        enable: true\n        prefix: '123'\n      interfaceProfile:\n        profile: Custom\n        custom_message_types: 32-35\n      selectionMode:\n        enable: true\n        mode: 1\n      msIsdn:\n        enable: true\n        ms_isdn: '312'\n      accessPointName:\n        enable: true\n        apn: AccP2\n      applyAccessPolicyOnUserTraffic:\n        enable: true\n        add_imsi_field_to_log: true\n      radioAccessTechnology:\n        otherTypesRange:\n          enable: true\n          types: 11-50\n      ldapGroup:\n        enable: true\n        group: ldap_group_1\n        according_to: MS-ISDN\nvariables:\n  dataServiceGtp:\n    fn::invoke:\n      function: checkpoint:getManagementServiceGtp\n      arguments:\n        name: ${serviceGtp.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementServiceGtp.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementServiceGtp.\n",
        "properties": {
          "accessPointName": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "allowUsageOfStaticIp": {
            "type": "boolean"
          },
          "applyAccessPolicyOnUserTraffic": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "csFallbackAndSrvcc": {
            "type": "boolean"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ignoreErrors": {
            "type": "boolean"
          },
          "ignoreWarnings": {
            "type": "boolean"
          },
          "imsiPrefix": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "interfaceProfile": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "ldapGroup": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "msIsdn": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "radioAccessTechnologies": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServiceGtpRadioAccessTechnology:getManagementServiceGtpRadioAccessTechnology"
            },
            "type": "array"
          },
          "restorationAndRecovery": {
            "type": "boolean"
          },
          "reverseService": {
            "type": "boolean"
          },
          "selectionModes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServiceGtpSelectionMode:getManagementServiceGtpSelectionMode"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "traceManagement": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "accessPointName",
          "allowUsageOfStaticIp",
          "applyAccessPolicyOnUserTraffic",
          "color",
          "comments",
          "csFallbackAndSrvcc",
          "groups",
          "id",
          "ignoreErrors",
          "ignoreWarnings",
          "imsiPrefix",
          "interfaceProfile",
          "ldapGroup",
          "msIsdn",
          "radioAccessTechnologies",
          "restorationAndRecovery",
          "reverseService",
          "selectionModes",
          "tags",
          "traceManagement",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementServicesTcp:getManagementServicesTcp": {
      "description": "Use this data source to get information on all Services TCP.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst myQuery = checkpoint.getManagementServicesTcp({\n    limit: 15,\n});\n// Fetch all results\nconst myQueryFetchAll = checkpoint.getManagementServicesTcp({\n    fetchAll: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmy_query = checkpoint.get_management_services_tcp(limit=15)\n# Fetch all results\nmy_query_fetch_all = checkpoint.get_management_services_tcp(fetch_all=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myQuery = Checkpoint.GetManagementServicesTcp.Invoke(new()\n    {\n        Limit = 15,\n    });\n\n    // Fetch all results\n    var myQueryFetchAll = Checkpoint.GetManagementServicesTcp.Invoke(new()\n    {\n        FetchAll = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementServicesTcp(ctx, \u0026checkpoint.GetManagementServicesTcpArgs{\n\t\t\tLimit: pulumi.Float64Ref(15),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Fetch all results\n\t\t_, err = checkpoint.GetManagementServicesTcp(ctx, \u0026checkpoint.GetManagementServicesTcpArgs{\n\t\t\tFetchAll: pulumi.BoolRef(true),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementServicesTcpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var myQuery = CheckpointFunctions.getManagementServicesTcp(GetManagementServicesTcpArgs.builder()\n            .limit(15)\n            .build());\n\n        // Fetch all results\n        final var myQueryFetchAll = CheckpointFunctions.getManagementServicesTcp(GetManagementServicesTcpArgs.builder()\n            .fetchAll(true)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  myQuery:\n    fn::invoke:\n      function: checkpoint:getManagementServicesTcp\n      arguments:\n        limit: 15\n  # Fetch all results\n  myQueryFetchAll:\n    fn::invoke:\n      function: checkpoint:getManagementServicesTcp\n      arguments:\n        fetchAll: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementServicesTcp.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean",
            "description": "If true, fetches all results.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter objects by.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServicesTcpOrder:getManagementServicesTcpOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementServicesTcp.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServicesTcpObject:getManagementServicesTcpObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServicesTcpOrder:getManagementServicesTcpOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementServicesUdp:getManagementServicesUdp": {
      "description": "Use this data source to get information on all Services UDP.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst myQuery = checkpoint.getManagementServicesUdp({\n    limit: 15,\n});\n// Fetch all results\nconst myQueryFetchAll = checkpoint.getManagementServicesUdp({\n    fetchAll: true,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nmy_query = checkpoint.get_management_services_udp(limit=15)\n# Fetch all results\nmy_query_fetch_all = checkpoint.get_management_services_udp(fetch_all=True)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var myQuery = Checkpoint.GetManagementServicesUdp.Invoke(new()\n    {\n        Limit = 15,\n    });\n\n    // Fetch all results\n    var myQueryFetchAll = Checkpoint.GetManagementServicesUdp.Invoke(new()\n    {\n        FetchAll = true,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementServicesUdp(ctx, \u0026checkpoint.GetManagementServicesUdpArgs{\n\t\t\tLimit: pulumi.Float64Ref(15),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t// Fetch all results\n\t\t_, err = checkpoint.GetManagementServicesUdp(ctx, \u0026checkpoint.GetManagementServicesUdpArgs{\n\t\t\tFetchAll: pulumi.BoolRef(true),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementServicesUdpArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var myQuery = CheckpointFunctions.getManagementServicesUdp(GetManagementServicesUdpArgs.builder()\n            .limit(15)\n            .build());\n\n        // Fetch all results\n        final var myQueryFetchAll = CheckpointFunctions.getManagementServicesUdp(GetManagementServicesUdpArgs.builder()\n            .fetchAll(true)\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  myQuery:\n    fn::invoke:\n      function: checkpoint:getManagementServicesUdp\n      arguments:\n        limit: 15\n  # Fetch all results\n  myQueryFetchAll:\n    fn::invoke:\n      function: checkpoint:getManagementServicesUdp\n      arguments:\n        fetchAll: true\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementServicesUdp.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean",
            "description": "If true, fetches all results.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter objects by.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServicesUdpOrder:getManagementServicesUdpOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementServicesUdp.\n",
        "properties": {
          "fetchAll": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServicesUdpObject:getManagementServicesUdpObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementServicesUdpOrder:getManagementServicesUdpOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementShowObjects:getManagementShowObjects": {
      "description": "This resource allows you to execute Check Point Show Objects.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst query = checkpoint.getManagementShowObjects({\n    type: \"service-tcp\",\n    filter: \"13+\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nquery = checkpoint.get_management_show_objects(type=\"service-tcp\",\n    filter=\"13+\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var query = Checkpoint.GetManagementShowObjects.Invoke(new()\n    {\n        Type = \"service-tcp\",\n        Filter = \"13+\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementShowObjects(ctx, \u0026checkpoint.GetManagementShowObjectsArgs{\n\t\t\tType:   pulumi.StringRef(\"service-tcp\"),\n\t\t\tFilter: pulumi.StringRef(\"13+\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementShowObjectsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var query = CheckpointFunctions.getManagementShowObjects(GetManagementShowObjectsArgs.builder()\n            .type(\"service-tcp\")\n            .filter(\"13+\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  query:\n    fn::invoke:\n      function: checkpoint:getManagementShowObjects\n      arguments:\n        type: service-tcp\n        filter: 13+\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementShowObjects.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
          },
          "domainsToProcesses": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Indicates which domains to process the commands on. It cannot be used with the details-level full, must be run from the System Domain only and with ignore-warnings true. Valid values are: CURRENT_DOMAIN, ALL_DOMAINS_ON_THIS_SERVER.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter objects by. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. By default, the search involves both a textual search and a IP search. To use IP search only, set the \"ip-only\" parameter to true.\n"
          },
          "id": {
            "type": "string"
          },
          "ipOnly": {
            "type": "boolean",
            "description": "If using \"filter\", use this field to search objects by their IP address only, without involving the textual search.\n"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementShowObjectsOrder:getManagementShowObjectsOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          },
          "type": {
            "type": "string",
            "description": "The objects' type, e.g.: host, service-tcp, network, address-range.\n"
          },
          "uids": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "List of UIDs of the objects to retrieve.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementShowObjects.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean"
          },
          "domainsToProcesses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "filter": {
            "type": "string"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "ipOnly": {
            "type": "boolean"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementShowObjectsObject:getManagementShowObjectsObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementShowObjectsOrder:getManagementShowObjectsOrder"
            },
            "type": "array"
          },
          "response": {
            "type": "string"
          },
          "showMembership": {
            "type": "boolean"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          },
          "type": {
            "type": "string"
          },
          "uids": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "response",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementShowUpdatableObjectsRepositoryContent:getManagementShowUpdatableObjectsRepositoryContent": {
      "description": "This resource allows you to execute Check Point Show Updatable Objects Repository Content.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst query = checkpoint.getManagementShowUpdatableObjectsRepositoryContent({\n    filter: {\n        text: \"API Gateway\",\n    },\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nquery = checkpoint.get_management_show_updatable_objects_repository_content(filter={\n    \"text\": \"API Gateway\",\n})\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var query = Checkpoint.GetManagementShowUpdatableObjectsRepositoryContent.Invoke(new()\n    {\n        Filter = \n        {\n            { \"text\", \"API Gateway\" },\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementShowUpdatableObjectsRepositoryContent(ctx, \u0026checkpoint.GetManagementShowUpdatableObjectsRepositoryContentArgs{\n\t\t\tFilter: map[string]interface{}{\n\t\t\t\t\"text\": \"API Gateway\",\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementShowUpdatableObjectsRepositoryContentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var query = CheckpointFunctions.getManagementShowUpdatableObjectsRepositoryContent(GetManagementShowUpdatableObjectsRepositoryContentArgs.builder()\n            .filter(Map.of(\"text\", \"API Gateway\"))\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  query:\n    fn::invoke:\n      function: checkpoint:getManagementShowUpdatableObjectsRepositoryContent\n      arguments:\n        filter:\n          text: API Gateway\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementShowUpdatableObjectsRepositoryContent.\n",
        "properties": {
          "filter": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Return results matching the specified filter. filter blocks blocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementShowUpdatableObjectsRepositoryContentOrder:getManagementShowUpdatableObjectsRepositoryContentOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. order blocks are documented below.\n"
          },
          "uidInUpdatableObjectsRepository": {
            "type": "string",
            "description": "The object's unique identifier in the Updatable Objects repository.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementShowUpdatableObjectsRepositoryContent.\n",
        "properties": {
          "filter": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "objects": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementShowUpdatableObjectsRepositoryContentObject:getManagementShowUpdatableObjectsRepositoryContentObject"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementShowUpdatableObjectsRepositoryContentOrder:getManagementShowUpdatableObjectsRepositoryContentOrder"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          },
          "uidInUpdatableObjectsRepository": {
            "type": "string"
          }
        },
        "required": [
          "from",
          "id",
          "objects",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSimpleCluster:getManagementSimpleCluster": {
      "description": "This resource allows you to execute Check Point Simple Cluster.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst simpleClusterManagementSimpleCluster = new checkpoint.ManagementSimpleCluster(\"simple_cluster\", {\n    name: \"mycluster\",\n    ipv4Address: \"1.2.3.4\",\n    version: \"R81\",\n    hardware: \"Open server\",\n    sendLogsToServers: [\"mylogserver\"],\n    firewall: true,\n});\nconst simpleCluster = checkpoint.getManagementSimpleCluster({\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsimple_cluster_management_simple_cluster = checkpoint.ManagementSimpleCluster(\"simple_cluster\",\n    name=\"mycluster\",\n    ipv4_address=\"1.2.3.4\",\n    version=\"R81\",\n    hardware=\"Open server\",\n    send_logs_to_servers=[\"mylogserver\"],\n    firewall=True)\nsimple_cluster = checkpoint.get_management_simple_cluster(name=test[\"name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var simpleClusterManagementSimpleCluster = new Checkpoint.ManagementSimpleCluster(\"simple_cluster\", new()\n    {\n        Name = \"mycluster\",\n        Ipv4Address = \"1.2.3.4\",\n        Version = \"R81\",\n        Hardware = \"Open server\",\n        SendLogsToServers = new[]\n        {\n            \"mylogserver\",\n        },\n        Firewall = true,\n    });\n\n    var simpleCluster = Checkpoint.GetManagementSimpleCluster.Invoke(new()\n    {\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSimpleCluster(ctx, \"simple_cluster\", \u0026checkpoint.ManagementSimpleClusterArgs{\n\t\t\tName:        pulumi.String(\"mycluster\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t\tVersion:     pulumi.String(\"R81\"),\n\t\t\tHardware:    pulumi.String(\"Open server\"),\n\t\t\tSendLogsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"mylogserver\"),\n\t\t\t},\n\t\t\tFirewall: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementSimpleCluster(ctx, \u0026checkpoint.LookupManagementSimpleClusterArgs{\n\t\t\tName: pulumi.StringRef(test.Name),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSimpleCluster;\nimport com.pulumi.checkpoint.ManagementSimpleClusterArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSimpleClusterArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var simpleClusterManagementSimpleCluster = new ManagementSimpleCluster(\"simpleClusterManagementSimpleCluster\", ManagementSimpleClusterArgs.builder()\n            .name(\"mycluster\")\n            .ipv4Address(\"1.2.3.4\")\n            .version(\"R81\")\n            .hardware(\"Open server\")\n            .sendLogsToServers(\"mylogserver\")\n            .firewall(true)\n            .build());\n\n        final var simpleCluster = CheckpointFunctions.getManagementSimpleCluster(GetManagementSimpleClusterArgs.builder()\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  simpleClusterManagementSimpleCluster:\n    type: checkpoint:ManagementSimpleCluster\n    name: simple_cluster\n    properties:\n      name: mycluster\n      ipv4Address: 1.2.3.4\n      version: R81\n      hardware: Open server\n      sendLogsToServers:\n        - mylogserver\n      firewall: true\nvariables:\n  simpleCluster:\n    fn::invoke:\n      function: checkpoint:getManagementSimpleCluster\n      arguments:\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSimpleCluster.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSimpleCluster.\n",
        "properties": {
          "advancedSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterAdvancedSetting:getManagementSimpleClusterAdvancedSetting"
            },
            "type": "array"
          },
          "antiBot": {
            "type": "boolean"
          },
          "antiVirus": {
            "type": "boolean"
          },
          "applicationControl": {
            "type": "boolean"
          },
          "clusterMode": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "contentAwareness": {
            "type": "boolean"
          },
          "dataAwareness": {
            "type": "boolean"
          },
          "dynamicIp": {
            "type": "boolean"
          },
          "enableHttpsInspection": {
            "type": "boolean"
          },
          "fetchPolicies": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "firewall": {
            "type": "boolean"
          },
          "firewallSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "geoMode": {
            "type": "boolean"
          },
          "hardware": {
            "type": "string"
          },
          "hitCount": {
            "type": "boolean"
          },
          "httpsInspections": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterHttpsInspection:getManagementSimpleClusterHttpsInspection"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "identityAwareness": {
            "type": "boolean"
          },
          "identityAwarenessSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIdentityAwarenessSetting:getManagementSimpleClusterIdentityAwarenessSetting"
            },
            "type": "array"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterInterface:getManagementSimpleClusterInterface"
            },
            "type": "array"
          },
          "ips": {
            "type": "boolean"
          },
          "ipsSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterIpsSetting:getManagementSimpleClusterIpsSetting"
            },
            "type": "array"
          },
          "ipsUpdatePolicy": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "logsSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "members": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterMember:getManagementSimpleClusterMember"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "natHideInternalInterfaces": {
            "type": "boolean"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "osName": {
            "type": "string"
          },
          "platformPortalSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterPlatformPortalSetting:getManagementSimpleClusterPlatformPortalSetting"
            },
            "type": "array"
          },
          "proxySettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "qos": {
            "type": "boolean"
          },
          "saveLogsLocally": {
            "type": "boolean"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sicName": {
            "type": "string"
          },
          "sicState": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatEmulation": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          },
          "urlFiltering": {
            "type": "boolean"
          },
          "usercheckPortalSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleClusterUsercheckPortalSetting:getManagementSimpleClusterUsercheckPortalSetting"
            },
            "type": "array"
          },
          "version": {
            "type": "string"
          },
          "vpn": {
            "type": "boolean"
          },
          "vpnSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "zeroPhishing": {
            "type": "boolean"
          },
          "zeroPhishingFqdn": {
            "type": "string"
          }
        },
        "required": [
          "advancedSettings",
          "antiBot",
          "antiVirus",
          "applicationControl",
          "clusterMode",
          "color",
          "comments",
          "contentAwareness",
          "dataAwareness",
          "dynamicIp",
          "enableHttpsInspection",
          "fetchPolicies",
          "firewall",
          "firewallSettings",
          "geoMode",
          "hardware",
          "hitCount",
          "httpsInspections",
          "id",
          "identityAwareness",
          "identityAwarenessSettings",
          "interfaces",
          "ips",
          "ipsSettings",
          "ipsUpdatePolicy",
          "ipv4Address",
          "ipv6Address",
          "logsSettings",
          "members",
          "natHideInternalInterfaces",
          "natSettings",
          "osName",
          "platformPortalSettings",
          "proxySettings",
          "qos",
          "saveLogsLocally",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "sicName",
          "sicState",
          "tags",
          "threatEmulation",
          "urlFiltering",
          "usercheckPortalSettings",
          "version",
          "vpn",
          "vpnSettings",
          "zeroPhishing",
          "zeroPhishingFqdn"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSimpleGateway:getManagementSimpleGateway": {
      "description": "This resource allows you to execute Check Point Simple Gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst simpleGatewayManagementSimpleGateway = new checkpoint.ManagementSimpleGateway(\"simple_gateway\", {\n    name: \"mygateway\",\n    ipv4Address: \"1.2.3.4\",\n    version: \"R81\",\n    sendLogsToServers: [\"logserver\"],\n});\nconst simpleGateway = checkpoint.getManagementSimpleGateway({\n    name: test.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsimple_gateway_management_simple_gateway = checkpoint.ManagementSimpleGateway(\"simple_gateway\",\n    name=\"mygateway\",\n    ipv4_address=\"1.2.3.4\",\n    version=\"R81\",\n    send_logs_to_servers=[\"logserver\"])\nsimple_gateway = checkpoint.get_management_simple_gateway(name=test[\"name\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var simpleGatewayManagementSimpleGateway = new Checkpoint.ManagementSimpleGateway(\"simple_gateway\", new()\n    {\n        Name = \"mygateway\",\n        Ipv4Address = \"1.2.3.4\",\n        Version = \"R81\",\n        SendLogsToServers = new[]\n        {\n            \"logserver\",\n        },\n    });\n\n    var simpleGateway = Checkpoint.GetManagementSimpleGateway.Invoke(new()\n    {\n        Name = test.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementSimpleGateway(ctx, \"simple_gateway\", \u0026checkpoint.ManagementSimpleGatewayArgs{\n\t\t\tName:        pulumi.String(\"mygateway\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t\tVersion:     pulumi.String(\"R81\"),\n\t\t\tSendLogsToServers: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"logserver\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_, err = checkpoint.LookupManagementSimpleGateway(ctx, \u0026checkpoint.LookupManagementSimpleGatewayArgs{\n\t\t\tName: pulumi.StringRef(test.Name),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSimpleGateway;\nimport com.pulumi.checkpoint.ManagementSimpleGatewayArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSimpleGatewayArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var simpleGatewayManagementSimpleGateway = new ManagementSimpleGateway(\"simpleGatewayManagementSimpleGateway\", ManagementSimpleGatewayArgs.builder()\n            .name(\"mygateway\")\n            .ipv4Address(\"1.2.3.4\")\n            .version(\"R81\")\n            .sendLogsToServers(\"logserver\")\n            .build());\n\n        final var simpleGateway = CheckpointFunctions.getManagementSimpleGateway(GetManagementSimpleGatewayArgs.builder()\n            .name(test.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  simpleGatewayManagementSimpleGateway:\n    type: checkpoint:ManagementSimpleGateway\n    name: simple_gateway\n    properties:\n      name: mygateway\n      ipv4Address: 1.2.3.4\n      version: R81\n      sendLogsToServers:\n        - logserver\nvariables:\n  simpleGateway:\n    fn::invoke:\n      function: checkpoint:getManagementSimpleGateway\n      arguments:\n        name: ${test.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSimpleGateway.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "ipsSettings": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIpsSettings:getManagementSimpleGatewayIpsSettings",
            "description": "Gateway IPS settings.ips_settings blocks are documented below.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSimpleGateway.\n",
        "properties": {
          "advancedSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayAdvancedSetting:getManagementSimpleGatewayAdvancedSetting"
            },
            "type": "array"
          },
          "antiBot": {
            "type": "boolean"
          },
          "antiVirus": {
            "type": "boolean"
          },
          "applicationControl": {
            "type": "boolean"
          },
          "applicationControlAndUrlFilteringSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayApplicationControlAndUrlFilteringSetting:getManagementSimpleGatewayApplicationControlAndUrlFilteringSetting"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "contentAwareness": {
            "type": "boolean"
          },
          "dynamicIp": {
            "type": "boolean"
          },
          "enableHttpsInspection": {
            "type": "boolean"
          },
          "fetchPolicies": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "firewall": {
            "type": "boolean"
          },
          "firewallSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "hardware": {
            "type": "string"
          },
          "hitCount": {
            "type": "boolean"
          },
          "httpsInspections": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayHttpsInspection:getManagementSimpleGatewayHttpsInspection"
            },
            "type": "array"
          },
          "icapServer": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "identityAwareness": {
            "type": "boolean"
          },
          "identityAwarenessSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIdentityAwarenessSetting:getManagementSimpleGatewayIdentityAwarenessSetting"
            },
            "type": "array"
          },
          "interfaces": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayInterface:getManagementSimpleGatewayInterface"
            },
            "type": "array"
          },
          "ips": {
            "type": "boolean"
          },
          "ipsSettings": {
            "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayIpsSettings:getManagementSimpleGatewayIpsSettings"
          },
          "ipsUpdatePolicy": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "logsSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "natHideInternalInterfaces": {
            "type": "boolean"
          },
          "natSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "oneTimePassword": {
            "type": "string"
          },
          "osName": {
            "type": "string"
          },
          "platformPortalSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayPlatformPortalSetting:getManagementSimpleGatewayPlatformPortalSetting"
            },
            "type": "array"
          },
          "proxySettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "qos": {
            "type": "boolean"
          },
          "saveLogsLocally": {
            "type": "boolean"
          },
          "sendAlertsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToBackupServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sendLogsToServers": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sicName": {
            "type": "string"
          },
          "sicState": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatEmulation": {
            "type": "boolean"
          },
          "threatExtraction": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          },
          "urlFiltering": {
            "type": "boolean"
          },
          "usercheckPortalSettings": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSimpleGatewayUsercheckPortalSetting:getManagementSimpleGatewayUsercheckPortalSetting"
            },
            "type": "array"
          },
          "version": {
            "type": "string"
          },
          "vpn": {
            "type": "boolean"
          },
          "vpnSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "zeroPhishing": {
            "type": "boolean"
          },
          "zeroPhishingFqdn": {
            "type": "string"
          }
        },
        "required": [
          "advancedSettings",
          "antiBot",
          "antiVirus",
          "applicationControl",
          "applicationControlAndUrlFilteringSettings",
          "color",
          "comments",
          "contentAwareness",
          "dynamicIp",
          "enableHttpsInspection",
          "fetchPolicies",
          "firewall",
          "firewallSettings",
          "hardware",
          "hitCount",
          "httpsInspections",
          "icapServer",
          "id",
          "identityAwareness",
          "identityAwarenessSettings",
          "interfaces",
          "ips",
          "ipsUpdatePolicy",
          "ipv4Address",
          "ipv6Address",
          "logsSettings",
          "natHideInternalInterfaces",
          "natSettings",
          "oneTimePassword",
          "osName",
          "platformPortalSettings",
          "proxySettings",
          "qos",
          "saveLogsLocally",
          "sendAlertsToServers",
          "sendLogsToBackupServers",
          "sendLogsToServers",
          "sicName",
          "sicState",
          "tags",
          "threatEmulation",
          "threatExtraction",
          "urlFiltering",
          "usercheckPortalSettings",
          "version",
          "vpn",
          "vpnSettings",
          "zeroPhishing",
          "zeroPhishingFqdn"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSmartConsoleIdleTimeout:getManagementSmartConsoleIdleTimeout": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSmartConsoleIdleTimeout.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSmartConsoleIdleTimeout.\n",
        "properties": {
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "timeoutDuration": {
            "type": "number"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "enabled",
          "id",
          "timeoutDuration",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSmartTask:getManagementSmartTask": {
      "description": "#Data Source\u003cspan pulumi-lang-nodejs=\" checkpoint.ManagementSmartTask\n\" pulumi-lang-dotnet=\" checkpoint.ManagementSmartTask\n\" pulumi-lang-go=\" ManagementSmartTask\n\" pulumi-lang-python=\" ManagementSmartTask\n\" pulumi-lang-yaml=\" checkpoint.ManagementSmartTask\n\" pulumi-lang-java=\" checkpoint.ManagementSmartTask\n\"\u003e checkpoint.ManagementSmartTask\n\u003c/span\u003e\nTUse this data source to get information on an existing Check Point Smart Task.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst smartTask = new checkpoint.ManagementSmartTask(\"smart_task\", {\n    name: \"smt\",\n    trigger: \"Before Publish\",\n    description: \"my smart task\",\n    action: {\n        sendWebRequest: {\n            url: \"https://demo.example.com/policy-installation-reports\",\n            fingerprint: \"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\",\n            overrideProxy: true,\n            proxyUrl: \"https://demo.example.com/policy-installation-reports\",\n            timeOut: 200,\n            sharedSecret: \" secret\",\n        },\n    },\n    enabled: true,\n});\nconst dataSmartTask = checkpoint.getManagementSmartTaskOutput({\n    name: smartTask.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nsmart_task = checkpoint.ManagementSmartTask(\"smart_task\",\n    name=\"smt\",\n    trigger=\"Before Publish\",\n    description=\"my smart task\",\n    action={\n        \"send_web_request\": {\n            \"url\": \"https://demo.example.com/policy-installation-reports\",\n            \"fingerprint\": \"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\",\n            \"override_proxy\": True,\n            \"proxy_url\": \"https://demo.example.com/policy-installation-reports\",\n            \"time_out\": 200,\n            \"shared_secret\": \" secret\",\n        },\n    },\n    enabled=True)\ndata_smart_task = checkpoint.get_management_smart_task_output(name=smart_task.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var smartTask = new Checkpoint.ManagementSmartTask(\"smart_task\", new()\n    {\n        Name = \"smt\",\n        Trigger = \"Before Publish\",\n        Description = \"my smart task\",\n        Action = new Checkpoint.Inputs.ManagementSmartTaskActionArgs\n        {\n            SendWebRequest = new Checkpoint.Inputs.ManagementSmartTaskActionSendWebRequestArgs\n            {\n                Url = \"https://demo.example.com/policy-installation-reports\",\n                Fingerprint = \"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\",\n                OverrideProxy = true,\n                ProxyUrl = \"https://demo.example.com/policy-installation-reports\",\n                TimeOut = 200,\n                SharedSecret = \" secret\",\n            },\n        },\n        Enabled = true,\n    });\n\n    var dataSmartTask = Checkpoint.GetManagementSmartTask.Invoke(new()\n    {\n        Name = smartTask.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tsmartTask, err := checkpoint.NewManagementSmartTask(ctx, \"smart_task\", \u0026checkpoint.ManagementSmartTaskArgs{\n\t\t\tName:        pulumi.String(\"smt\"),\n\t\t\tTrigger:     pulumi.String(\"Before Publish\"),\n\t\t\tDescription: pulumi.String(\"my smart task\"),\n\t\t\tAction: \u0026checkpoint.ManagementSmartTaskActionArgs{\n\t\t\t\tSendWebRequest: \u0026checkpoint.ManagementSmartTaskActionSendWebRequestArgs{\n\t\t\t\t\tUrl:           pulumi.String(\"https://demo.example.com/policy-installation-reports\"),\n\t\t\t\t\tFingerprint:   pulumi.String(\"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\"),\n\t\t\t\t\tOverrideProxy: pulumi.Bool(true),\n\t\t\t\t\tProxyUrl:      pulumi.String(\"https://demo.example.com/policy-installation-reports\"),\n\t\t\t\t\tTimeOut:       pulumi.Float64(200),\n\t\t\t\t\tSharedSecret:  pulumi.String(\" secret\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tEnabled: pulumi.Bool(true),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementSmartTaskOutput(ctx, checkpoint.GetManagementSmartTaskOutputArgs{\n\t\t\tName: smartTask.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSmartTask;\nimport com.pulumi.checkpoint.ManagementSmartTaskArgs;\nimport com.pulumi.checkpoint.inputs.ManagementSmartTaskActionArgs;\nimport com.pulumi.checkpoint.inputs.ManagementSmartTaskActionSendWebRequestArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSmartTaskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var smartTask = new ManagementSmartTask(\"smartTask\", ManagementSmartTaskArgs.builder()\n            .name(\"smt\")\n            .trigger(\"Before Publish\")\n            .description(\"my smart task\")\n            .action(ManagementSmartTaskActionArgs.builder()\n                .sendWebRequest(ManagementSmartTaskActionSendWebRequestArgs.builder()\n                    .url(\"https://demo.example.com/policy-installation-reports\")\n                    .fingerprint(\"8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\")\n                    .overrideProxy(true)\n                    .proxyUrl(\"https://demo.example.com/policy-installation-reports\")\n                    .timeOut(200.0)\n                    .sharedSecret(\" secret\")\n                    .build())\n                .build())\n            .enabled(true)\n            .build());\n\n        final var dataSmartTask = CheckpointFunctions.getManagementSmartTask(GetManagementSmartTaskArgs.builder()\n            .name(smartTask.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  smartTask:\n    type: checkpoint:ManagementSmartTask\n    name: smart_task\n    properties:\n      name: smt\n      trigger: Before Publish\n      description: my smart task\n      action:\n        sendWebRequest:\n          url: https://demo.example.com/policy-installation-reports\n          fingerprint: 8023a5652ba2c8f5b0902363a5314cd2b4fdbc5c\n          overrideProxy: true\n          proxyUrl: https://demo.example.com/policy-installation-reports\n          timeOut: 200\n          sharedSecret: ' secret'\n      enabled: true\nvariables:\n  dataSmartTask:\n    fn::invoke:\n      function: checkpoint:getManagementSmartTask\n      arguments:\n        name: ${smartTask.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSmartTask.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSmartTask.\n",
        "properties": {
          "actions": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSmartTaskAction:getManagementSmartTaskAction"
            },
            "type": "array"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "customData": {
            "type": "string"
          },
          "description": {
            "type": "string"
          },
          "enabled": {
            "type": "boolean"
          },
          "failOpen": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "ignoreErrors": {
            "type": "boolean"
          },
          "ignoreWarnings": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "trigger": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "actions",
          "color",
          "comments",
          "customData",
          "description",
          "enabled",
          "failOpen",
          "id",
          "ignoreErrors",
          "ignoreWarnings",
          "tags",
          "trigger"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSmartTaskTrigger:getManagementSmartTaskTrigger": {
      "description": "Use this data source to get information on an existing Check Point Smart Task Trigger.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataSmartTaskTrigger = checkpoint.getManagementSmartTaskTrigger({\n    name: \"After Approve\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_smart_task_trigger = checkpoint.get_management_smart_task_trigger(name=\"After Approve\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataSmartTaskTrigger = Checkpoint.GetManagementSmartTaskTrigger.Invoke(new()\n    {\n        Name = \"After Approve\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementSmartTaskTrigger(ctx, \u0026checkpoint.GetManagementSmartTaskTriggerArgs{\n\t\t\tName: pulumi.StringRef(\"After Approve\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSmartTaskTriggerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataSmartTaskTrigger = CheckpointFunctions.getManagementSmartTaskTrigger(GetManagementSmartTaskTriggerArgs.builder()\n            .name(\"After Approve\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataSmartTaskTrigger:\n    fn::invoke:\n      function: checkpoint:getManagementSmartTaskTrigger\n      arguments:\n        name: After Approve\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSmartTaskTrigger.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSmartTaskTrigger.\n",
        "properties": {
          "beforeOperation": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "beforeOperation",
          "id",
          "type"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSmtpServer:getManagementSmtpServer": {
      "description": "Use this data source to get information on an existing Check Point Smtp Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementSmtpServer(\"example\", {\n    name: \"SMTP1\",\n    server: \"smtp.example.com\",\n    port: 25,\n});\nconst dataSmtpServer = checkpoint.getManagementSmtpServerOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementSmtpServer(\"example\",\n    name=\"SMTP1\",\n    server=\"smtp.example.com\",\n    port=25)\ndata_smtp_server = checkpoint.get_management_smtp_server_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementSmtpServer(\"example\", new()\n    {\n        Name = \"SMTP1\",\n        Server = \"smtp.example.com\",\n        Port = 25,\n    });\n\n    var dataSmtpServer = Checkpoint.GetManagementSmtpServer.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementSmtpServer(ctx, \"example\", \u0026checkpoint.ManagementSmtpServerArgs{\n\t\t\tName:   pulumi.String(\"SMTP1\"),\n\t\t\tServer: pulumi.String(\"smtp.example.com\"),\n\t\t\tPort:   pulumi.Float64(25),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementSmtpServerOutput(ctx, checkpoint.GetManagementSmtpServerOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementSmtpServer;\nimport com.pulumi.checkpoint.ManagementSmtpServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSmtpServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementSmtpServer(\"example\", ManagementSmtpServerArgs.builder()\n            .name(\"SMTP1\")\n            .server(\"smtp.example.com\")\n            .port(25.0)\n            .build());\n\n        final var dataSmtpServer = CheckpointFunctions.getManagementSmtpServer(GetManagementSmtpServerArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementSmtpServer\n    properties:\n      name: SMTP1\n      server: smtp.example.com\n      port: 25\nvariables:\n  dataSmtpServer:\n    fn::invoke:\n      function: checkpoint:getManagementSmtpServer\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSmtpServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSmtpServer.\n",
        "properties": {
          "authentication": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "domainsToProcesses": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "encryption": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "password": {
            "type": "string"
          },
          "port": {
            "type": "number"
          },
          "server": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "authentication",
          "color",
          "comments",
          "domainsToProcesses",
          "encryption",
          "id",
          "password",
          "port",
          "server",
          "tags",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSubordinateCa:getManagementSubordinateCa": {
      "description": "Use this data source to get information on an existing Check Point Subordinate Ca.\n\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSubordinateCa.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSubordinateCa.\n",
        "properties": {
          "automaticEnrollments": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementSubordinateCaAutomaticEnrollment:getManagementSubordinateCaAutomaticEnrollment"
            },
            "type": "array"
          },
          "base64Certificate": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "automaticEnrollments",
          "base64Certificate",
          "color",
          "comments",
          "groups",
          "icon",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSyncWithUserCenter:getManagementSyncWithUserCenter": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSyncWithUserCenter.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSyncWithUserCenter.\n",
        "properties": {
          "enabled": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "enabled",
          "id",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementSyslogServer:getManagementSyslogServer": {
      "description": "Use this data source to get information on an existing Syslog Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataSyslogServer = checkpoint.getManagementSyslogServer({\n    name: \"syslog_server_example\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_syslog_server = checkpoint.get_management_syslog_server(name=\"syslog_server_example\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataSyslogServer = Checkpoint.GetManagementSyslogServer.Invoke(new()\n    {\n        Name = \"syslog_server_example\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementSyslogServer(ctx, \u0026checkpoint.LookupManagementSyslogServerArgs{\n\t\t\tName: pulumi.StringRef(\"syslog_server_example\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementSyslogServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataSyslogServer = CheckpointFunctions.getManagementSyslogServer(GetManagementSyslogServerArgs.builder()\n            .name(\"syslog_server_example\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataSyslogServer:\n    fn::invoke:\n      function: checkpoint:getManagementSyslogServer\n      arguments:\n        name: syslog_server_example\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementSyslogServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object UID.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementSyslogServer.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "host": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "port": {
            "type": "number"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "version": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "host",
          "icon",
          "id",
          "port",
          "tags",
          "version"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTacacsGroup:getManagementTacacsGroup": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTacacsGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTacacsGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTacacsServer:getManagementTacacsServer": {
      "description": "Use this data source to get information on an existing Check Point Tacacs Server.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst host = new checkpoint.ManagementHost(\"host\", {\n    name: \"My Host\",\n    ipv4Address: \"1.2.3.4\",\n});\nconst tacacsServer = new checkpoint.ManagementTacacsServer(\"tacacs_server\", {\n    name: \"My Tacacs Server\",\n    server: \"1.2.3.4\",\n});\nconst dataTacacsServer = checkpoint.getManagementTacacsServerOutput({\n    name: tacacsServer.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nhost = checkpoint.ManagementHost(\"host\",\n    name=\"My Host\",\n    ipv4_address=\"1.2.3.4\")\ntacacs_server = checkpoint.ManagementTacacsServer(\"tacacs_server\",\n    name=\"My Tacacs Server\",\n    server=\"1.2.3.4\")\ndata_tacacs_server = checkpoint.get_management_tacacs_server_output(name=tacacs_server.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var host = new Checkpoint.ManagementHost(\"host\", new()\n    {\n        Name = \"My Host\",\n        Ipv4Address = \"1.2.3.4\",\n    });\n\n    var tacacsServer = new Checkpoint.ManagementTacacsServer(\"tacacs_server\", new()\n    {\n        Name = \"My Tacacs Server\",\n        Server = \"1.2.3.4\",\n    });\n\n    var dataTacacsServer = Checkpoint.GetManagementTacacsServer.Invoke(new()\n    {\n        Name = tacacsServer.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.NewManagementHost(ctx, \"host\", \u0026checkpoint.ManagementHostArgs{\n\t\t\tName:        pulumi.String(\"My Host\"),\n\t\t\tIpv4Address: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttacacsServer, err := checkpoint.NewManagementTacacsServer(ctx, \"tacacs_server\", \u0026checkpoint.ManagementTacacsServerArgs{\n\t\t\tName:   pulumi.String(\"My Tacacs Server\"),\n\t\t\tServer: pulumi.String(\"1.2.3.4\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementTacacsServerOutput(ctx, checkpoint.GetManagementTacacsServerOutputArgs{\n\t\t\tName: tacacsServer.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementHost;\nimport com.pulumi.checkpoint.ManagementHostArgs;\nimport com.pulumi.checkpoint.ManagementTacacsServer;\nimport com.pulumi.checkpoint.ManagementTacacsServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementTacacsServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var host = new ManagementHost(\"host\", ManagementHostArgs.builder()\n            .name(\"My Host\")\n            .ipv4Address(\"1.2.3.4\")\n            .build());\n\n        var tacacsServer = new ManagementTacacsServer(\"tacacsServer\", ManagementTacacsServerArgs.builder()\n            .name(\"My Tacacs Server\")\n            .server(\"1.2.3.4\")\n            .build());\n\n        final var dataTacacsServer = CheckpointFunctions.getManagementTacacsServer(GetManagementTacacsServerArgs.builder()\n            .name(tacacsServer.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  host:\n    type: checkpoint:ManagementHost\n    properties:\n      name: My Host\n      ipv4Address: 1.2.3.4\n  tacacsServer:\n    type: checkpoint:ManagementTacacsServer\n    name: tacacs_server\n    properties:\n      name: My Tacacs Server\n      server: 1.2.3.4\nvariables:\n  dataTacacsServer:\n    fn::invoke:\n      function: checkpoint:getManagementTacacsServer\n      arguments:\n        name: ${tacacsServer.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTacacsServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTacacsServer.\n",
        "properties": {
          "encryption": {
            "type": "boolean"
          },
          "groups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "priority": {
            "type": "number"
          },
          "server": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "serverType": {
            "type": "string"
          },
          "service": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "encryption",
          "groups",
          "id",
          "priority",
          "server",
          "serverType",
          "service"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTag:getManagementTag": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTag.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTag.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTask:getManagementTask": {
      "description": "Use this data source to get information on an existing Check Point Task.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = checkpoint.getManagementTask({\n    taskIds: [\"6682b963-fe1a-4a75-a86c-91cb13e91d83\"],\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.get_management_task(task_ids=[\"6682b963-fe1a-4a75-a86c-91cb13e91d83\"])\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = Checkpoint.GetManagementTask.Invoke(new()\n    {\n        TaskIds = new[]\n        {\n            \"6682b963-fe1a-4a75-a86c-91cb13e91d83\",\n        },\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementTask(ctx, \u0026checkpoint.GetManagementTaskArgs{\n\t\t\tTaskIds: []string{\n\t\t\t\t\"6682b963-fe1a-4a75-a86c-91cb13e91d83\",\n\t\t\t},\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementTaskArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var example = CheckpointFunctions.getManagementTask(GetManagementTaskArgs.builder()\n            .taskIds(\"6682b963-fe1a-4a75-a86c-91cb13e91d83\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  example:\n    fn::invoke:\n      function: checkpoint:getManagementTask\n      arguments:\n        taskIds:\n          - 6682b963-fe1a-4a75-a86c-91cb13e91d83\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTask.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "taskIds": {
            "type": "array",
            "items": {
              "type": "string"
            },
            "description": "Unique identifier of one or more tasks.\n"
          }
        },
        "type": "object",
        "required": [
          "taskIds"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTask.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "response": {
            "type": "string"
          },
          "taskIds": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "tasks": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementTaskTask:getManagementTaskTask"
            },
            "type": "array"
          }
        },
        "required": [
          "id",
          "response",
          "taskIds",
          "tasks"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatAdvancedSettings:getManagementThreatAdvancedSettings": {
      "description": "Use this data source to get information on an existing Check Point Threat Advanced Settings.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataThreatAdvancedSettings = checkpoint.getManagementThreatAdvancedSettings({});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_threat_advanced_settings = checkpoint.get_management_threat_advanced_settings()\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataThreatAdvancedSettings = Checkpoint.GetManagementThreatAdvancedSettings.Invoke();\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementThreatAdvancedSettings(ctx, \u0026checkpoint.GetManagementThreatAdvancedSettingsArgs{}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatAdvancedSettingsArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataThreatAdvancedSettings = CheckpointFunctions.getManagementThreatAdvancedSettings(GetManagementThreatAdvancedSettingsArgs.builder()\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataThreatAdvancedSettings:\n    fn::invoke:\n      function: checkpoint:getManagementThreatAdvancedSettings\n      arguments: {}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatAdvancedSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatAdvancedSettings.\n",
        "properties": {
          "feedRetrievingInterval": {
            "type": "string"
          },
          "httpiNonStandardPorts": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          },
          "internalErrorFailMode": {
            "type": "string"
          },
          "logUnificationTimeout": {
            "type": "number"
          },
          "resourceClassification": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "feedRetrievingInterval",
          "httpiNonStandardPorts",
          "id",
          "internalErrorFailMode",
          "logUnificationTimeout",
          "resourceClassification",
          "type",
          "uid"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatException:getManagementThreatException": {
      "description": "This resource allows you to execute Check Point Threat Exception.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst threatRule = new checkpoint.ManagementThreatRule(\"threat_rule\", {\n    name: \"threat rule\",\n    layer: \"Standard Threat Prevention\",\n    position: {\n        top: \"top\",\n    },\n});\nconst threatException = new checkpoint.ManagementThreatException(\"threat_exception\", {\n    name: \"threat exception\",\n    layer: \"Standard Threat Prevention\",\n    position: {\n        top: \"top\",\n    },\n    ruleName: threatRule.name,\n});\nconst dataThreatException = pulumi.all([threatException.name, threatException.layer, threatException.ruleName]).apply(([name, layer, ruleName]) =\u003e checkpoint.getManagementThreatExceptionOutput({\n    name: name,\n    layer: layer,\n    ruleName: ruleName,\n}));\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nthreat_rule = checkpoint.ManagementThreatRule(\"threat_rule\",\n    name=\"threat rule\",\n    layer=\"Standard Threat Prevention\",\n    position={\n        \"top\": \"top\",\n    })\nthreat_exception = checkpoint.ManagementThreatException(\"threat_exception\",\n    name=\"threat exception\",\n    layer=\"Standard Threat Prevention\",\n    position={\n        \"top\": \"top\",\n    },\n    rule_name=threat_rule.name)\ndata_threat_exception = pulumi.Output.all(\n    name=threat_exception.name,\n    layer=threat_exception.layer,\n    rule_name=threat_exception.rule_name\n).apply(lambda resolved_outputs: checkpoint.get_management_threat_exception_output(name=resolved_outputs['name'],\n    layer=resolved_outputs['layer'],\n    rule_name=resolved_outputs['rule_name']))\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var threatRule = new Checkpoint.ManagementThreatRule(\"threat_rule\", new()\n    {\n        Name = \"threat rule\",\n        Layer = \"Standard Threat Prevention\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var threatException = new Checkpoint.ManagementThreatException(\"threat_exception\", new()\n    {\n        Name = \"threat exception\",\n        Layer = \"Standard Threat Prevention\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n        RuleName = threatRule.Name,\n    });\n\n    var dataThreatException = Checkpoint.GetManagementThreatException.Invoke(new()\n    {\n        Name = threatException.Name,\n        Layer = threatException.Layer,\n        RuleName = threatException.RuleName,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthreatRule, err := checkpoint.NewManagementThreatRule(ctx, \"threat_rule\", \u0026checkpoint.ManagementThreatRuleArgs{\n\t\t\tName:  pulumi.String(\"threat rule\"),\n\t\t\tLayer: pulumi.String(\"Standard Threat Prevention\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tthreatException, err := checkpoint.NewManagementThreatException(ctx, \"threat_exception\", \u0026checkpoint.ManagementThreatExceptionArgs{\n\t\t\tName:  pulumi.String(\"threat exception\"),\n\t\t\tLayer: pulumi.String(\"Standard Threat Prevention\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t\tRuleName: threatRule.Name,\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = pulumi.All(threatException.Name, threatException.Layer, threatException.RuleName).ApplyT(func(_args []interface{}) (checkpoint.GetManagementThreatExceptionResult, error) {\n\t\t\tname := _args[0].(string)\n\t\t\tlayer := _args[1].(*string)\n\t\t\truleName := _args[2].(*string)\n\t\t\treturn checkpoint.GetManagementThreatExceptionResult(interface{}(checkpoint.LookupManagementThreatExceptionOutput(ctx, checkpoint.GetManagementThreatExceptionOutputArgs{\n\t\t\t\tName:     name,\n\t\t\t\tLayer:    layer,\n\t\t\t\tRuleName: ruleName,\n\t\t\t}, nil))), nil\n\t\t}).(checkpoint.GetManagementThreatExceptionResultOutput)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatRule;\nimport com.pulumi.checkpoint.ManagementThreatRuleArgs;\nimport com.pulumi.checkpoint.ManagementThreatException;\nimport com.pulumi.checkpoint.ManagementThreatExceptionArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatExceptionArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var threatRule = new ManagementThreatRule(\"threatRule\", ManagementThreatRuleArgs.builder()\n            .name(\"threat rule\")\n            .layer(\"Standard Threat Prevention\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        var threatException = new ManagementThreatException(\"threatException\", ManagementThreatExceptionArgs.builder()\n            .name(\"threat exception\")\n            .layer(\"Standard Threat Prevention\")\n            .position(Map.of(\"top\", \"top\"))\n            .ruleName(threatRule.name())\n            .build());\n\n        final var dataThreatException = Output.tuple(threatException.name(), threatException.layer(), threatException.ruleName()).applyValue(values -\u003e {\n            var name = values.t1;\n            var layer = values.t2;\n            var ruleName = values.t3;\n            return CheckpointFunctions.getManagementThreatException(GetManagementThreatExceptionArgs.builder()\n                .name(name)\n                .layer(layer)\n                .ruleName(ruleName)\n                .build());\n        });\n\n    }\n}\n```\n```yaml\nresources:\n  threatRule:\n    type: checkpoint:ManagementThreatRule\n    name: threat_rule\n    properties:\n      name: threat rule\n      layer: Standard Threat Prevention\n      position:\n        top: top\n  threatException:\n    type: checkpoint:ManagementThreatException\n    name: threat_exception\n    properties:\n      name: threat exception\n      layer: Standard Threat Prevention\n      position:\n        top: top\n      ruleName: ${threatRule.name}\nvariables:\n  dataThreatException:\n    fn::invoke:\n      function: checkpoint:getManagementThreatException\n      arguments:\n        name: ${threatException.name}\n        layer: ${threatException.layer}\n        ruleName: ${threatException.ruleName}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatException.\n",
        "properties": {
          "exceptionGroupName": {
            "type": "string",
            "description": "The name of the exception-group.\n"
          },
          "exceptionGroupUid": {
            "type": "string",
            "description": "The UID of the exception-group.\n"
          },
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "The name of the exception.\n"
          },
          "ruleName": {
            "type": "string",
            "description": "The name of the parent rule.\n"
          },
          "ruleUid": {
            "type": "string",
            "description": "The UID of the parent rule.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "layer"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatException.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "destinationNegate": {
            "type": "boolean"
          },
          "destinations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "enabled": {
            "type": "boolean"
          },
          "exceptionGroupName": {
            "type": "string"
          },
          "exceptionGroupUid": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "layer": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "owner": {
            "type": "string"
          },
          "protectedScopeNegate": {
            "type": "boolean"
          },
          "protectedScopes": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "protectionOrSites": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "ruleName": {
            "type": "string"
          },
          "ruleUid": {
            "type": "string"
          },
          "serviceNegate": {
            "type": "boolean"
          },
          "services": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sourceNegate": {
            "type": "boolean"
          },
          "sources": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "track": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "action",
          "comments",
          "destinationNegate",
          "destinations",
          "enabled",
          "id",
          "installOns",
          "layer",
          "owner",
          "protectedScopeNegate",
          "protectedScopes",
          "protectionOrSites",
          "serviceNegate",
          "services",
          "sourceNegate",
          "sources",
          "track"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatIocFeed:getManagementThreatIocFeed": {
      "description": "Use this data source to get information on an existing Check Point Threat Ioc Feed.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementThreatIocFeed(\"example\", {\n    name: \"ioc_feed\",\n    feedUrl: \"https://www.feedsresource.com/resource\",\n    action: \"Prevent\",\n});\nconst dataThreatIocFeed = checkpoint.getManagementThreatIocFeedOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementThreatIocFeed(\"example\",\n    name=\"ioc_feed\",\n    feed_url=\"https://www.feedsresource.com/resource\",\n    action=\"Prevent\")\ndata_threat_ioc_feed = checkpoint.get_management_threat_ioc_feed_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementThreatIocFeed(\"example\", new()\n    {\n        Name = \"ioc_feed\",\n        FeedUrl = \"https://www.feedsresource.com/resource\",\n        Action = \"Prevent\",\n    });\n\n    var dataThreatIocFeed = Checkpoint.GetManagementThreatIocFeed.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementThreatIocFeed(ctx, \"example\", \u0026checkpoint.ManagementThreatIocFeedArgs{\n\t\t\tName:    pulumi.String(\"ioc_feed\"),\n\t\t\tFeedUrl: pulumi.String(\"https://www.feedsresource.com/resource\"),\n\t\t\tAction:  pulumi.String(\"Prevent\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementThreatIocFeedOutput(ctx, checkpoint.GetManagementThreatIocFeedOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatIocFeed;\nimport com.pulumi.checkpoint.ManagementThreatIocFeedArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatIocFeedArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementThreatIocFeed(\"example\", ManagementThreatIocFeedArgs.builder()\n            .name(\"ioc_feed\")\n            .feedUrl(\"https://www.feedsresource.com/resource\")\n            .action(\"Prevent\")\n            .build());\n\n        final var dataThreatIocFeed = CheckpointFunctions.getManagementThreatIocFeed(GetManagementThreatIocFeedArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementThreatIocFeed\n    properties:\n      name: ioc_feed\n      feedUrl: https://www.feedsresource.com/resource\n      action: Prevent\nvariables:\n  dataThreatIocFeed:\n    fn::invoke:\n      function: checkpoint:getManagementThreatIocFeed\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatIocFeed.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatIocFeed.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "certificateId": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "customComment": {
            "type": "number"
          },
          "customConfidence": {
            "type": "number"
          },
          "customHeaders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatIocFeedCustomHeader:getManagementThreatIocFeedCustomHeader"
            },
            "type": "array"
          },
          "customName": {
            "type": "number"
          },
          "customSeverity": {
            "type": "number"
          },
          "customType": {
            "type": "number"
          },
          "customValue": {
            "type": "number"
          },
          "enabled": {
            "type": "boolean"
          },
          "feedType": {
            "type": "string"
          },
          "feedUrl": {
            "type": "string"
          },
          "fieldsDelimiter": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ignoreLinesThatStartWith": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "password": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "useCustomFeedSettings": {
            "type": "boolean"
          },
          "useGatewayProxy": {
            "type": "boolean"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "action",
          "certificateId",
          "color",
          "comments",
          "customComment",
          "customConfidence",
          "customHeaders",
          "customName",
          "customSeverity",
          "customType",
          "customValue",
          "enabled",
          "feedType",
          "feedUrl",
          "fieldsDelimiter",
          "id",
          "ignoreLinesThatStartWith",
          "password",
          "tags",
          "useCustomFeedSettings",
          "useGatewayProxy",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatLayer:getManagementThreatLayer": {
      "description": "Use this data source to get information on an existing Check Point Threat Layer.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementThreatLayer(\"example\", {name: \"New Layer 1\"});\nconst dataThreatLayer = checkpoint.getManagementThreatLayerOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementThreatLayer(\"example\", name=\"New Layer 1\")\ndata_threat_layer = checkpoint.get_management_threat_layer_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementThreatLayer(\"example\", new()\n    {\n        Name = \"New Layer 1\",\n    });\n\n    var dataThreatLayer = Checkpoint.GetManagementThreatLayer.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementThreatLayer(ctx, \"example\", \u0026checkpoint.ManagementThreatLayerArgs{\n\t\t\tName: pulumi.String(\"New Layer 1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementThreatLayerOutput(ctx, checkpoint.GetManagementThreatLayerOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatLayer;\nimport com.pulumi.checkpoint.ManagementThreatLayerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatLayerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementThreatLayer(\"example\", ManagementThreatLayerArgs.builder()\n            .name(\"New Layer 1\")\n            .build());\n\n        final var dataThreatLayer = CheckpointFunctions.getManagementThreatLayer(GetManagementThreatLayerArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementThreatLayer\n    properties:\n      name: New Layer 1\nvariables:\n  dataThreatLayer:\n    fn::invoke:\n      function: checkpoint:getManagementThreatLayer\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatLayer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatLayer.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "ipsLayer": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "parentLayer": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "id",
          "ipsLayer",
          "parentLayer",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatProfile:getManagementThreatProfile": {
      "description": "This resource allows you to execute Check Point Threat Profile.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst threatProfile = new checkpoint.ManagementThreatProfile(\"threat_profile\", {\n    name: \"my threat profile\",\n    activeProtectionsPerformanceImpact: \"high\",\n    activeProtectionsSeverity: \"Critical\",\n});\nconst testThreatProfile = checkpoint.getManagementThreatProfileOutput({\n    name: threatProfile.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nthreat_profile = checkpoint.ManagementThreatProfile(\"threat_profile\",\n    name=\"my threat profile\",\n    active_protections_performance_impact=\"high\",\n    active_protections_severity=\"Critical\")\ntest_threat_profile = checkpoint.get_management_threat_profile_output(name=threat_profile.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var threatProfile = new Checkpoint.ManagementThreatProfile(\"threat_profile\", new()\n    {\n        Name = \"my threat profile\",\n        ActiveProtectionsPerformanceImpact = \"high\",\n        ActiveProtectionsSeverity = \"Critical\",\n    });\n\n    var testThreatProfile = Checkpoint.GetManagementThreatProfile.Invoke(new()\n    {\n        Name = threatProfile.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tthreatProfile, err := checkpoint.NewManagementThreatProfile(ctx, \"threat_profile\", \u0026checkpoint.ManagementThreatProfileArgs{\n\t\t\tName:                               pulumi.String(\"my threat profile\"),\n\t\t\tActiveProtectionsPerformanceImpact: pulumi.String(\"high\"),\n\t\t\tActiveProtectionsSeverity:          pulumi.String(\"Critical\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementThreatProfileOutput(ctx, checkpoint.GetManagementThreatProfileOutputArgs{\n\t\t\tName: threatProfile.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatProfile;\nimport com.pulumi.checkpoint.ManagementThreatProfileArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatProfileArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var threatProfile = new ManagementThreatProfile(\"threatProfile\", ManagementThreatProfileArgs.builder()\n            .name(\"my threat profile\")\n            .activeProtectionsPerformanceImpact(\"high\")\n            .activeProtectionsSeverity(\"Critical\")\n            .build());\n\n        final var testThreatProfile = CheckpointFunctions.getManagementThreatProfile(GetManagementThreatProfileArgs.builder()\n            .name(threatProfile.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  threatProfile:\n    type: checkpoint:ManagementThreatProfile\n    name: threat_profile\n    properties:\n      name: my threat profile\n      activeProtectionsPerformanceImpact: high\n      activeProtectionsSeverity: Critical\nvariables:\n  testThreatProfile:\n    fn::invoke:\n      function: checkpoint:getManagementThreatProfile\n      arguments:\n        name: ${threatProfile.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatProfile.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatProfile.\n",
        "properties": {
          "activateProtectionsByExtendedAttributes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatProfileActivateProtectionsByExtendedAttribute:getManagementThreatProfileActivateProtectionsByExtendedAttribute"
            },
            "type": "array"
          },
          "activeProtectionsPerformanceImpact": {
            "type": "string"
          },
          "activeProtectionsSeverity": {
            "type": "string"
          },
          "antiBot": {
            "type": "boolean"
          },
          "antiVirus": {
            "type": "boolean"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "confidenceLevelHigh": {
            "type": "string"
          },
          "confidenceLevelLow": {
            "type": "string"
          },
          "confidenceLevelMedium": {
            "type": "string"
          },
          "deactivateProtectionsByExtendedAttributes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatProfileDeactivateProtectionsByExtendedAttribute:getManagementThreatProfileDeactivateProtectionsByExtendedAttribute"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "indicatorOverrides": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatProfileIndicatorOverride:getManagementThreatProfileIndicatorOverride"
            },
            "type": "array"
          },
          "ips": {
            "type": "boolean"
          },
          "ipsSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "maliciousMailPolicySettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "name": {
            "type": "string"
          },
          "overrides": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatProfileOverride:getManagementThreatProfileOverride"
            },
            "type": "array"
          },
          "scanMaliciousLinks": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "threatEmulation": {
            "type": "boolean"
          },
          "threatExtraction": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          },
          "useExtendedAttributes": {
            "type": "boolean"
          },
          "useIndicators": {
            "type": "boolean"
          },
          "zeroPhishing": {
            "type": "boolean"
          }
        },
        "required": [
          "activateProtectionsByExtendedAttributes",
          "activeProtectionsPerformanceImpact",
          "activeProtectionsSeverity",
          "antiBot",
          "antiVirus",
          "color",
          "comments",
          "confidenceLevelHigh",
          "confidenceLevelLow",
          "confidenceLevelMedium",
          "deactivateProtectionsByExtendedAttributes",
          "id",
          "indicatorOverrides",
          "ips",
          "ipsSettings",
          "maliciousMailPolicySettings",
          "overrides",
          "scanMaliciousLinks",
          "tags",
          "threatEmulation",
          "threatExtraction",
          "useExtendedAttributes",
          "useIndicators",
          "zeroPhishing"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatRule:getManagementThreatRule": {
      "description": "This resource allows you to execute Check Point Threat Rule.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testManagementThreatRule = new checkpoint.ManagementThreatRule(\"test\", {\n    name: \"threat rule\",\n    layer: \"Standard Threat Prevention\",\n    position: {\n        top: \"top\",\n    },\n});\nconst test = checkpoint.getManagementThreatRuleOutput({\n    layer: testManagementThreatRule.layer,\n    name: testManagementThreatRule.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_management_threat_rule = checkpoint.ManagementThreatRule(\"test\",\n    name=\"threat rule\",\n    layer=\"Standard Threat Prevention\",\n    position={\n        \"top\": \"top\",\n    })\ntest = checkpoint.get_management_threat_rule_output(layer=test_management_threat_rule.layer,\n    name=test_management_threat_rule.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testManagementThreatRule = new Checkpoint.ManagementThreatRule(\"test\", new()\n    {\n        Name = \"threat rule\",\n        Layer = \"Standard Threat Prevention\",\n        Position = \n        {\n            { \"top\", \"top\" },\n        },\n    });\n\n    var test = Checkpoint.GetManagementThreatRule.Invoke(new()\n    {\n        Layer = testManagementThreatRule.Layer,\n        Name = testManagementThreatRule.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestManagementThreatRule, err := checkpoint.NewManagementThreatRule(ctx, \"test\", \u0026checkpoint.ManagementThreatRuleArgs{\n\t\t\tName:  pulumi.String(\"threat rule\"),\n\t\t\tLayer: pulumi.String(\"Standard Threat Prevention\"),\n\t\t\tPosition: pulumi.StringMap{\n\t\t\t\t\"top\": pulumi.String(\"top\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementThreatRuleOutput(ctx, checkpoint.GetManagementThreatRuleOutputArgs{\n\t\t\tLayer: testManagementThreatRule.Layer,\n\t\t\tName:  testManagementThreatRule.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementThreatRule;\nimport com.pulumi.checkpoint.ManagementThreatRuleArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatRuleArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testManagementThreatRule = new ManagementThreatRule(\"testManagementThreatRule\", ManagementThreatRuleArgs.builder()\n            .name(\"threat rule\")\n            .layer(\"Standard Threat Prevention\")\n            .position(Map.of(\"top\", \"top\"))\n            .build());\n\n        final var test = CheckpointFunctions.getManagementThreatRule(GetManagementThreatRuleArgs.builder()\n            .layer(testManagementThreatRule.layer())\n            .name(testManagementThreatRule.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testManagementThreatRule:\n    type: checkpoint:ManagementThreatRule\n    name: test\n    properties:\n      name: threat rule\n      layer: Standard Threat Prevention\n      position:\n        top: top\nvariables:\n  test:\n    fn::invoke:\n      function: checkpoint:getManagementThreatRule\n      arguments:\n        layer: ${testManagementThreatRule.layer}\n        name: ${testManagementThreatRule.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatRule.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "layer": {
            "type": "string",
            "description": "Layer that the rule belongs to identified by the name or UID.\n"
          },
          "name": {
            "type": "string",
            "description": "Rule name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object",
        "required": [
          "layer"
        ]
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatRule.\n",
        "properties": {
          "action": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "destinationNegate": {
            "type": "boolean"
          },
          "destinations": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "enabled": {
            "type": "boolean"
          },
          "exceptions": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "installOns": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "layer": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "protectedScopeNegate": {
            "type": "boolean"
          },
          "protectedScopes": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "serviceNegate": {
            "type": "boolean"
          },
          "services": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "sourceNegate": {
            "type": "boolean"
          },
          "sources": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "track": {
            "type": "string"
          },
          "trackSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "action",
          "comments",
          "destinationNegate",
          "destinations",
          "enabled",
          "exceptions",
          "id",
          "installOns",
          "layer",
          "protectedScopeNegate",
          "protectedScopes",
          "serviceNegate",
          "services",
          "sourceNegate",
          "sources",
          "track",
          "trackSettings"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatRuleExceptionRulebase:getManagementThreatRuleExceptionRulebase": {
      "description": "Use this data source to get information on an existing Check Point threat-rule-exception-rulebase\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst base1 = checkpoint.getManagementThreatRuleExceptionRulebase({\n    name: \"Standard Threat Prevention\",\n    ruleNumber: \"1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nbase1 = checkpoint.get_management_threat_rule_exception_rulebase(name=\"Standard Threat Prevention\",\n    rule_number=\"1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var base1 = Checkpoint.GetManagementThreatRuleExceptionRulebase.Invoke(new()\n    {\n        Name = \"Standard Threat Prevention\",\n        RuleNumber = \"1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementThreatRuleExceptionRulebase(ctx, \u0026checkpoint.GetManagementThreatRuleExceptionRulebaseArgs{\n\t\t\tName:       pulumi.StringRef(\"Standard Threat Prevention\"),\n\t\t\tRuleNumber: pulumi.StringRef(\"1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementThreatRuleExceptionRulebaseArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var base1 = CheckpointFunctions.getManagementThreatRuleExceptionRulebase(GetManagementThreatRuleExceptionRulebaseArgs.builder()\n            .name(\"Standard Threat Prevention\")\n            .ruleNumber(\"1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  base1:\n    fn::invoke:\n      function: checkpoint:getManagementThreatRuleExceptionRulebase\n      arguments:\n        name: Standard Threat Prevention\n        ruleNumber: 1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatRuleExceptionRulebase.\n",
        "properties": {
          "filter": {
            "type": "string",
            "description": "Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.\n"
          },
          "filterSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Enable enforce end user domain.\u003cspan pulumi-lang-nodejs=\" filterSettings \" pulumi-lang-dotnet=\" FilterSettings \" pulumi-lang-go=\" filterSettings \" pulumi-lang-python=\" filter_settings \" pulumi-lang-yaml=\" filterSettings \" pulumi-lang-java=\" filterSettings \"\u003e filter_settings \u003c/span\u003eblocks are documented below.\n"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "name": {
            "type": "string",
            "description": "The name of the exception.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "order": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "ruleName": {
            "type": "string"
          },
          "ruleNumber": {
            "type": "string"
          },
          "ruleUid": {
            "type": "string"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          },
          "useObjectDictionary": {
            "type": "boolean",
            "description": "boolean flag. indicate whether to use object dictionary in the response (default true).\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatRuleExceptionRulebase.\n",
        "properties": {
          "filter": {
            "type": "string"
          },
          "filterSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "from": {
            "type": "number"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "objectsDictionaries": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatRuleExceptionRulebaseObjectsDictionary:getManagementThreatRuleExceptionRulebaseObjectsDictionary"
            },
            "type": "array"
          },
          "offset": {
            "type": "number"
          },
          "order": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "package": {
            "type": "string"
          },
          "ruleName": {
            "type": "string"
          },
          "ruleNumber": {
            "type": "string"
          },
          "ruleUid": {
            "type": "string"
          },
          "rulebases": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatRuleExceptionRulebaseRulebase:getManagementThreatRuleExceptionRulebaseRulebase"
            },
            "type": "array"
          },
          "to": {
            "type": "number"
          },
          "total": {
            "type": "number"
          },
          "uid": {
            "type": "string"
          },
          "useObjectDictionary": {
            "type": "boolean"
          }
        },
        "required": [
          "from",
          "id",
          "objectsDictionaries",
          "rulebases",
          "to",
          "total"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementThreatRulebase:getManagementThreatRulebase": {
      "description": "Use this data source to get information on an existing threat RuleBase.\n\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementThreatRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean",
            "description": "Indicates whether to dereference \"members\" field by details level for every object in reply.\n"
          },
          "filter": {
            "type": "string",
            "description": "Search expression to filter the rulebase. The provided text should be exactly the same as it would be given in Smart Console. The logical operators in the expression ('AND', 'OR') should be provided in capital letters. If an operator is not used, the default OR operator applies.\n"
          },
          "filterSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            },
            "description": "Enable enforce end user domain.\u003cspan pulumi-lang-nodejs=\" filterSettings \" pulumi-lang-dotnet=\" FilterSettings \" pulumi-lang-go=\" filterSettings \" pulumi-lang-python=\" filter_settings \" pulumi-lang-yaml=\" filterSettings \" pulumi-lang-java=\" filterSettings \"\u003e filter_settings \u003c/span\u003eblocks are documented below.\n"
          },
          "hitsSettings": {
            "type": "object",
            "additionalProperties": {
              "type": "string"
            }
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number",
            "description": "The maximal number of returned results.\n"
          },
          "name": {
            "type": "string",
            "description": "Object name. Must be unique in the domain.\n"
          },
          "offset": {
            "type": "number",
            "description": "Number of the results to initially skip.\n"
          },
          "orders": {
            "type": "array",
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatRulebaseOrder:getManagementThreatRulebaseOrder"
            },
            "description": "Sorts the results by search criteria. Automatically sorts the results by Name, in the ascending order. orders blocks are documented below.\n"
          },
          "package": {
            "type": "string",
            "description": "Name of the package.\n"
          },
          "showAsRanges": {
            "type": "boolean"
          },
          "showHits": {
            "type": "boolean"
          },
          "showMembership": {
            "type": "boolean",
            "description": "Indicates whether to calculate and show \"groups\" field for every object in reply.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementThreatRulebase.\n",
        "properties": {
          "dereferenceGroupMembers": {
            "type": "boolean"
          },
          "filter": {
            "type": "string"
          },
          "filterSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "hitsSettings": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "id": {
            "type": "string"
          },
          "limit": {
            "type": "number"
          },
          "name": {
            "type": "string"
          },
          "offset": {
            "type": "number"
          },
          "orders": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatRulebaseOrder:getManagementThreatRulebaseOrder"
            },
            "type": "array"
          },
          "package": {
            "type": "string"
          },
          "rulebases": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementThreatRulebaseRulebase:getManagementThreatRulebaseRulebase"
            },
            "type": "array"
          },
          "showAsRanges": {
            "type": "boolean"
          },
          "showHits": {
            "type": "boolean"
          },
          "showMembership": {
            "type": "boolean"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "id",
          "rulebases"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTime:getManagementTime": {
      "description": "Use this data source to get information on an existing Check Point Time.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst example = new checkpoint.ManagementTime(\"example\", {name: \"time1\"});\nconst dataTime = checkpoint.getManagementTimeOutput({\n    name: example.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nexample = checkpoint.ManagementTime(\"example\", name=\"time1\")\ndata_time = checkpoint.get_management_time_output(name=example.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var example = new Checkpoint.ManagementTime(\"example\", new()\n    {\n        Name = \"time1\",\n    });\n\n    var dataTime = Checkpoint.GetManagementTime.Invoke(new()\n    {\n        Name = example.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\texample, err := checkpoint.NewManagementTime(ctx, \"example\", \u0026checkpoint.ManagementTimeArgs{\n\t\t\tName: pulumi.String(\"time1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementTimeOutput(ctx, checkpoint.GetManagementTimeOutputArgs{\n\t\t\tName: example.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTime;\nimport com.pulumi.checkpoint.ManagementTimeArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementTimeArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var example = new ManagementTime(\"example\", ManagementTimeArgs.builder()\n            .name(\"time1\")\n            .build());\n\n        final var dataTime = CheckpointFunctions.getManagementTime(GetManagementTimeArgs.builder()\n            .name(example.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  example:\n    type: checkpoint:ManagementTime\n    properties:\n      name: time1\nvariables:\n  dataTime:\n    fn::invoke:\n      function: checkpoint:getManagementTime\n      arguments:\n        name: ${example.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTime.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTime.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "end": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "endNever": {
            "type": "boolean"
          },
          "hourRanges": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementTimeHourRange:getManagementTimeHourRange"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "recurrences": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementTimeRecurrence:getManagementTimeRecurrence"
            },
            "type": "array"
          },
          "start": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "startNow": {
            "type": "boolean"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "end",
          "endNever",
          "hourRanges",
          "id",
          "recurrences",
          "start",
          "startNow",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTrustedCaSettings:getManagementTrustedCaSettings": {
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTrustedCaSettings.\n",
        "properties": {
          "id": {
            "type": "string"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTrustedCaSettings.\n",
        "properties": {
          "automaticUpdate": {
            "type": "boolean"
          },
          "id": {
            "type": "string"
          }
        },
        "required": [
          "automaticUpdate",
          "id"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementTrustedClient:getManagementTrustedClient": {
      "description": "Use this data source to get information on an existing Check Point Trusted Client.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst trustedClient = new checkpoint.ManagementTrustedClient(\"trustedClient\", {\n    name: \"New TrustedClient 1\",\n    ipv4Address: \"192.168.2.1\",\n});\nconst dataTrustedClient = checkpoint.getManagementTrustedClientOutput({\n    name: trustedClient.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntrusted_client = checkpoint.ManagementTrustedClient(\"trustedClient\",\n    name=\"New TrustedClient 1\",\n    ipv4_address=\"192.168.2.1\")\ndata_trusted_client = checkpoint.get_management_trusted_client_output(name=trusted_client.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var trustedClient = new Checkpoint.ManagementTrustedClient(\"trustedClient\", new()\n    {\n        Name = \"New TrustedClient 1\",\n        Ipv4Address = \"192.168.2.1\",\n    });\n\n    var dataTrustedClient = Checkpoint.GetManagementTrustedClient.Invoke(new()\n    {\n        Name = trustedClient.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttrustedClient, err := checkpoint.NewManagementTrustedClient(ctx, \"trustedClient\", \u0026checkpoint.ManagementTrustedClientArgs{\n\t\t\tName:        pulumi.String(\"New TrustedClient 1\"),\n\t\t\tIpv4Address: pulumi.String(\"192.168.2.1\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementTrustedClientOutput(ctx, checkpoint.GetManagementTrustedClientOutputArgs{\n\t\t\tName: trustedClient.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementTrustedClient;\nimport com.pulumi.checkpoint.ManagementTrustedClientArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementTrustedClientArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var trustedClient = new ManagementTrustedClient(\"trustedClient\", ManagementTrustedClientArgs.builder()\n            .name(\"New TrustedClient 1\")\n            .ipv4Address(\"192.168.2.1\")\n            .build());\n\n        final var dataTrustedClient = CheckpointFunctions.getManagementTrustedClient(GetManagementTrustedClientArgs.builder()\n            .name(trustedClient.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  trustedClient:\n    type: checkpoint:ManagementTrustedClient\n    properties:\n      name: New TrustedClient 1\n      ipv4Address: 192.168.2.1\nvariables:\n  dataTrustedClient:\n    fn::invoke:\n      function: checkpoint:getManagementTrustedClient\n      arguments:\n        name: ${trustedClient.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementTrustedClient.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementTrustedClient.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "domainsAssignments": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "ipv4Address": {
            "type": "string"
          },
          "ipv4AddressFirst": {
            "type": "string"
          },
          "ipv4AddressLast": {
            "type": "string"
          },
          "ipv6Address": {
            "type": "string"
          },
          "ipv6AddressFirst": {
            "type": "string"
          },
          "ipv6AddressLast": {
            "type": "string"
          },
          "maskLength4": {
            "type": "number"
          },
          "maskLength6": {
            "type": "number"
          },
          "multiDomainServerTrustedClient": {
            "type": "boolean"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "wildCard": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "domainsAssignments",
          "id",
          "ipv4Address",
          "ipv4AddressFirst",
          "ipv4AddressLast",
          "ipv6Address",
          "ipv6AddressFirst",
          "ipv6AddressLast",
          "maskLength4",
          "maskLength6",
          "multiDomainServerTrustedClient",
          "tags",
          "type",
          "wildCard"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementUpdatableObject:getManagementUpdatableObject": {
      "description": "Use this data source to get information on an existing Check Point Updatable Object\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst updatableObject = checkpoint.getManagementUpdatableObject({\n    name: \"Amazon US East 1 Services\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nupdatable_object = checkpoint.get_management_updatable_object(name=\"Amazon US East 1 Services\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var updatableObject = Checkpoint.GetManagementUpdatableObject.Invoke(new()\n    {\n        Name = \"Amazon US East 1 Services\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.GetManagementUpdatableObject(ctx, \u0026checkpoint.GetManagementUpdatableObjectArgs{\n\t\t\tName: pulumi.StringRef(\"Amazon US East 1 Services\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementUpdatableObjectArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var updatableObject = CheckpointFunctions.getManagementUpdatableObject(GetManagementUpdatableObjectArgs.builder()\n            .name(\"Amazon US East 1 Services\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  updatableObject:\n    fn::invoke:\n      function: checkpoint:getManagementUpdatableObject\n      arguments:\n        name: Amazon US East 1 Services\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementUpdatableObject.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object Name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object UID.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementUpdatableObject.\n",
        "properties": {
          "additionalProperties": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "nameInUpdatableObjectsRepository": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "uidInUpdatableObjectsRepository": {
            "type": "string"
          },
          "updatableObjectMetaInfos": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementUpdatableObjectUpdatableObjectMetaInfo:getManagementUpdatableObjectUpdatableObjectMetaInfo"
            },
            "type": "array"
          }
        },
        "required": [
          "additionalProperties",
          "color",
          "comments",
          "id",
          "nameInUpdatableObjectsRepository",
          "tags",
          "type",
          "uidInUpdatableObjectsRepository",
          "updatableObjectMetaInfos"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementUser:getManagementUser": {
      "description": "This resource allows you to execute Check Point User.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst user = new checkpoint.ManagementUser(\"user\", {\n    name: \"my user\",\n    email: \"email@email.com\",\n    expirationDate: \"2030-12-31\",\n    phoneNumber: \"12345678\",\n    authenticationMethod: \"securid\",\n    connectDaily: true,\n    fromHour: \"08:00\",\n    toHour: \"17:00\",\n});\nconst testUser = checkpoint.getManagementUserOutput({\n    name: user.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nuser = checkpoint.ManagementUser(\"user\",\n    name=\"my user\",\n    email=\"email@email.com\",\n    expiration_date=\"2030-12-31\",\n    phone_number=\"12345678\",\n    authentication_method=\"securid\",\n    connect_daily=True,\n    from_hour=\"08:00\",\n    to_hour=\"17:00\")\ntest_user = checkpoint.get_management_user_output(name=user.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var user = new Checkpoint.ManagementUser(\"user\", new()\n    {\n        Name = \"my user\",\n        Email = \"email@email.com\",\n        ExpirationDate = \"2030-12-31\",\n        PhoneNumber = \"12345678\",\n        AuthenticationMethod = \"securid\",\n        ConnectDaily = true,\n        FromHour = \"08:00\",\n        ToHour = \"17:00\",\n    });\n\n    var testUser = Checkpoint.GetManagementUser.Invoke(new()\n    {\n        Name = user.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tuser, err := checkpoint.NewManagementUser(ctx, \"user\", \u0026checkpoint.ManagementUserArgs{\n\t\t\tName:                 pulumi.String(\"my user\"),\n\t\t\tEmail:                pulumi.String(\"email@email.com\"),\n\t\t\tExpirationDate:       pulumi.String(\"2030-12-31\"),\n\t\t\tPhoneNumber:          pulumi.String(\"12345678\"),\n\t\t\tAuthenticationMethod: pulumi.String(\"securid\"),\n\t\t\tConnectDaily:         pulumi.Bool(true),\n\t\t\tFromHour:             pulumi.String(\"08:00\"),\n\t\t\tToHour:               pulumi.String(\"17:00\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementUserOutput(ctx, checkpoint.GetManagementUserOutputArgs{\n\t\t\tName: user.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementUser;\nimport com.pulumi.checkpoint.ManagementUserArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementUserArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var user = new ManagementUser(\"user\", ManagementUserArgs.builder()\n            .name(\"my user\")\n            .email(\"email@email.com\")\n            .expirationDate(\"2030-12-31\")\n            .phoneNumber(\"12345678\")\n            .authenticationMethod(\"securid\")\n            .connectDaily(true)\n            .fromHour(\"08:00\")\n            .toHour(\"17:00\")\n            .build());\n\n        final var testUser = CheckpointFunctions.getManagementUser(GetManagementUserArgs.builder()\n            .name(user.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  user:\n    type: checkpoint:ManagementUser\n    properties:\n      name: my user\n      email: email@email.com\n      expirationDate: 2030-12-31\n      phoneNumber: '12345678'\n      authenticationMethod: securid\n      connectDaily: true\n      fromHour: 08:00\n      toHour: 17:00\nvariables:\n  testUser:\n    fn::invoke:\n      function: checkpoint:getManagementUser\n      arguments:\n        name: ${user.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementUser.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementUser.\n",
        "properties": {
          "allowedLocations": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "authenticationMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "connectDaily": {
            "type": "boolean"
          },
          "connectOnDays": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "email": {
            "type": "string"
          },
          "encryption": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "expirationDate": {
            "type": "string"
          },
          "fromHour": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "phoneNumber": {
            "type": "string"
          },
          "radiusServer": {
            "type": "string"
          },
          "tacacsServer": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "toHour": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowedLocations",
          "authenticationMethod",
          "color",
          "comments",
          "connectDaily",
          "connectOnDays",
          "email",
          "encryption",
          "expirationDate",
          "fromHour",
          "id",
          "phoneNumber",
          "radiusServer",
          "tacacsServer",
          "tags",
          "toHour"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementUserGroup:getManagementUserGroup": {
      "description": "This resource allows you to execute Check Point User Group.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst userGroup = new checkpoint.ManagementUserGroup(\"user_group\", {\n    name: \"user_group\",\n    email: \"user@email.com\",\n});\nconst testUserGroup = checkpoint.getManagementUserGroupOutput({\n    name: userGroup.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nuser_group = checkpoint.ManagementUserGroup(\"user_group\",\n    name=\"user_group\",\n    email=\"user@email.com\")\ntest_user_group = checkpoint.get_management_user_group_output(name=user_group.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var userGroup = new Checkpoint.ManagementUserGroup(\"user_group\", new()\n    {\n        Name = \"user_group\",\n        Email = \"user@email.com\",\n    });\n\n    var testUserGroup = Checkpoint.GetManagementUserGroup.Invoke(new()\n    {\n        Name = userGroup.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tuserGroup, err := checkpoint.NewManagementUserGroup(ctx, \"user_group\", \u0026checkpoint.ManagementUserGroupArgs{\n\t\t\tName:  pulumi.String(\"user_group\"),\n\t\t\tEmail: pulumi.String(\"user@email.com\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementUserGroupOutput(ctx, checkpoint.GetManagementUserGroupOutputArgs{\n\t\t\tName: userGroup.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementUserGroup;\nimport com.pulumi.checkpoint.ManagementUserGroupArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementUserGroupArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var userGroup = new ManagementUserGroup(\"userGroup\", ManagementUserGroupArgs.builder()\n            .name(\"user_group\")\n            .email(\"user@email.com\")\n            .build());\n\n        final var testUserGroup = CheckpointFunctions.getManagementUserGroup(GetManagementUserGroupArgs.builder()\n            .name(userGroup.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  userGroup:\n    type: checkpoint:ManagementUserGroup\n    name: user_group\n    properties:\n      name: user_group\n      email: user@email.com\nvariables:\n  testUserGroup:\n    fn::invoke:\n      function: checkpoint:getManagementUserGroup\n      arguments:\n        name: ${userGroup.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementUserGroup.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementUserGroup.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "email": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "members": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "email",
          "id",
          "members",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementUserTemplate:getManagementUserTemplate": {
      "description": "This resource allows you to execute Check Point User Template.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst userTemplate = new checkpoint.ManagementUserTemplate(\"user_template\", {\n    name: \"my template\",\n    expirationDate: \"2030-12-31\",\n    expirationByGlobalProperties: false,\n});\nconst testUserTemplate = checkpoint.getManagementUserTemplateOutput({\n    name: userTemplate.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nuser_template = checkpoint.ManagementUserTemplate(\"user_template\",\n    name=\"my template\",\n    expiration_date=\"2030-12-31\",\n    expiration_by_global_properties=False)\ntest_user_template = checkpoint.get_management_user_template_output(name=user_template.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var userTemplate = new Checkpoint.ManagementUserTemplate(\"user_template\", new()\n    {\n        Name = \"my template\",\n        ExpirationDate = \"2030-12-31\",\n        ExpirationByGlobalProperties = false,\n    });\n\n    var testUserTemplate = Checkpoint.GetManagementUserTemplate.Invoke(new()\n    {\n        Name = userTemplate.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tuserTemplate, err := checkpoint.NewManagementUserTemplate(ctx, \"user_template\", \u0026checkpoint.ManagementUserTemplateArgs{\n\t\t\tName:                         pulumi.String(\"my template\"),\n\t\t\tExpirationDate:               pulumi.String(\"2030-12-31\"),\n\t\t\tExpirationByGlobalProperties: pulumi.Bool(false),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementUserTemplateOutput(ctx, checkpoint.GetManagementUserTemplateOutputArgs{\n\t\t\tName: userTemplate.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementUserTemplate;\nimport com.pulumi.checkpoint.ManagementUserTemplateArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementUserTemplateArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var userTemplate = new ManagementUserTemplate(\"userTemplate\", ManagementUserTemplateArgs.builder()\n            .name(\"my template\")\n            .expirationDate(\"2030-12-31\")\n            .expirationByGlobalProperties(false)\n            .build());\n\n        final var testUserTemplate = CheckpointFunctions.getManagementUserTemplate(GetManagementUserTemplateArgs.builder()\n            .name(userTemplate.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  userTemplate:\n    type: checkpoint:ManagementUserTemplate\n    name: user_template\n    properties:\n      name: my template\n      expirationDate: 2030-12-31\n      expirationByGlobalProperties: false\nvariables:\n  testUserTemplate:\n    fn::invoke:\n      function: checkpoint:getManagementUserTemplate\n      arguments:\n        name: ${userTemplate.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementUserTemplate.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementUserTemplate.\n",
        "properties": {
          "allowedLocations": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "authenticationMethod": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "connectDaily": {
            "type": "boolean"
          },
          "connectOnDays": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "encryption": {
            "additionalProperties": {
              "type": "string"
            },
            "type": "object"
          },
          "expirationByGlobalProperties": {
            "type": "boolean"
          },
          "expirationDate": {
            "type": "string"
          },
          "fromHour": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "radiusServer": {
            "type": "string"
          },
          "tacacsServer": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "toHour": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "allowedLocations",
          "authenticationMethod",
          "color",
          "comments",
          "connectDaily",
          "connectOnDays",
          "encryption",
          "expirationByGlobalProperties",
          "expirationDate",
          "fromHour",
          "id",
          "radiusServer",
          "tacacsServer",
          "tags",
          "toHour"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVmwareDataCenterServer:getManagementVmwareDataCenterServer": {
      "description": "Use this data source to get information on an existing VMware Data Center Server.\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst testVMware = new checkpoint.ManagementVmwareDataCenterServer(\"testVMware\", {\n    name: \"MyVMware\",\n    type: \"vcenter\",\n    username: \"USERNAME\",\n    password: \"PASSWORD\",\n    hostname: \"HOSTNAME\",\n});\nconst dataVmwareDataCenterServer = checkpoint.getManagementVmwareDataCenterServerOutput({\n    name: testVMware.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ntest_v_mware = checkpoint.ManagementVmwareDataCenterServer(\"testVMware\",\n    name=\"MyVMware\",\n    type=\"vcenter\",\n    username=\"USERNAME\",\n    password=\"PASSWORD\",\n    hostname=\"HOSTNAME\")\ndata_vmware_data_center_server = checkpoint.get_management_vmware_data_center_server_output(name=test_v_mware.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var testVMware = new Checkpoint.ManagementVmwareDataCenterServer(\"testVMware\", new()\n    {\n        Name = \"MyVMware\",\n        Type = \"vcenter\",\n        Username = \"USERNAME\",\n        Password = \"PASSWORD\",\n        Hostname = \"HOSTNAME\",\n    });\n\n    var dataVmwareDataCenterServer = Checkpoint.GetManagementVmwareDataCenterServer.Invoke(new()\n    {\n        Name = testVMware.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\ttestVMware, err := checkpoint.NewManagementVmwareDataCenterServer(ctx, \"testVMware\", \u0026checkpoint.ManagementVmwareDataCenterServerArgs{\n\t\t\tName:     pulumi.String(\"MyVMware\"),\n\t\t\tType:     pulumi.String(\"vcenter\"),\n\t\t\tUsername: pulumi.String(\"USERNAME\"),\n\t\t\tPassword: pulumi.String(\"PASSWORD\"),\n\t\t\tHostname: pulumi.String(\"HOSTNAME\"),\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementVmwareDataCenterServerOutput(ctx, checkpoint.GetManagementVmwareDataCenterServerOutputArgs{\n\t\t\tName: testVMware.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVmwareDataCenterServer;\nimport com.pulumi.checkpoint.ManagementVmwareDataCenterServerArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVmwareDataCenterServerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var testVMware = new ManagementVmwareDataCenterServer(\"testVMware\", ManagementVmwareDataCenterServerArgs.builder()\n            .name(\"MyVMware\")\n            .type(\"vcenter\")\n            .username(\"USERNAME\")\n            .password(\"PASSWORD\")\n            .hostname(\"HOSTNAME\")\n            .build());\n\n        final var dataVmwareDataCenterServer = CheckpointFunctions.getManagementVmwareDataCenterServer(GetManagementVmwareDataCenterServerArgs.builder()\n            .name(testVMware.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  testVMware:\n    type: checkpoint:ManagementVmwareDataCenterServer\n    properties:\n      name: MyVMware\n      type: vcenter\n      username: USERNAME\n      password: PASSWORD\n      hostname: HOSTNAME\nvariables:\n  dataVmwareDataCenterServer:\n    fn::invoke:\n      function: checkpoint:getManagementVmwareDataCenterServer\n      arguments:\n        name: ${testVMware.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVmwareDataCenterServer.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVmwareDataCenterServer.\n",
        "properties": {
          "certificateFingerprint": {
            "type": "string"
          },
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "hostname": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "type": {
            "type": "string"
          },
          "uid": {
            "type": "string"
          },
          "unsafeAutoAccept": {
            "type": "boolean"
          },
          "username": {
            "type": "string"
          }
        },
        "required": [
          "certificateFingerprint",
          "color",
          "comments",
          "hostname",
          "id",
          "tags",
          "type",
          "unsafeAutoAccept",
          "username"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVoipDomainH323Gatekeeper:getManagementVoipDomainH323Gatekeeper": {
      "description": "Use this data source to get information on an existing Check Point Voip Domain H323 Gatekeeper.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTest = checkpoint.getManagementVoipDomainH323Gatekeeper({\n    name: \"h323_gatekeeper1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_test = checkpoint.get_management_voip_domain_h323_gatekeeper(name=\"h323_gatekeeper1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTest = Checkpoint.GetManagementVoipDomainH323Gatekeeper.Invoke(new()\n    {\n        Name = \"h323_gatekeeper1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementVoipDomainH323Gatekeeper(ctx, \u0026checkpoint.LookupManagementVoipDomainH323GatekeeperArgs{\n\t\t\tName: pulumi.StringRef(\"h323_gatekeeper1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVoipDomainH323GatekeeperArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTest = CheckpointFunctions.getManagementVoipDomainH323Gatekeeper(GetManagementVoipDomainH323GatekeeperArgs.builder()\n            .name(\"h323_gatekeeper1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementVoipDomainH323Gatekeeper\n      arguments:\n        name: h323_gatekeeper1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVoipDomainH323Gatekeeper.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVoipDomainH323Gatekeeper.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "endpointsDomain": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "installedAt": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "routingModes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementVoipDomainH323GatekeeperRoutingMode:getManagementVoipDomainH323GatekeeperRoutingMode"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "endpointsDomain",
          "icon",
          "id",
          "installedAt",
          "routingModes",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVoipDomainH323Gateway:getManagementVoipDomainH323Gateway": {
      "description": "Use this data source to get information on an existing Check Point Voip Domain H323 Gateway.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTest = checkpoint.getManagementVoipDomainH323Gateway({\n    name: \"h323_gateway1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_test = checkpoint.get_management_voip_domain_h323_gateway(name=\"h323_gateway1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTest = Checkpoint.GetManagementVoipDomainH323Gateway.Invoke(new()\n    {\n        Name = \"h323_gateway1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementVoipDomainH323Gateway(ctx, \u0026checkpoint.LookupManagementVoipDomainH323GatewayArgs{\n\t\t\tName: pulumi.StringRef(\"h323_gateway1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVoipDomainH323GatewayArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTest = CheckpointFunctions.getManagementVoipDomainH323Gateway(GetManagementVoipDomainH323GatewayArgs.builder()\n            .name(\"h323_gateway1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementVoipDomainH323Gateway\n      arguments:\n        name: h323_gateway1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVoipDomainH323Gateway.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVoipDomainH323Gateway.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "endpointsDomain": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "installedAt": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "routingModes": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementVoipDomainH323GatewayRoutingMode:getManagementVoipDomainH323GatewayRoutingMode"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "endpointsDomain",
          "icon",
          "id",
          "installedAt",
          "routingModes",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVoipDomainMgcpCallAgent:getManagementVoipDomainMgcpCallAgent": {
      "description": "Use this data source to get information on an existing Check Point Voip Domain Mgcp Call Agent.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTest = checkpoint.getManagementVoipDomainMgcpCallAgent({\n    name: \"mgcp_call_agent1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_test = checkpoint.get_management_voip_domain_mgcp_call_agent(name=\"mgcp_call_agent1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTest = Checkpoint.GetManagementVoipDomainMgcpCallAgent.Invoke(new()\n    {\n        Name = \"mgcp_call_agent1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementVoipDomainMgcpCallAgent(ctx, \u0026checkpoint.LookupManagementVoipDomainMgcpCallAgentArgs{\n\t\t\tName: pulumi.StringRef(\"mgcp_call_agent1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVoipDomainMgcpCallAgentArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTest = CheckpointFunctions.getManagementVoipDomainMgcpCallAgent(GetManagementVoipDomainMgcpCallAgentArgs.builder()\n            .name(\"mgcp_call_agent1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementVoipDomainMgcpCallAgent\n      arguments:\n        name: mgcp_call_agent1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVoipDomainMgcpCallAgent.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVoipDomainMgcpCallAgent.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "endpointsDomain": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "installedAt": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "endpointsDomain",
          "icon",
          "id",
          "installedAt",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVoipDomainSccpCallManager:getManagementVoipDomainSccpCallManager": {
      "description": "Use this data source to get information on an existing Check Point Voip Domain Sccp Call Manager.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTest = checkpoint.getManagementVoipDomainSccpCallManager({\n    name: \"sccp_call_manager1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_test = checkpoint.get_management_voip_domain_sccp_call_manager(name=\"sccp_call_manager1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTest = Checkpoint.GetManagementVoipDomainSccpCallManager.Invoke(new()\n    {\n        Name = \"sccp_call_manager1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementVoipDomainSccpCallManager(ctx, \u0026checkpoint.LookupManagementVoipDomainSccpCallManagerArgs{\n\t\t\tName: pulumi.StringRef(\"sccp_call_manager1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVoipDomainSccpCallManagerArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTest = CheckpointFunctions.getManagementVoipDomainSccpCallManager(GetManagementVoipDomainSccpCallManagerArgs.builder()\n            .name(\"sccp_call_manager1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementVoipDomainSccpCallManager\n      arguments:\n        name: sccp_call_manager1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVoipDomainSccpCallManager.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVoipDomainSccpCallManager.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "endpointsDomain": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "installedAt": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "endpointsDomain",
          "icon",
          "id",
          "installedAt",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVoipDomainSipProxy:getManagementVoipDomainSipProxy": {
      "description": "Use this data source to get information on an existing Check Point Voip Domain Sip Proxy.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst dataTest = checkpoint.getManagementVoipDomainSipProxy({\n    name: \"sip_proxy1\",\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\ndata_test = checkpoint.get_management_voip_domain_sip_proxy(name=\"sip_proxy1\")\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var dataTest = Checkpoint.GetManagementVoipDomainSipProxy.Invoke(new()\n    {\n        Name = \"sip_proxy1\",\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\t_, err := checkpoint.LookupManagementVoipDomainSipProxy(ctx, \u0026checkpoint.LookupManagementVoipDomainSipProxyArgs{\n\t\t\tName: pulumi.StringRef(\"sip_proxy1\"),\n\t\t}, nil)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVoipDomainSipProxyArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        final var dataTest = CheckpointFunctions.getManagementVoipDomainSipProxy(GetManagementVoipDomainSipProxyArgs.builder()\n            .name(\"sip_proxy1\")\n            .build());\n\n    }\n}\n```\n```yaml\nvariables:\n  dataTest:\n    fn::invoke:\n      function: checkpoint:getManagementVoipDomainSipProxy\n      arguments:\n        name: sip_proxy1\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVoipDomainSipProxy.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name. Should be unique in the domain.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVoipDomainSipProxy.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "endpointsDomain": {
            "type": "string"
          },
          "icon": {
            "type": "string"
          },
          "id": {
            "type": "string"
          },
          "installedAt": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          }
        },
        "required": [
          "color",
          "comments",
          "endpointsDomain",
          "icon",
          "id",
          "installedAt",
          "tags"
        ],
        "type": "object"
      }
    },
    "checkpoint:index/getManagementVpnCommunityRemoteAccess:getManagementVpnCommunityRemoteAccess": {
      "description": "This resource allows you to execute Check Point VPN Community Remote Access.\n\n## Example Usage\n\n\u003c!--Start PulumiCodeChooser --\u003e\n```typescript\nimport * as pulumi from \"@pulumi/pulumi\";\nimport * as checkpoint from \"@pulumi/checkpoint\";\n\nconst vpnCommunityRemoteAccess = new checkpoint.ManagementVpnCommunityRemoteAccess(\"vpn_community_remote_access\", {\n    name: \"RemoteAccess\",\n    userGroups: [\"All Users\"],\n});\nconst dataVpnCommunityRemoteAccess = checkpoint.getManagementVpnCommunityRemoteAccessOutput({\n    name: vpnCommunityRemoteAccess.name,\n});\n```\n```python\nimport pulumi\nimport pulumi_checkpoint as checkpoint\n\nvpn_community_remote_access = checkpoint.ManagementVpnCommunityRemoteAccess(\"vpn_community_remote_access\",\n    name=\"RemoteAccess\",\n    user_groups=[\"All Users\"])\ndata_vpn_community_remote_access = checkpoint.get_management_vpn_community_remote_access_output(name=vpn_community_remote_access.name)\n```\n```csharp\nusing System.Collections.Generic;\nusing System.Linq;\nusing Pulumi;\nusing Checkpoint = Pulumi.Checkpoint;\n\nreturn await Deployment.RunAsync(() =\u003e \n{\n    var vpnCommunityRemoteAccess = new Checkpoint.ManagementVpnCommunityRemoteAccess(\"vpn_community_remote_access\", new()\n    {\n        Name = \"RemoteAccess\",\n        UserGroups = new[]\n        {\n            \"All Users\",\n        },\n    });\n\n    var dataVpnCommunityRemoteAccess = Checkpoint.GetManagementVpnCommunityRemoteAccess.Invoke(new()\n    {\n        Name = vpnCommunityRemoteAccess.Name,\n    });\n\n});\n```\n```go\npackage main\n\nimport (\n\t\"github.com/pulumi/pulumi-terraform-provider/sdks/go/checkpoint/v2/checkpoint\"\n\t\"github.com/pulumi/pulumi/sdk/v3/go/pulumi\"\n)\n\nfunc main() {\n\tpulumi.Run(func(ctx *pulumi.Context) error {\n\t\tvpnCommunityRemoteAccess, err := checkpoint.NewManagementVpnCommunityRemoteAccess(ctx, \"vpn_community_remote_access\", \u0026checkpoint.ManagementVpnCommunityRemoteAccessArgs{\n\t\t\tName: pulumi.String(\"RemoteAccess\"),\n\t\t\tUserGroups: pulumi.StringArray{\n\t\t\t\tpulumi.String(\"All Users\"),\n\t\t\t},\n\t\t})\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\t_ = checkpoint.LookupManagementVpnCommunityRemoteAccessOutput(ctx, checkpoint.GetManagementVpnCommunityRemoteAccessOutputArgs{\n\t\t\tName: vpnCommunityRemoteAccess.Name,\n\t\t}, nil)\n\t\treturn nil\n\t})\n}\n```\n```java\npackage generated_program;\n\nimport com.pulumi.Context;\nimport com.pulumi.Pulumi;\nimport com.pulumi.core.Output;\nimport com.pulumi.checkpoint.ManagementVpnCommunityRemoteAccess;\nimport com.pulumi.checkpoint.ManagementVpnCommunityRemoteAccessArgs;\nimport com.pulumi.checkpoint.CheckpointFunctions;\nimport com.pulumi.checkpoint.inputs.GetManagementVpnCommunityRemoteAccessArgs;\nimport java.util.List;\nimport java.util.ArrayList;\nimport java.util.Map;\nimport java.io.File;\nimport java.nio.file.Files;\nimport java.nio.file.Paths;\n\npublic class App {\n    public static void main(String[] args) {\n        Pulumi.run(App::stack);\n    }\n\n    public static void stack(Context ctx) {\n        var vpnCommunityRemoteAccess = new ManagementVpnCommunityRemoteAccess(\"vpnCommunityRemoteAccess\", ManagementVpnCommunityRemoteAccessArgs.builder()\n            .name(\"RemoteAccess\")\n            .userGroups(\"All Users\")\n            .build());\n\n        final var dataVpnCommunityRemoteAccess = CheckpointFunctions.getManagementVpnCommunityRemoteAccess(GetManagementVpnCommunityRemoteAccessArgs.builder()\n            .name(vpnCommunityRemoteAccess.name())\n            .build());\n\n    }\n}\n```\n```yaml\nresources:\n  vpnCommunityRemoteAccess:\n    type: checkpoint:ManagementVpnCommunityRemoteAccess\n    name: vpn_community_remote_access\n    properties:\n      name: RemoteAccess\n      userGroups:\n        - All Users\nvariables:\n  dataVpnCommunityRemoteAccess:\n    fn::invoke:\n      function: checkpoint:getManagementVpnCommunityRemoteAccess\n      arguments:\n        name: ${vpnCommunityRemoteAccess.name}\n```\n\u003c!--End PulumiCodeChooser --\u003e\n",
      "inputs": {
        "description": "A collection of arguments for invoking getManagementVpnCommunityRemoteAccess.\n",
        "properties": {
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string",
            "description": "Object name.\n"
          },
          "uid": {
            "type": "string",
            "description": "Object unique identifier.\n"
          }
        },
        "type": "object"
      },
      "outputs": {
        "description": "A collection of values returned by getManagementVpnCommunityRemoteAccess.\n",
        "properties": {
          "color": {
            "type": "string"
          },
          "comments": {
            "type": "string"
          },
          "gateways": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "id": {
            "type": "string"
          },
          "name": {
            "type": "string"
          },
          "overrideVpnDomains": {
            "items": {
              "$ref": "#/types/checkpoint:index%2FgetManagementVpnCommunityRemoteAccessOverrideVpnDomain:getManagementVpnCommunityRemoteAccessOverrideVpnDomain"
            },
            "type": "array"
          },
          "tags": {
            "items": {
              "type": "string"
            },
            "type": "array"
          },
          "uid": {
            "type": "string"
          },
          "userGroups": {
            "items": {
              "type": "string"
            },
            "type": "array"
          }
        },
        "required": [
          "color",
          "comments",
          "gateways",
          "id",
          "overrideVpnDomains",
          "tags",
          "userGroups"
        ],
        "type": "object"
      }
    },
    "pulumi:providers:checkpoint/terraformConfig": {
      "description": "This function returns a Terraform config object with terraform-namecased keys,to be used with the Terraform Module Provider.",
      "inputs": {
        "properties": {
          "__self__": {
            "$ref": "#/resources/pulumi:providers:checkpoint"
          }
        },
        "type": "object",
        "required": [
          "__self__"
        ]
      },
      "outputs": {
        "properties": {
          "result": {
            "additionalProperties": {
              "$ref": "pulumi.json#/Any"
            },
            "type": "object"
          }
        },
        "required": [
          "result"
        ],
        "type": "object"
      }
    }
  },
  "parameterization": {
    "baseProvider": {
      "name": "terraform-provider",
      "version": "1.0.1"
    },
    "parameter": "eyJyZW1vdGUiOnsidXJsIjoicmVnaXN0cnkub3BlbnRvZnUub3JnL2NoZWNrcG9pbnRzdy9jaGVja3BvaW50IiwidmVyc2lvbiI6IjIuMTIuMCJ9fQ=="
  }
}
