ON THIS PAGE
About the Schedules Page
To access this page, click Shared Services > Objects> Schedules.
The Schedules page enables you to create, modify, clone, and delete schedules for the security policy. A schedule allows you to restrict access to a resource, or remove a restriction to a resource, for a specified period of time.
Tasks You Can Perform
You can perform the following tasks from this page:
- Create a firewall policy schedule group. See Create a Schedule
- Modify, clone or delete a firewall policy schedule. See Edit, Clone, and Delete a Schedule
- View the configured parameters of a security policy schedule. Click the details icon that appears when you hover over the name of an image or click More> Detail.
- Show or hide columns about the security policy schedule. Click the Show Hide columns icon in the top right corner of the page and select columns that you want to view on the page.
Search for a specific security policy schedule. Click the Search icon in the top right corner of the page to search for a firewall policy schedule.
You can enter partial text or full text of the keyword in the text box and press Enter.
The search results are displayed on the same page.
Field Descriptions
Provides guidelines on using the fields on the Schedules page.
Field | Description |
---|---|
Name |
Name of the schedule; maximum length is 63 characters. |
Description |
Description for the schedule; maximum length is 900 characters. |
Start Date |
The date and time from when the schedule comes into effect. |
End Date |
The date and time from when the schedule ends. |
Second Start Date |
The second date and time from when the schedule comes into effect. |
Second End Date |
The second date and time from when the schedule ends. |
Schedules |
Displays if the schedule is active daily or for any specific days including specifc times of the day. |