Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 
 

About the Schedules Page

To access this page, click Shared Services > Objects> Schedules.

The Schedules page enables you to create, modify, clone, and delete schedules for the security policy. A schedule allows you to restrict access to a resource, or remove a restriction to a resource, for a specified period of time.

Tasks You Can Perform

You can perform the following tasks from this page:

  • Create a firewall policy schedule group. See Create a Schedule
  • Modify, clone or delete a firewall policy schedule. See Edit, Clone, and Delete a Schedule
  • View the configured parameters of a security policy schedule. Click the details icon that appears when you hover over the name of an image or click More> Detail.
  • Show or hide columns about the security policy schedule. Click the Show Hide columns icon in the top right corner of the page and select columns that you want to view on the page.
  • Search for a specific security policy schedule. Click the Search icon in the top right corner of the page to search for a firewall policy schedule.

    You can enter partial text or full text of the keyword in the text box and press Enter.

    The search results are displayed on the same page.

Field Descriptions

Provides guidelines on using the fields on the Schedules page.

Field Description

Name

Name of the schedule; maximum length is 63 characters.

Description

Description for the schedule; maximum length is 900 characters.

Start Date

The date and time from when the schedule comes into effect.

End Date

The date and time from when the schedule ends.

Second Start Date

The second date and time from when the schedule comes into effect.

Second End Date

The second date and time from when the schedule ends.

Schedules

Displays if the schedule is active daily or for any specific days including specifc times of the day.