Configuring Schedule Objects; Creating Schedule Objects; Configuring Access Profile Objects - Juniper NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 Administration Manual

Table of Contents

Advertisement

Network and Security Manager Administration Guide

Configuring Schedule Objects

Creating Schedule Objects

Configuring Access Profile Objects

332
A schedule object defines a time interval that a firewall rule is in effect. You use a schedule
object in your firewall rule to determine when a device enforces that rule:
Use a one-time schedule to control access to a destination for a specific time interval.
The schedule object defines a start time, end time, and date during which a rule is
enforced. Some examples:
Contractor Access Schedule (8:30 AM December 1 to 6:00 PM December 5)
Christmas Break Schedule (6:00 PM December 24 to 8:00 AM January 2)
Use a recurring schedule to control access to a destination for a repeating time interval.
The schedule object defines a start time, end time, and days during which a rule is
enforced. Some examples:
Business Hours Schedule (8:00 AM to 6:00 PM on Monday, Tuesday, Wednesday,
Thursday, Friday)
After Hours Schedule (6:01 PM to 7:59 AM on Monday, Tuesday, Wednesday,
Thursday, Friday, Saturday, Sunday)
Weekend Schedule (8:00 AM to 6:00 PM on Saturday, Sunday)
Combine a one-time and recurrent schedule to define a repeated time interval.
To add a schedule object:
In the NSM GUI navigation tree, Schedule Objects. The schedule object tree appears.
1.
In the main display area, click the Add icon.
2.
Enter a name and comment for the schedule object.
3.
Select the frequency of the schedule:
4.
To configure a one-time schedule, select Once, and enter the start date, start time,
stop date, and stop time.
To configure a recurrent schedule, select Recurrent, and click the Add icon. In the
Recurrent Schedule dialog box, select the day of the week and specify the hour
and minutes for Start 1 and Stop 1.
To specify a second recurring time interval on the same day, specify the hour and minutes
for Start 2 and Stop 2. For example, Business Hours Schedule (8:00 to 12:00 and 13:00
to 17:00 every weekday).
An access profile consists of a set of attributes that defines access to a device. You can
configure multiple profiles and multiple clients for each profile. You can use Object
Copyright © 2010, Juniper Networks, Inc.

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the NETWORK AND SECURITY MANAGER 2010.2 - ADMINISTRATION GUIDE REV1 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Network and security manager 2010.2

Table of Contents