diff --git a/README.md b/README.md
index 9eb268d..2b92e1c 100644
--- a/README.md
+++ b/README.md
@@ -11,9 +11,41 @@ This repository provides a structured set of Terraform modules for deploying Che
## Available Submodules
**Submodules:**
+* [`autoscale`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/autoscale) - Deploys Auto Scaling Group of CloudGuard Security Gateways into an existing VPC.
+* [`autoscale_gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/autoscale_gwlb) - Deploys Auto Scaling Group of CloudGuard Security Gateways into an existing VPC.
+* [`cluster`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cluster) - Deploys CloudGuard Network Security Cluster into an existing VPC on AWS.
+* [`cluster_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cluster_master) - Deploys CloudGuard Network Security Cluster into a new VPC.
+* [`cme_iam_role`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cme_iam_role) - Creates AWS IAM Role for Cloud Management Extension (CME) on Security Management Server.
+* [`cme_iam_role_gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cme_iam_role_gwlb) - Creates AWS IAM Role for Cloud Management Extension (CME) manages Gateway Load Balancer Auto Scale Group on Security Management Server.
+* [`cross_az_cluster`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cross_az_cluster) - Deploys Check Point CloudGuard Network Security Cross AZ Cluster into an existing VPC on AWS.
+* [`cross_az_cluster_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cross_az_cluster_master) - Deploys Check Point CloudGuard Network Security Cross AZ Cluster into into a new VPC.
+* [`gateway`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gateway) - Deploys Check Point CloudGuard Network Security Gateway into an existing VPC.
+* [`gateway_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gateway_master) -Check Point CloudGuard Network Security Gateway into a new VPC.
+* [`gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gwlb) - Deploys AWS Auto Scaling group configured for Gateway Load Balancer into an existing VPC.
+* [`gwlb_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/gwlb_master) - Deploys AWS Auto Scaling group configured for Gateway Load Balancer into a new VPC.
+* [`management`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/management) - Deploys CloudGuard Network Security Management Server into an existing VPC.
+* [`mds`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/mds) - Deploys CloudGuard Network Multi-Domain Server into an existing VPC.
+* [`qs_autoscale`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/qs_autoscale) - Deploys CloudGuard Network Security Gateway Auto Scaling Group, an external ALB/NLB, and optionally a Security Management Server and a web server Auto Scaling Group.
+* [`qs_autoscale_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/qs_autoscale_master) - Deploys CloudGuard Network Security Gateway Auto Scaling Group, an external ALB/NLB, and optionally a Security Management Server and a web server Auto Scaling Group in a new VPC.
+* [`standalone`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/standalone) - Check Point CloudGuard Network Security Gateway & Management (Standalone) instance into an existing VPC.
+* [`standalone_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/standalone_master) - CloudGuard Network Security Gateway & Management (Standalone) instance into a new VPC.
+* [`tap`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tap) - Deploys TAP solution in an existing VPC on AWS.
+* [`tgw_asg`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_asg) - Deploys CloudGuard Network Security Gateway Auto Scaling Group for Transit Gateway with an optional Management Server into an existing VPC.
+* [`tgw_asg_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_asg_master) - CloudGuard Network Security Gateway Auto Scaling Group for Transit Gateway with an optional Management Server in a new VPC.
+* [`tgw_cross_az_cluster`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_cross_az_cluster) - Deploys CloudGuard Network Security Cross AZ Cluster into an existing VPC on AWS for Transit Gateway.
+* [`tgw_cross_az_cluster_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_cross_az_cluster_master) - Deploys CloudGuard Network Security Cross AZ Cluster with a new VPC on AWS for Transit Gateway.
+* [`tgw_gwlb`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_gwlb) - Deploys WS Auto Scaling group configured for Gateway Load Balancer into existing Centralized Security VPC for Transit Gateway.
+* [`tgw_gwlb_master`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/tgw_gwlb_master) - Deploys AWS Auto Scaling group configured for Gateway Load Balancer into new Centralized Security VPC for Transit Gateway.
**Internal Submodules:**
+* [`amis`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/amis)
+* [`cloudwatch_policy`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cloudwatch_policy)
+* [`cluster_iam_role`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/cluster_iam_role)
+* [`common`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/common)
+* [`custom_autoscale`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/custom_autoscale)
+* [`vpc`](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest/submodules/vpc)
+
___
diff --git a/modules/gateway_master/README.md b/modules/gateway_master/README.md
index aba0130..edc63ff 100644
--- a/modules/gateway_master/README.md
+++ b/modules/gateway_master/README.md
@@ -18,130 +18,13 @@ This solution uses the following modules:
- /terraform/aws/amis
- /terraform/aws/vpc
-## Configurations
+## Usage
+Follow best practices for using CGNS modules on [the root page](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest#:~:text=Best%20Practices%20for%20Using%20Our%20Modules).
-The **main.tf** file includes the following provider configuration block used to configure the credentials for the authentication with AWS, as well as a default region for your resources:
-```
-provider "aws" {
- region = var.region
- access_key = var.access_key
- secret_key = var.secret_key
-}
-```
-The provider credentials can be provided either as static credentials or as [Environment Variables](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables).
-- Static credentials can be provided by adding an access_key and secret_key in /terraform/aws/gateway_master/**terraform.tfvars** file as follows:
-```
-region = "us-east-1"
-access_key = "my-access-key"
-secret_key = "my-secret-key"
+**Instead of the standard terraform apply command, use the following:**
```
-- In case the Static credentials are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/gateway:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
- ```
-- In case the Environment Variables are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
- ```
- b. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/gateway:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
-
-
-## Usage
-- Fill all variables in the /terraform/aws/gateway_master/**terraform.tfvars** file with proper values (see below for variables descriptions).
-- From a command line initialize the Terraform configuration directory:
- ```
- terraform init
- ```
-- Create an execution plan:
- ```
- terraform plan
- ```
-- Create or modify the deployment:
- - Due to terraform limitation, the apply command is:
- ```
terraform apply -target=module.gateway-test.aws_route_table.private_subnet_rtb -auto-approve && terraform apply
- ```
- >Once terraform is updated, we will update accordingly.
-
-- Variables are configured in /terraform/aws/gateway_master/**terraform.tfvars** file as follows:
-
- ```
- //PLEASE refer to README.md for accepted values FOR THE VARIABLES BELOW
-
- // --- VPC Network Configuration ---
- vpc_cidr = "10.0.0.0/16"
- public_subnets_map = {
- "us-east-1a" = 1
- }
- private_subnets_map = {
- "us-east-1a" = 2
- }
- subnets_bit_length = 8
-
- // --- EC2 Instance Configuration ---
- gateway_name = "Check-Point-Gateway-tf"
- gateway_instance_type = "c5.xlarge"
- key_name = "publickey"
- allocate_and_associate_eip = true
- volume_size = 100
- volume_encryption = ""
- enable_instance_connect = false
- disable_instance_termination = false
- instance_tags = {
- key1 = "value1"
- key2 = "value2"
- }
-
- // --- Check Point Settings ---
- gateway_version = "R81.20-BYOL"
- admin_shell = "/etc/cli.sh"
- gateway_SICKey = "12345678"
- gateway_password_hash = ""
- gateway_maintenance_mode_password_hash = "" # For R81.10 and below the gateway_password_hash is used also as maintenance-mode password.
- // --- Quick connect to Smart-1 Cloud (Recommended) ---
- gateway_TokenKey = ""
-
- // --- Advanced Settings ---
- resources_tag_name = "tag-name"
- gateway_hostname = "gw-hostname"
- allow_upload_download = true
- enable_cloudwatch = false
- gateway_bootstrap_script = "echo 'this is bootstrap script' > /home/admin/bootstrap.txt"
- primary_ntp = ""
- secondary_ntp = ""
-
- // --- (Optional) Automatic Provisioning with Security Management Server Settings ---
- control_gateway_over_public_or_private_address = "private"
- management_server = ""
- configuration_template = ""
- ```
-
-- Conditional creation
- - To create an Elastic IP and associate it to the Gateway instance:
- ```
- allocate_and_associate_eip = true
- ```
-
-- To tear down your resources:
- ```
- terraform destroy
- ```
+```
## Inputs
diff --git a/modules/gwlb_master/README.md b/modules/gwlb_master/README.md
index cd32835..c022a21 100644
--- a/modules/gwlb_master/README.md
+++ b/modules/gwlb_master/README.md
@@ -1,4 +1,4 @@
-# Check Point CloudGuard Network Gateway Load Balancer Master Terraform module for AWS
+# Check Point CloudGuard Gateway Load Balancer Master Module
Terraform module which deploys an AWS Auto Scaling group configured for Gateway Load Balancer into a new VPC.
@@ -15,146 +15,15 @@ These types of Terraform resources are supported:
See the [Check Point CloudGuard Gateway Load Balancer on AWS](https://sc1.checkpoint.com/documents/IaaS/WebAdminGuides/EN/CP_CloudGuard_Network_for_AWS_Centralized_Gateway_Load_Balancer/Content/Topics-AWS-GWLB-VPC-DG/Introduction.htm) for additional information
This solution uses the following modules:
-- /terraform/aws/autoscale_gwlb
-- /terraform/aws/management
-- /terraform/aws/cme_iam_role_gwlb
-- /terraform/aws/amis
-- /terraform/aws/vpc
-## Configurations
-
-The **main.tf** file includes the following provider configuration block used to configure the credentials for the authentication with AWS, as well as a default region for your resources:
-```
-provider "aws" {
- region = var.region
- access_key = var.aws_access_key_ID
- secret_key = var.aws_secret_access_key
-}
-```
-The provider credentials can be provided either as static credentials or as [Environment Variables](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables).
-- Static credentials can be provided by adding an access_key and secret_key in /terraform/aws/qs_autoscale/**terraform.tfvars** file as follows:
-```
-region = "us-east-1"
-access_key = "my-access-key"
-secret_key = "my-secret-key"
-```
-- In case the Static credentials are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-modules /terraform/aws/autoscale_gwlb, /terraform/aws/management and /terraform/aws/cme_iam_role_gwlb:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
- ```
-- In case the Environment Variables are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.aws_access_key_ID
- // secret_key = var.aws_secret_access_key
- }
- ```
- b. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-modules /terraform/aws/autoscale, /terraform/aws/management and /terraform/aws/cme_iam_role_gwlb:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.aws_access_key_ID
- // secret_key = var.aws_secret_access_key
- }
- ```
+- autoscale_gwlb
+- management
+- cme_iam_role_gwlb
+- amis
+- vpc
## Usage
-- Fill all variables in the /terraform/aws/gwlb/**terraform.tfvars** file with proper values (see below for variables descriptions).
-- From a command line initialize the Terraform configuration directory:
- ```
- terraform init
- ```
-- Create an execution plan:
- ```
- terraform plan
- ```
- - Create or modify the deployment:
- ```
- terraform apply
- ```
-
- - Variables are configured in /terraform/aws/qs_autoscale/**terraform.tfvars** file as follows:
-
- ```
- //PLEASE refer to README.md for accepted values FOR THE VARIABLES BELOW
+Follow best practices for using CGNS modules on [the root page](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest#:~:text=Best%20Practices%20for%20Using%20Our%20Modules).
-
- // --- Network Configuration ---
- vpc_cidr = "10.0.0.0/16"
- public_subnets_map = {
- "us-east-1a" = 1
- "us-east-1b" = 2
- }
- subnets_bit_length = 8
-
- // --- General Settings ---
- key_name = "publickey"
- enable_volume_encryption = true
- volume_size = 100
- enable_instance_connect = false
- disable_instance_termination = false
- allow_upload_download = true
- management_server = "CP-Management-gwlb-tf"
- configuration_template = "gwlb-configuration"
- admin_shell = "/etc/cli.sh"
-
- // --- Gateway Load Balancer Configuration ---
- gateway_load_balancer_name = "gwlb1"
- target_group_name = "tg1"
- connection_acceptance_required = "false"
- enable_cross_zone_load_balancing = "true"
-
- // --- Check Point CloudGuard IaaS Security Gateways Auto Scaling Group Configuration ---
- gateway_name = "Check-Point-GW-tf"
- gateway_instance_type = "c5.xlarge"
- minimum_group_size = 2
- maximum_group_size = 10
- gateway_version = "R81.20-BYOL"
- gateway_password_hash = ""
- gateway_maintenance_mode_password_hash = "" # For R81.10 and below the gateway_password_hash is used also as maintenance-mode password.
- gateway_SICKey = "12345678"
- gateways_provision_address_type = "private"
- allocate_public_IP = false
- enable_cloudwatch = false
- gateway_bootstrap_script = "echo 'this is bootstrap script' > /home/admin/bootstrap.txt"
-
- // --- Check Point CloudGuard IaaS Security Management Server Configuration ---
- management_deploy = true
- management_instance_type = "m5.xlarge"
- management_version = "R81.20-BYOL"
- management_password_hash = ""
- management_maintenance_mode_password_hash = "" # For R81.10 and below the management_password_hash is used also as maintenance-mode password.
- gateways_policy = "Standard"
- gateway_management = "Locally managed"
- admin_cidr = ""
- gateways_addresses = ""
-
- // --- Other parameters ---
- volume_type = "gp3"
-
-
- ```
-
-- Conditional creation
- - To enable cloudwatch for gwlb_master:
- ```
- enable_cloudwatch = true
- ```
- Note: enabling cloudwatch will automatically create IAM role with cloudwatch:PutMetricData permission
- - To deploy Security Management Server:
- ```
- management_deploy = true
- ```
-- To tear down your resources:
- ```
- terraform destroy
- ```
## Inputs
| Name | Description | Type | Allowed values | Default | Required |
@@ -209,29 +78,4 @@ secret_key = "my-secret-key"
| controller_name | The controller name in CME. |
| gwlb_name | The name of the deployed Gateway Load Balancer |
| gwlb_service_name | The service name for the deployed Gateway Load Balancer |
-| gwlb_arn | The arn for the deployed Gateway Load Balancer |
-
-
-## Revision History
-In order to check the template version, please refer to [sk116585](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk116585)
-
-| Template Version | Description |
-|------------------|---------------------------------------------------------------------------------------------|
-| 20241027 | R82 version support |
-| 20240704 | R80.40 version deprecation |
-| 20240515 | Add support for requiring use instance metadata service version 2 (IMDSv2) only |
-| 20231012 | Update AWS Terraform provider version to 5.20.1 |
-| 20230923 | Add support for C5d instance type |
-| 20230914 | Add support for maintenance mode password |
-| 20230910 | Add bootstrap script execution option for deployed gateways |
-| 20230829 | Change default Check Point version to R81.20 |
-| 20230806 | Add support for c6in instance type |
-| 20230521 | Change default shell for the admin user to /etc/cli.sh |
-| 20221215 | Support ASG Launch Template instead of Launch Configuration |
-| 20221123 | R81.20 version support |
-| 20220606 | New instance type support |
-| 20220414 | First release of Check Point CloudGuard Network Gateway Load Balancer master module for AWS |
-
-## License
-
-This project is licensed under the MIT License - see the [LICENSE](../../LICENSE) file for details
+| gwlb_arn | The arn for the deployed Gateway Load Balancer |
\ No newline at end of file
diff --git a/modules/management/README.md b/modules/management/README.md
index 29c13be..e275f4f 100644
--- a/modules/management/README.md
+++ b/modules/management/README.md
@@ -1,4 +1,4 @@
-# Check Point CloudGuard Network Security Management Server Terraform module for AWS
+# Check Point CloudGuard Management Module
Terraform module which deploys a Check Point CloudGuard Network Security Management Server into an existing VPC.
@@ -9,130 +9,15 @@ These types of Terraform resources are supported:
* [EIP](https://www.terraform.io/docs/providers/aws/r/eip.html) - conditional creation
* [IAM Role](https://www.terraform.io/docs/providers/aws/r/iam_role.html) - conditional creation
-See the [Security Management Server with CloudGuard for AWS](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk130372) for additional information
+See the [Security Management Server with CloudGuard for AWS](hhttps://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest2) for additional information
This solution uses the following modules:
-- /terraform/aws/amis
-- /terraform/aws/cme-iam-role
+- amis
+- cme-iam-role
-## Configurations
-
-The **main.tf** file includes the following provider configuration block used to configure the credentials for the authentication with AWS, as well as a default region for your resources:
-```
-provider "aws" {
- region = var.region
- access_key = var.access_key
- secret_key = var.secret_key
-}
-```
-The provider credentials can be provided either as static credentials or as [Environment Variables](https://registry.terraform.io/providers/hashicorp/aws/latest/docs#environment-variables).
-- Static credentials can be provided by adding an access_key and secret_key in /terraform/aws/management/**terraform.tfvars** file as follows:
-```
-region = "us-east-1"
-access_key = "my-access-key"
-secret_key = "my-secret-key"
-```
-- In case the Static credentials are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/cme-iam-role:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
- ```
-- In case the Environment Variables are used, perform modifications described below:
- a. The next lines in main.tf file, in the provider aws resource, need to be commented:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
- ```
- b. The next lines in main.tf file, in the provider aws resource, need to be commented for sub-module /terraform/aws/cme-iam-role:
- ```
- provider "aws" {
- // region = var.region
- // access_key = var.access_key
- // secret_key = var.secret_key
- }
- ```
## Usage
-- Fill all variables in the /terraform/aws/management/**terraform.tfvars** file with proper values (see below for variables descriptions).
-- From a command line initialize the Terraform configuration directory:
- ```
- terraform init
- ```
-- Create an execution plan:
- ```
- terraform plan
- ```
-- Create or modify the deployment:
- ```
- terraform apply
- ```
-
-- Variables are configured in /terraform/aws/management/**terraform.tfvars** file as follows:
-
- ```
- //PLEASE refer to README.md for accepted values FOR THE VARIABLES BELOW
-
- // --- VPC Network Configuration ---
- vpc_id = "vpc-12345678"
- subnet_id = "subnet-abc123"
-
- // --- EC2 Instances Configuration ---
- management_name = "CP-Management-tf"
- management_instance_type = "m5.xlarge"
- key_name = "publickey"
- allocate_and_associate_eip = true
- volume_size = 100
- volume_encryption = "alias/aws/ebs"
- enable_instance_connect = false
- disable_instance_termination = false
- instance_tags = {
- key1 = "value1"
- key2 = "value2"
- }
-
- // --- IAM Permissions ---
- iam_permissions = "Create with read permissions"
- predefined_role = ""
- sts_roles = []
-
- // --- Check Point Settings ---
- management_version = "R81.20-BYOL"
- admin_shell = "/etc/cli.sh"
- management_password_hash = ""
- management_maintenance_mode_password_hash = "" # For R81.10 and below the management_password_hash is used also as maintenance-mode password.
- // --- Security Management Server Settings ---
- management_hostname = "mgmt-tf"
- management_installation_type = "Primary management"
- SICKey = ""
- allow_upload_download = "true"
- gateway_management = "Locally managed"
- admin_cidr = "0.0.0.0/0"
- gateway_addresses = "0.0.0.0/0"
- primary_ntp = ""
- secondary_ntp = ""
- management_bootstrap_script = "echo 'this is bootstrap script' > /home/admin/bootstrap.txt"
- ```
-
-- Conditional creation
- - To create an Elastic IP and associate it to the Management instance:
- ```
- allocate_and_associate_eip = true
- ```
- - To create IAM Role:
- ```
- iam_permissions = "Create with read permissions" | "Create with read-write permissions" | "Create with assume role permissions (specify an STS role ARN)"
- ```
-- To tear down your resources:
- ```
- terraform destroy
- ```
+Follow best practices for using CGNS modules on [the root page](https://registry.terraform.io/modules/chkp-guybarak/guy-test1/aws/latest#:~:text=Best%20Practices%20for%20Using%20Our%20Modules).
## Inputs
| Name | Description | Type | Allowed values | Default | Required |
@@ -177,26 +62,3 @@ secret_key = "my-secret-key"
| management_public_ip | The deployed Security Management Server AWS public ip |
| management_url | URL to the portal of the deployed Security Management Server |
-## Revision History
-In order to check the template version, please refer to [sk116585](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk116585)
-
-| Template Version | Description |
-|-------------------|---------------------------------------------------------------------------------------------------------------|
-| 20241027 | R82 version support |
-| 20240704 | - R80.40 version deprecation.
- R81 version deprecation. |
-| 20240515 | Add support for requiring use instance metadata service version 2 (IMDSv2) only |
-| 20240207 | Added Log Server installation support |
-| 20231012 | Update AWS Terraform provider version to 5.20.1 |
-| 20230923 | Add support for C5d instance type |
-| 20230914 | Add support for maintenance mode password |
-| 20230829 | Change default Check Point version to R81.20 |
-| 20230806 | Add support for c6in instance type |
-| 20230521 | - Change default shell for the admin user to /etc/cli.sh
- Add description for reserved words in hostname |
-| 20221123 | R81.20 version support |
-| 20220606 | New instance type support |
-| 20210329 | Stability fixes |
-| 20210309 | First release of Check Point Security Management Server Terraform module for AWS |
-
-## License
-
-This project is licensed under the MIT License - see the [LICENSE](../../LICENSE) file for details