Skip to content

Examples

This section provides practical scenarios to help you understand how to use scm-clone effectively. Each example demonstrates a real-world usage pattern, from initial setup to cloning various object types (addresses, tags, security rules, services) with different filters and runtime overrides.

Table of Contents

Overview

Before running clone operations, ensure you have a settings.yaml file configured. This file stores default credentials, logging preferences, and default flags like auto_approve or quiet. All commands read from settings.yaml first, allowing you to run most operations without constantly re-entering credentials or options.

If needed, you can override any setting at runtime using the provided flags.

Flags and Parameters

All commands use the context pattern with the following format:

scm-clone [command] --context [folder|snippet|device] --source "SourceName" --destination "DestinationName" [options]

Command Parameters

Argument/Flag Description Default
--context The context type ('folder', 'snippet', or 'device') "folder"
--source The source folder/snippet/device from which to retrieve objects None (prompted)
--destination The destination folder/snippet/device where objects will be created None (prompted)
--names, -n Comma-separated list of object names to filter None
--exclude-folders Comma-separated list of folders to exclude from retrieval None
--exclude-snippets Comma-separated list of snippets to exclude from retrieval None
--exclude-devices Comma-separated list of devices to exclude from retrieval None
--commit-and-push If set, commit changes on the destination tenant after creating objects False
--auto-approve, -A If set (or in settings), skip confirmation prompt before cloning Value from settings
--create-report, -R If set (or in settings), append results to result.csv Value from settings
--dry-run, -D If set (or in settings), simulate without applying changes Value from settings
--quiet-mode, -Q If set (or in settings), hide console output except logs Value from settings
--logging-level, -L Override logging level (DEBUG, INFO, WARNING, ERROR, CRITICAL) Value from settings
--settings-file, -s Path to the YAML settings file settings.yaml

Initial Setup (Creating the Settings File)

The first step is to generate the settings.yaml file that stores your SCM credentials, default logging preferences, and behaviors like auto_approve or quiet_mode.

scm-clone settings

Follow the prompts to enter:

  • Source and destination SCM credentials (client_id, client_secret, tsg_id).
  • Logging level (e.g., INFO).
  • Additional flags (auto_approve, create_report, dry_run, quiet) as defaults.

Once the file is created, all commands will use these defaults unless overridden at runtime.

Cloning Addresses

Addresses are one of the most common object types. After creating settings.yaml, you can clone addresses from a source folder.

Example: Cloning addresses from folder "Texas" with no additional filters:

scm-clone addresses --context folder --source "Texas" --destination "Texas"

If auto_approve is false in your settings, you'll be prompted before actually creating the objects. If quiet_mode is false, you'll see a table of retrieved addresses and, after creation, a table of successfully created objects.

Overriding to run a dry-run:

scm-clone addresses --context folder --source "Texas" --destination "Texas" -D

This simulates the process without applying changes.

Using filters and committing changes after creation:

scm-clone addresses --context folder --source "Texas" --destination "Texas" --exclude-folders "All,Default" --exclude-snippets "predefined" -A --commit-and-push

This excludes addresses from the All and Default folders, snippet predefined, auto-approves the operation, and commits changes after successful creation.

Cloning Tags

For tags, assume we have a similar workflow. Just specify the folder and any filters:

scm-clone tags --context folder --source "Texas" --destination "Texas" --exclude-devices "DeviceA" -A

This auto-approves and excludes any tag objects associated with DeviceA, prompting no confirmations since -A was used.

If you want a dry-run scenario for tags:

scm-clone tags --context folder --source "Texas" --destination "Texas" -D

This will show you what would happen without making any changes.

Cloning Services

For services, you may want to exclude certain snippets or folders. Additionally, you might want to run quietly to avoid console clutter:

scm-clone services --context folder --source "Texas" --destination "Texas" --exclude-snippets "legacy-snippet" -Q

This command suppresses console output, relying on logs for progress. If you have auto_approve enabled in settings.yaml, it will skip prompts as well.

To commit changes after cloning services:

scm-clone services --context folder --source "Texas" --destination "Texas" --commit-and-push

Cloning Security Rules

Security rules often require careful filtering and a dry-run before applying. Suppose you want to clone rules from folder cdot65 in the pre rulebase, and you'd like a prompt before proceeding:

scm-clone security-rules --context folder --source "cdot65" --destination "cdot65" --rulebase "pre"

If you want to exclude certain devices or snippets while cloning security rules:

scm-clone security-rules --context folder --source "cdot65" --destination "cdot65" --rulebase "pre" --exclude-devices "DeviceX" --exclude-snippets "snipA,snipB"

To automatically approve and commit the changes:

scm-clone security-rules --context folder --source "cdot65" --destination "cdot65" --rulebase "pre" -A --commit-and-push

Cloning Remote Networks

Remote Networks are a key component of SASE deployments. After setting up your settings.yaml file with proper SASE credentials, you can use the following commands to clone Remote Network objects between tenants.

Basic cloning of remote networks from a source folder:

scm-clone remote-networks --context folder --source "Remote Networks" --destination "Remote Networks"

This will list all remote networks in the source folder, prompting for confirmation before cloning.

Specifying different source and destination folders:

scm-clone remote-networks --context folder --source "Remote Networks" --destination "Branch Offices"

This retrieves remote networks from "Remote Networks" folder in the source tenant and creates them in the "Branch Offices" folder in the destination tenant.

Excluding specific folders and auto-approving:

scm-clone remote-networks --context folder --source "Remote Networks" --destination "Remote Networks" --exclude-folders "Deprecated,Testing" -A

This excludes any remote networks in the "Deprecated" and "Testing" folders, and skips confirmation prompts.

Running a dry run with automatic commit after creation:

scm-clone remote-networks --context folder --source "Remote Networks" --destination "Remote Networks" -D --commit-and-push

This will simulate the creation without applying changes. Note that --commit-and-push has no effect during a dry run.

Complete example with reporting and commit:

scm-clone remote-networks --context folder --source "Remote Networks" --destination "Production" --exclude-folders "Testing" -A -R --commit-and-push

This command: - Retrieves remote networks from "Remote Networks" folder, excluding any in the "Testing" folder - Creates them in the "Production" folder in the destination tenant - Auto-approves without prompting for confirmation - Creates/appends results to result.csv - Commits changes to the destination tenant after successful creation

Cloning Syslog Server Profiles

Syslog server profiles define configurations for forwarding logs to external syslog servers. The following examples demonstrate how to clone these configurations between SCM tenants.

Basic cloning of syslog server profiles from a source folder:

scm-clone syslog-server-profiles --context folder --source "Logging" --destination "Logging"

This lists all syslog server profiles in the source folder and prompts for confirmation before cloning.

Using a specific context type and folder:

scm-clone syslog-server-profiles --context folder --source "Logging" --destination "Security"

This explicitly specifies that we're working with folders, retrieves profiles from the "Logging" folder, and creates them in the "Security" folder.

Working with snippets instead of folders:

scm-clone syslog-server-profiles --context snippet --source "logging-snippet" --destination "security-snippet"

This retrieves profiles from a source snippet and creates them in a destination snippet, instead of working with folders.

Excluding specific profiles and auto-approving:

scm-clone syslog-server-profiles --context folder --source "Logging" --destination "Logging" --exclude-folders "Test,Development" -A

This excludes profiles from the "Test" and "Development" folders, automatically proceeding without confirmation.

Performing a dry run:

scm-clone syslog-server-profiles --context folder --source "Logging" --destination "Logging" -D

This simulates the cloning operation without making any changes, showing what would be created.

Creating a report, committing changes, and enabling quiet mode:

scm-clone syslog-server-profiles --context folder --source "Logging" --destination "Production" -A -R -Q --commit-and-push

This command: - Retrieves syslog server profiles from the "Logging" folder - Creates them in the "Production" folder - Auto-approves without prompting for confirmation - Creates/appends results to result.csv - Runs in quiet mode with minimal console output - Commits changes after successful creation

Debugging issues with verbose logging:

scm-clone syslog-server-profiles --source "Logging" --logging-level DEBUG

This increases the logging level to DEBUG to help diagnose any issues that might occur during the cloning process.

Cloning IKE Crypto Profiles

IKE Crypto Profiles define the encryption, authentication, and key exchange parameters used for IPsec VPN tunnels. The following examples demonstrate how to clone these profiles between SCM tenants.

Basic cloning of IKE crypto profiles from a source folder:

scm-clone ike-crypto-profiles --context folder --source "VPN" --destination "VPN"

This lists all IKE crypto profiles in the source folder and prompts for confirmation before cloning.

Specifying different source and destination folders:

scm-clone ike-crypto-profiles --context folder --source "VPN" --destination "VPN-Profiles"

This retrieves IKE crypto profiles from the "VPN" folder and creates them in the "VPN-Profiles" folder in the destination tenant.

Using snippets instead of folders:

scm-clone ike-crypto-profiles --context snippet --source "vpn-snippet" --destination "vpn-profiles-snippet"

This retrieves profiles from a source snippet and creates them in a destination snippet.

Filtering by profile names:

scm-clone ike-crypto-profiles --context folder --source "VPN" --destination "VPN" --names "profile1,profile2,profile3"

This clones only the specified profiles by name from the source folder.

Performing a dry run with auto-approve:

scm-clone ike-crypto-profiles --context folder --source "VPN" --destination "VPN" -D -A

This simulates the cloning operation without making any changes and skips confirmation prompts.

Complete example with reporting and commit:

scm-clone ike-crypto-profiles --context folder --source "VPN" --destination "Production-VPN" --names "aes-256-sha256,aes-gcm-sha384" -A -R --commit-and-push

This command: - Retrieves only the specified IKE crypto profiles from the "VPN" folder - Creates them in the "Production-VPN" folder in the destination tenant - Auto-approves without prompting for confirmation - Creates/appends results to result.csv - Commits changes to the destination tenant after successful creation

Cloning IKE Gateways

IKE Gateways define the connection points for IPsec VPN tunnels. The following examples demonstrate how to clone these gateway configurations between SCM tenants.

Basic cloning of IKE gateways from a source folder:

scm-clone ike-gateways --context folder --source "VPN" --destination "VPN"

This lists all IKE gateways in the source folder and prompts for confirmation before cloning.

Specifying different source and destination folders:

scm-clone ike-gateways --context folder --source "VPN" --destination "VPN-Gateways"

This retrieves IKE gateways from the "VPN" folder and creates them in the "VPN-Gateways" folder in the destination tenant.

Using snippets instead of folders:

scm-clone ike-gateways --context snippet --source "vpn-snippet" --destination "vpn-gateways-snippet"

This retrieves gateways from a source snippet and creates them in a destination snippet.

Filtering by gateway names:

scm-clone ike-gateways --context folder --source "VPN" --destination "VPN" --names "gateway1,gateway2,gateway3"

This clones only the specified gateways by name from the source folder.

Performing a dry run with auto-approve:

scm-clone ike-gateways --context folder --source "VPN" --destination "VPN" -D -A

This simulates the cloning operation without making any changes and skips confirmation prompts.

Complete example with reporting and commit:

scm-clone ike-gateways --context folder --source "VPN" --destination "Production-VPN" --names "site-a-gateway,site-b-gateway" -A -R --commit-and-push

This command: - Retrieves only the specified IKE gateways from the "VPN" folder - Creates them in the "Production-VPN" folder in the destination tenant - Auto-approves without prompting for confirmation - Creates/appends results to result.csv - Commits changes to the destination tenant after successful creation

Cloning IPsec Crypto Profiles

IPsec Crypto Profiles define the encryption, authentication, and other security parameters used for IPsec VPN tunnels. The following examples demonstrate how to clone these profiles between SCM tenants.

Basic cloning of IPsec crypto profiles from a source folder:

scm-clone ipsec-crypto-profiles --context folder --source "VPN" --destination "VPN"

This lists all IPsec crypto profiles in the source folder and prompts for confirmation before cloning.

Specifying different source and destination folders:

scm-clone ipsec-crypto-profiles --context folder --source "VPN" --destination "VPN-Profiles"

This retrieves IPsec crypto profiles from the "VPN" folder and creates them in the "VPN-Profiles" folder in the destination tenant.

Using snippets instead of folders:

scm-clone ipsec-crypto-profiles --context snippet --source "vpn-snippet" --destination "vpn-profiles-snippet"

This retrieves profiles from a source snippet and creates them in a destination snippet.

Filtering by profile names:

scm-clone ipsec-crypto-profiles --context folder --source "VPN" --destination "VPN" --names "esp-aes-256-sha1,ah-sha-256,esp-gcm-profile"

This clones only the specified profiles by name from the source folder.

Performing a dry run with auto-approve:

scm-clone ipsec-crypto-profiles --context folder --source "VPN" --destination "VPN" -D -A

This simulates the cloning operation without making any changes and skips confirmation prompts.

Complete example with reporting and commit:

scm-clone ipsec-crypto-profiles --context folder --source "VPN" --destination "Production-VPN" --names "esp-aes-256-gcm,esp-suite-b" -A -R --commit-and-push

This command: - Retrieves only the specified IPsec crypto profiles from the "VPN" folder - Creates them in the "Production-VPN" folder in the destination tenant - Auto-approves without prompting for confirmation - Creates/appends results to result.csv - Commits changes to the destination tenant after successful creation

Other Supported Commands

The following commands are also available but not covered in detail in this examples document. They all follow the same pattern and support the same flags and arguments as the commands shown above.

Object Commands

  • address-groups: Clone address group objects (use --context folder/snippet/device)
  • application-filters: Clone application filter objects (use --context folder/snippet/device)
  • application-groups: Clone application group objects (use --context folder/snippet/device)
  • dynamic-user-groups: Clone dynamic user group objects (use --context folder/snippet/device)
  • hip-profiles: Clone HIP profile objects (use --context folder/snippet/device)
  • http-server-profiles: Clone HTTP server profile objects (use --context folder/snippet/device)
  • log-forwarding-profiles: Clone log forwarding profile objects (use --context folder/snippet/device)
  • quarantined-devices: Clone quarantined device objects (use --context folder/snippet/device)
  • regions: Clone region objects (use --context folder/snippet/device)
  • schedules: Clone schedule objects (use --context folder/snippet/device)
  • service-groups: Clone service group objects (use --context folder/snippet/device)

Security Service Commands

  • anti-spyware-profiles: Clone anti-spyware profile objects (use --context folder/snippet/device)
  • decryption-profiles: Clone decryption profile objects (use --context folder/snippet/device)
  • dns-security-profiles: Clone DNS security profile objects (use --context folder/snippet/device)
  • security-rules: Clone security rule objects (use --context folder/snippet/device)
  • url-categories: Clone URL category objects (use --context folder/snippet/device)
  • vulnerability-profiles: Clone vulnerability protection profile objects (use --context folder/snippet/device)
  • wildfire-profiles: Clone Wildfire antivirus profile objects (use --context folder/snippet/device)

Network Service Commands

  • ike-crypto-profiles: Clone IKE crypto profile objects (use --context folder/snippet/device)
  • ike-gateways: Clone IKE gateway objects (use --context folder/snippet/device)
  • ipsec-crypto-profiles: Clone IPsec crypto profile objects (use --context folder/snippet/device)
  • nat-rules: Clone NAT rule objects (use --context folder/snippet/device)

To use any of these commands, follow the same context pattern for all commands:

scm-clone [command-name] --context folder --source "Source Name" --destination "Destination Name" [other-options]

For detailed information about each command, including its specific parameters and behavior, refer to the Commands section.

Advanced Examples

Using a Custom Settings File: If you have multiple environments, you might have different settings files:

scm-clone addresses --source-folder "Texas" --settings-file "production_settings.yaml"

This command uses production_settings.yaml instead of the default settings.yaml.

Generating a Report: If you want to record all cloned addresses into result.csv for auditing:

scm-clone addresses --source-folder "Texas" -R

After cloning, the CLI will append the results to result.csv with details about each cloned object.

Combining Flags: For a scenario where you want to exclude folders, run quietly, auto-approve, and create a report all at once:

scm-clone tags --source-folder "Texas" --exclude-folders "All,Default" -A -R -Q

This command retrieves and clones tags from the "Texas", excluding "All" and "Default" folders, auto-approves without prompts, creates a CSV report, and runs quietly without console output.

Complete Tenant Migration Workflow

This section demonstrates a comprehensive workflow for migrating configuration from one tenant to another.

Step 1: Initial Setup

First, create your settings file with credentials for both source and destination tenants:

scm-clone settings

Follow the prompts to enter your source and destination tenant credentials.

Step 2: Clone Static Objects First

Start by cloning the foundational objects that other configurations may depend on:

# Clone address objectsscm-clone addresses --context folder --source "Network Objects" --destination "Network Objects" --commit-and-push
# Clone servicesscm-clone services --context folder --source "Service Objects" --destination "Service Objects" --commit-and-push
# Clone tagsscm-clone tags --context folder --source "Tags" --destination "Tags" --commit-and-push

Step 3: Clone Group Objects

Next, clone group objects that reference the static objects:

# Clone address groupsscm-clone address-groups --context folder --source "Network Objects" --destination "Network Objects" --commit-and-push
# Clone service groupsscm-clone service-groups --context folder --source "Service Objects" --destination "Service Objects" --commit-and-push
# Clone application groupsscm-clone application-groups --context folder --source "Applications" --destination "Applications" --commit-and-push

Step 4: Clone Security Profiles

Before cloning security rules, set up the security profiles:

# Clone anti-spyware profilesscm-clone anti-spyware-profiles --context folder --source "Security Profiles" --destination "Security Profiles" --commit-and-push
# Clone URL categoriesscm-clone url-categories --context folder --source "Security Profiles" --destination "Security Profiles" --commit-and-push
# Clone other security profilesscm-clone vulnerability-profiles --context folder --source "Security Profiles" --destination "Security Profiles" --commit-and-push
scm-clone wildfire-profiles --context folder --source "Security Profiles" --destination "Security Profiles" --commit-and-push

Step 5: Clone Security Rules

Now you can clone the security rules that reference all the objects and profiles:

# Clone security rulesscm-clone security-rules --context folder --source "Security" --destination "Security" --commit-and-push

Step 6: Clone NAT Rules

Clone NAT rules after security rules:

# Clone NAT rulesscm-clone nat-rules --context folder --source "NAT" --destination "NAT" --commit-and-push

Step 7: Clone VPN Configurations

For VPN configurations:

# Clone IKE crypto profilesscm-clone ike-crypto-profiles --context folder --source "VPN" --destination "VPN" --commit-and-push
# Clone IKE gatewaysscm-clone ike-gateways --context folder --source "VPN" --destination "VPN" --commit-and-push
# Clone IPsec crypto profilesscm-clone ipsec-crypto-profiles --context folder --source "VPN" --destination "VPN" --commit-and-push

Step 8: Clone SASE Configurations (if applicable)

If you're also migrating SASE configurations:

# Clone remote networksscm-clone remote-networks --context folder --source "Remote Networks" --destination "Remote Networks" --commit-and-push

Step 8: Verify Migration

After completing all the cloning operations, verify that all objects were successfully created and committed in the destination tenant. Look for any errors in the console output or log files.

This comprehensive workflow ensures that objects are migrated in the correct dependency order, minimizing the risk of reference errors during the migration process.