diff --git a/README.md b/README.md index 9eb268d..2b92e1c 100644 --- a/README.md +++ b/README.md @@ -11,9 +11,41 @@ This repository provides a structured set of Terraform modules for deploying Che ## Available Submodules **Submodules:** +* [`autoscale`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/autoscale) - Deploys Auto Scaling Group of CloudGuard Security Gateways into an existing VPC. +* [`autoscale_gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/autoscale_gwlb) - Deploys Auto Scaling Group of CloudGuard Security Gateways into an existing VPC. +* [`cluster`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cluster) - Deploys CloudGuard Network Security Cluster into an existing VPC on AWS. +* [`cluster_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cluster_master) - Deploys CloudGuard Network Security Cluster into a new VPC. +* [`cme_iam_role`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cme_iam_role) - Creates AWS IAM Role for Cloud Management Extension (CME) on Security Management Server. +* [`cme_iam_role_gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cme_iam_role_gwlb) - Creates AWS IAM Role for Cloud Management Extension (CME) manages Gateway Load Balancer Auto Scale Group on Security Management Server. +* [`cross_az_cluster`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cross_az_cluster) - Deploys Check Point CloudGuard Network Security Cross AZ Cluster into an existing VPC on AWS. +* [`cross_az_cluster_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cross_az_cluster_master) - Deploys Check Point CloudGuard Network Security Cross AZ Cluster into into a new VPC. +* [`gateway`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gateway) - Deploys Check Point CloudGuard Network Security Gateway into an existing VPC. +* [`gateway_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gateway_master) -Check Point CloudGuard Network Security Gateway into a new VPC. +* [`gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gwlb) - Deploys AWS Auto Scaling group configured for Gateway Load Balancer into an existing VPC. +* [`gwlb_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gwlb_master) - Deploys AWS Auto Scaling group configured for Gateway Load Balancer into a new VPC. +* [`management`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/management) - Deploys CloudGuard Network Security Management Server into an existing VPC. +* [`mds`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/mds) - Deploys CloudGuard Network Multi-Domain Server into an existing VPC. +* [`qs_autoscale`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/qs_autoscale) - Deploys CloudGuard Network Security Gateway Auto Scaling Group, an external ALB/NLB, and optionally a Security Management Server and a web server Auto Scaling Group. +* [`qs_autoscale_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/qs_autoscale_master) - Deploys CloudGuard Network Security Gateway Auto Scaling Group, an external ALB/NLB, and optionally a Security Management Server and a web server Auto Scaling Group in a new VPC. +* [`standalone`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/standalone) - Check Point CloudGuard Network Security Gateway & Management (Standalone) instance into an existing VPC. +* [`standalone_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/standalone_master) - CloudGuard Network Security Gateway & Management (Standalone) instance into a new VPC. +* [`tap`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tap) - Deploys TAP solution in an existing VPC on AWS. +* [`tgw_asg`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_asg) - Deploys CloudGuard Network Security Gateway Auto Scaling Group for Transit Gateway with an optional Management Server into an existing VPC. +* [`tgw_asg_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_asg_master) - CloudGuard Network Security Gateway Auto Scaling Group for Transit Gateway with an optional Management Server in a new VPC. +* [`tgw_cross_az_cluster`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_cross_az_cluster) - Deploys CloudGuard Network Security Cross AZ Cluster into an existing VPC on AWS for Transit Gateway. +* [`tgw_cross_az_cluster_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_cross_az_cluster_master) - Deploys CloudGuard Network Security Cross AZ Cluster with a new VPC on AWS for Transit Gateway. +* [`tgw_gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_gwlb) - Deploys WS Auto Scaling group configured for Gateway Load Balancer into existing Centralized Security VPC for Transit Gateway. +* [`tgw_gwlb_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_gwlb_master) - Deploys AWS Auto Scaling group configured for Gateway Load Balancer into new Centralized Security VPC for Transit Gateway. **Internal Submodules:** +* [`amis`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/amis) +* [`cloudwatch_policy`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cloudwatch_policy) +* [`cluster_iam_role`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cluster_iam_role) +* [`common`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/common) +* [`custom_autoscale`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/custom_autoscale) +* [`vpc`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/vpc) + ___ diff --git a/modules/gateway_master/README.md b/modules/gateway_master/README.md index aba0130..edc63ff 100644 --- a/modules/gateway_master/README.md +++ b/modules/gateway_master/README.md @@ -18,130 +18,13 @@ This solution uses the following modules: - /terraform/aws/amis - /terraform/aws/vpc -## Configurations +## Usage +Follow best practices for using CGNS modules on [the root page](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest#:~:text=Best%20Practices%20for%20Using%20Our%20Modules). -The **main.tf** file includes the following provider configuration block used to configure the credentials for the authentication with AWS, as well as a default region for your resources: -``` -provider "aws" { - region = var.region - access_key = var.access_key - secret_key = var.secret_key -} -``` -The provider credentials can be provided either as static credentials or as [Environment Variables](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables). -- Static credentials can be provided by adding an access_key and secret_key in /terraform/aws/gateway_master/**terraform.tfvars** file as follows: -``` -region = "us-east-1" -access_key = "my-access-key" -secret_key = "my-secret-key" +**Instead of the standard terraform apply command, use the following:** ``` -- In case the Static credentials are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/gateway: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - ``` -- In case the Environment Variables are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - ``` - b. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/gateway: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - - -## Usage -- Fill all variables in the /terraform/aws/gateway_master/**terraform.tfvars** file with proper values (see below for variables descriptions). -- From a command line initialize the Terraform configuration directory: - ``` - terraform init - ``` -- Create an execution plan: - ``` - terraform plan - ``` -- Create or modify the deployment: - - Due to terraform limitation, the apply command is: - ``` terraform apply -target=module.gateway-test.aws_route_table.private_subnet_rtb -auto-approve && terraform apply - ``` - >Once terraform is updated, we will update accordingly. - -- Variables are configured in /terraform/aws/gateway_master/**terraform.tfvars** file as follows: - - ``` - //PLEASE refer to README.md for accepted values FOR THE VARIABLES BELOW - - // --- VPC Network Configuration --- - vpc_cidr = "10.0.0.0/16" - public_subnets_map = { - "us-east-1a" = 1 - } - private_subnets_map = { - "us-east-1a" = 2 - } - subnets_bit_length = 8 - - // --- EC2 Instance Configuration --- - gateway_name = "Check-Point-Gateway-tf" - gateway_instance_type = "c5.xlarge" - key_name = "publickey" - allocate_and_associate_eip = true - volume_size = 100 - volume_encryption = "" - enable_instance_connect = false - disable_instance_termination = false - instance_tags = { - key1 = "value1" - key2 = "value2" - } - - // --- Check Point Settings --- - gateway_version = "R81.20-BYOL" - admin_shell = "/etc/cli.sh" - gateway_SICKey = "12345678" - gateway_password_hash = "" - gateway_maintenance_mode_password_hash = "" # For R81.10 and below the gateway_password_hash is used also as maintenance-mode password. - // --- Quick connect to Smart-1 Cloud (Recommended) --- - gateway_TokenKey = "" - - // --- Advanced Settings --- - resources_tag_name = "tag-name" - gateway_hostname = "gw-hostname" - allow_upload_download = true - enable_cloudwatch = false - gateway_bootstrap_script = "echo 'this is bootstrap script' > /home/admin/bootstrap.txt" - primary_ntp = "" - secondary_ntp = "" - - // --- (Optional) Automatic Provisioning with Security Management Server Settings --- - control_gateway_over_public_or_private_address = "private" - management_server = "" - configuration_template = "" - ``` - -- Conditional creation - - To create an Elastic IP and associate it to the Gateway instance: - ``` - allocate_and_associate_eip = true - ``` - -- To tear down your resources: - ``` - terraform destroy - ``` +``` ## Inputs diff --git a/modules/gwlb_master/README.md b/modules/gwlb_master/README.md index cd32835..c022a21 100644 --- a/modules/gwlb_master/README.md +++ b/modules/gwlb_master/README.md @@ -1,4 +1,4 @@ -# Check Point CloudGuard Network Gateway Load Balancer Master Terraform module for AWS +# Check Point CloudGuard Gateway Load Balancer Master Module Terraform module which deploys an AWS Auto Scaling group configured for Gateway Load Balancer into a new VPC. @@ -15,146 +15,15 @@ These types of Terraform resources are supported: See the [Check Point CloudGuard Gateway Load Balancer on AWS](https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Centralized_Gateway_Load_Balancer/Content/Topics-AWS-GWLB-VPC-DG/Introduction.htm) for additional information This solution uses the following modules: -- /terraform/aws/autoscale_gwlb -- /terraform/aws/management -- /terraform/aws/cme_iam_role_gwlb -- /terraform/aws/amis -- /terraform/aws/vpc -## Configurations - -The **main.tf** file includes the following provider configuration block used to configure the credentials for the authentication with AWS, as well as a default region for your resources: -``` -provider "aws" { - region = var.region - access_key = var.aws_access_key_ID - secret_key = var.aws_secret_access_key -} -``` -The provider credentials can be provided either as static credentials or as [Environment Variables](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables). -- Static credentials can be provided by adding an access_key and secret_key in /terraform/aws/qs_autoscale/**terraform.tfvars** file as follows: -``` -region = "us-east-1" -access_key = "my-access-key" -secret_key = "my-secret-key" -``` -- In case the Static credentials are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-modules /terraform/aws/autoscale_gwlb, /terraform/aws/management and /terraform/aws/cme_iam_role_gwlb: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - ``` -- In case the Environment Variables are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented: - ``` - provider "aws" { - // region = var.region - // access_key = var.aws_access_key_ID - // secret_key = var.aws_secret_access_key - } - ``` - b. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-modules /terraform/aws/autoscale, /terraform/aws/management and /terraform/aws/cme_iam_role_gwlb: - ``` - provider "aws" { - // region = var.region - // access_key = var.aws_access_key_ID - // secret_key = var.aws_secret_access_key - } - ``` +- autoscale_gwlb +- management +- cme_iam_role_gwlb +- amis +- vpc ## Usage -- Fill all variables in the /terraform/aws/gwlb/**terraform.tfvars** file with proper values (see below for variables descriptions). -- From a command line initialize the Terraform configuration directory: - ``` - terraform init - ``` -- Create an execution plan: - ``` - terraform plan - ``` - - Create or modify the deployment: - ``` - terraform apply - ``` - - - Variables are configured in /terraform/aws/qs_autoscale/**terraform.tfvars** file as follows: - - ``` - //PLEASE refer to README.md for accepted values FOR THE VARIABLES BELOW +Follow best practices for using CGNS modules on [the root page](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest#:~:text=Best%20Practices%20for%20Using%20Our%20Modules). - - // --- Network Configuration --- - vpc_cidr = "10.0.0.0/16" - public_subnets_map = { - "us-east-1a" = 1 - "us-east-1b" = 2 - } - subnets_bit_length = 8 - - // --- General Settings --- - key_name = "publickey" - enable_volume_encryption = true - volume_size = 100 - enable_instance_connect = false - disable_instance_termination = false - allow_upload_download = true - management_server = "CP-Management-gwlb-tf" - configuration_template = "gwlb-configuration" - admin_shell = "/etc/cli.sh" - - // --- Gateway Load Balancer Configuration --- - gateway_load_balancer_name = "gwlb1" - target_group_name = "tg1" - connection_acceptance_required = "false" - enable_cross_zone_load_balancing = "true" - - // --- Check Point CloudGuard IaaS Security Gateways Auto Scaling Group Configuration --- - gateway_name = "Check-Point-GW-tf" - gateway_instance_type = "c5.xlarge" - minimum_group_size = 2 - maximum_group_size = 10 - gateway_version = "R81.20-BYOL" - gateway_password_hash = "" - gateway_maintenance_mode_password_hash = "" # For R81.10 and below the gateway_password_hash is used also as maintenance-mode password. - gateway_SICKey = "12345678" - gateways_provision_address_type = "private" - allocate_public_IP = false - enable_cloudwatch = false - gateway_bootstrap_script = "echo 'this is bootstrap script' > /home/admin/bootstrap.txt" - - // --- Check Point CloudGuard IaaS Security Management Server Configuration --- - management_deploy = true - management_instance_type = "m5.xlarge" - management_version = "R81.20-BYOL" - management_password_hash = "" - management_maintenance_mode_password_hash = "" # For R81.10 and below the management_password_hash is used also as maintenance-mode password. - gateways_policy = "Standard" - gateway_management = "Locally managed" - admin_cidr = "" - gateways_addresses = "" - - // --- Other parameters --- - volume_type = "gp3" - - - ``` - -- Conditional creation - - To enable cloudwatch for gwlb_master: - ``` - enable_cloudwatch = true - ``` - Note: enabling cloudwatch will automatically create IAM role with cloudwatch:PutMetricData permission - - To deploy Security Management Server: - ``` - management_deploy = true - ``` -- To tear down your resources: - ``` - terraform destroy - ``` ## Inputs | Name | Description | Type | Allowed values | Default | Required | @@ -209,29 +78,4 @@ secret_key = "my-secret-key" | controller_name | The controller name in CME. | | gwlb_name | The name of the deployed Gateway Load Balancer | | gwlb_service_name | The service name for the deployed Gateway Load Balancer | -| gwlb_arn | The arn for the deployed Gateway Load Balancer | - - -## Revision History -In order to check the template version, please refer to [sk116585](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk116585) - -| Template Version | Description | -|------------------|---------------------------------------------------------------------------------------------| -| 20241027 | R82 version support | -| 20240704 | R80.40 version deprecation | -| 20240515 | Add support for requiring use instance metadata service version 2 (IMDSv2) only | -| 20231012 | Update AWS Terraform provider version to 5.20.1 | -| 20230923 | Add support for C5d instance type | -| 20230914 | Add support for maintenance mode password | -| 20230910 | Add bootstrap script execution option for deployed gateways | -| 20230829 | Change default Check Point version to R81.20 | -| 20230806 | Add support for c6in instance type | -| 20230521 | Change default shell for the admin user to /etc/cli.sh | -| 20221215 | Support ASG Launch Template instead of Launch Configuration | -| 20221123 | R81.20 version support | -| 20220606 | New instance type support | -| 20220414 | First release of Check Point CloudGuard Network Gateway Load Balancer master module for AWS | - -## License - -This project is licensed under the MIT License - see the [LICENSE](../../LICENSE) file for details +| gwlb_arn | The arn for the deployed Gateway Load Balancer | \ No newline at end of file diff --git a/modules/management/README.md b/modules/management/README.md index 29c13be..e275f4f 100644 --- a/modules/management/README.md +++ b/modules/management/README.md @@ -1,4 +1,4 @@ -# Check Point CloudGuard Network Security Management Server Terraform module for AWS +# Check Point CloudGuard Management Module Terraform module which deploys a Check Point CloudGuard Network Security Management Server into an existing VPC. @@ -9,130 +9,15 @@ These types of Terraform resources are supported: * [EIP](https://www.terraform.io/docs/providers/aws/r/eip.html) - conditional creation * [IAM Role](https://www.terraform.io/docs/providers/aws/r/iam_role.html) - conditional creation -See the [Security Management Server with CloudGuard for AWS](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk130372) for additional information +See the [Security Management Server with CloudGuard for AWS](hhttps://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest2) for additional information This solution uses the following modules: -- /terraform/aws/amis -- /terraform/aws/cme-iam-role +- amis +- cme-iam-role -## Configurations - -The **main.tf** file includes the following provider configuration block used to configure the credentials for the authentication with AWS, as well as a default region for your resources: -``` -provider "aws" { - region = var.region - access_key = var.access_key - secret_key = var.secret_key -} -``` -The provider credentials can be provided either as static credentials or as [Environment Variables](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables). -- Static credentials can be provided by adding an access_key and secret_key in /terraform/aws/management/**terraform.tfvars** file as follows: -``` -region = "us-east-1" -access_key = "my-access-key" -secret_key = "my-secret-key" -``` -- In case the Static credentials are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/cme-iam-role: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - ``` -- In case the Environment Variables are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - ``` - b. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/cme-iam-role: - ``` - provider "aws" { - // region = var.region - // access_key = var.access_key - // secret_key = var.secret_key - } - ``` ## Usage -- Fill all variables in the /terraform/aws/management/**terraform.tfvars** file with proper values (see below for variables descriptions). -- From a command line initialize the Terraform configuration directory: - ``` - terraform init - ``` -- Create an execution plan: - ``` - terraform plan - ``` -- Create or modify the deployment: - ``` - terraform apply - ``` - -- Variables are configured in /terraform/aws/management/**terraform.tfvars** file as follows: - - ``` - //PLEASE refer to README.md for accepted values FOR THE VARIABLES BELOW - - // --- VPC Network Configuration --- - vpc_id = "vpc-12345678" - subnet_id = "subnet-abc123" - - // --- EC2 Instances Configuration --- - management_name = "CP-Management-tf" - management_instance_type = "m5.xlarge" - key_name = "publickey" - allocate_and_associate_eip = true - volume_size = 100 - volume_encryption = "alias/aws/ebs" - enable_instance_connect = false - disable_instance_termination = false - instance_tags = { - key1 = "value1" - key2 = "value2" - } - - // --- IAM Permissions --- - iam_permissions = "Create with read permissions" - predefined_role = "" - sts_roles = [] - - // --- Check Point Settings --- - management_version = "R81.20-BYOL" - admin_shell = "/etc/cli.sh" - management_password_hash = "" - management_maintenance_mode_password_hash = "" # For R81.10 and below the management_password_hash is used also as maintenance-mode password. - // --- Security Management Server Settings --- - management_hostname = "mgmt-tf" - management_installation_type = "Primary management" - SICKey = "" - allow_upload_download = "true" - gateway_management = "Locally managed" - admin_cidr = "0.0.0.0/0" - gateway_addresses = "0.0.0.0/0" - primary_ntp = "" - secondary_ntp = "" - management_bootstrap_script = "echo 'this is bootstrap script' > /home/admin/bootstrap.txt" - ``` - -- Conditional creation - - To create an Elastic IP and associate it to the Management instance: - ``` - allocate_and_associate_eip = true - ``` - - To create IAM Role: - ``` - iam_permissions = "Create with read permissions" | "Create with read-write permissions" | "Create with assume role permissions (specify an STS role ARN)" - ``` -- To tear down your resources: - ``` - terraform destroy - ``` +Follow best practices for using CGNS modules on [the root page](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest#:~:text=Best%20Practices%20for%20Using%20Our%20Modules). ## Inputs | Name | Description | Type | Allowed values | Default | Required | @@ -177,26 +62,3 @@ secret_key = "my-secret-key" | management_public_ip | The deployed Security Management Server AWS public ip | | management_url | URL to the portal of the deployed Security Management Server | -## Revision History -In order to check the template version, please refer to [sk116585](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk116585) - -| Template Version | Description | -|-------------------|---------------------------------------------------------------------------------------------------------------| -| 20241027 | R82 version support | -| 20240704 | - R80.40 version deprecation.
- R81 version deprecation. | -| 20240515 | Add support for requiring use instance metadata service version 2 (IMDSv2) only | -| 20240207 | Added Log Server installation support | -| 20231012 | Update AWS Terraform provider version to 5.20.1 | -| 20230923 | Add support for C5d instance type | -| 20230914 | Add support for maintenance mode password | -| 20230829 | Change default Check Point version to R81.20 | -| 20230806 | Add support for c6in instance type | -| 20230521 | - Change default shell for the admin user to /etc/cli.sh
- Add description for reserved words in hostname | -| 20221123 | R81.20 version support | -| 20220606 | New instance type support | -| 20210329 | Stability fixes | -| 20210309 | First release of Check Point Security Management Server Terraform module for AWS | - -## License - -This project is licensed under the MIT License - see the [LICENSE](../../LICENSE) file for details