Manual Chapter : Managing Rule Schedules

Applies To:

Show Versions Show Versions

BIG-IQ Centralized Management

  • 6.0.1
Manual Chapter

Managing Rule Schedules

About rule schedules

By default, all rules run continuously. You can apply a rule schedule to a rule to make that rule active only when scheduled.
Use the Rule Schedules screen to view the defined rule schedules. Rule schedules are
continuously active
if created without any scheduling specifics (such as the hour that the rule schedule starts).

Create rule schedules

You create rule schedules so that you can control when firewall rules are active.
  1. Click
    Configuration
    SECURITY
    Network Security
    Rule Schedules
    .
  2. Click
    Create
    .
    The New Rule Schedule screen opens.
  3. In the
    Name
    setting, type a unique name for the rule schedule.
  4. In the
    Description
    setting, type an optional description for the rule schedule.
  5. In the
    Partition
    setting, type a partition if needed. The
    Common
    partition is the default.
  6. In the
    Date Range
    setting, specify the date and time when the rule can be active.
    • Indefinite
      specifies that the rule schedule start immediately and run indefinitely. The rule schedule remains active until you change the date range or delete the rule schedule. This is the default.
    • Until
      specifies that the rule schedule start immediately and run until a specified end date. The rule schedule is immediately activated and not disabled until the end date and time is reached. Click in the field to choose an end date from a popup calendar. You can specify an end time in the same popup screen.
    • After
      specifies that the rule schedule start after the specified date and run indefinitely. The rule schedule is activated starting on the selected date and runs until you change the start date or delete the rule schedule. Click in the field to choose a start date from a popup calendar. You can specify a start time in the same popup window.
    • Between
      specifies that the rule schedule start on the specified date and run until the specified end date. Click in the fields to choose the start and end dates from a popup calendar. You can specify start and end times in the same popup window.
    Using the calendar settings to specify the start and end dates and times is the preferred method. However, if you do specify dates by typing, use the format: MMM DD, YYYY for the date.
  7. In the
    Time Range
    setting, specify the time, within the time defined by the
    Date Range
    , that the rule schedule can be active.
    • All Day
      specifies that the rule schedule runs all day. This is the default.
    • Between
      specifies that the rule schedule starts at the specified time and runs until the specified end time. Click in the fields to choose the start and end times.
  8. In the
    Day
    setting, specify the days the rule schedule is active. Select the check boxes for all days that apply.
    You must select at least one day per week.
  9. Save your work.
The rule schedule is defined and you can assign it to a rule in a management IP firewall context, firewall policy, or rule list.

Clone rule schedules

You can clone a rule schedule to create a copy of it, which you can then edit to address any special considerations.
  1. Click
    Configuration
    SECURITY
    Network Security
    Rule Schedules
    .
    The Rule Schedules screen opens.
  2. Click the check box next to the rule schedule to clone and click
    Clone
    .
    The system makes a copy of that rule schedule with the same name, but with
    -CLONE
    appended to the name, and a blank
    Description
    field.
  3. Change the rule schedule as needed.
  4. Save your work.
The new rule schedule is now defined.

Rename rule schedules

You rename a rule schedule when you want to make that name more accurate or distinct. Renaming a rule schedule causes a new rule schedule to be created and the old rule schedule to be deleted in a single transaction. All references to the old rule schedule are updated to refer to the renamed rule schedule.
  1. Click
    Configuration
    SECURITY
    Network Security
    Rule Schedules
    .
  2. Select the check box next to the rule schedule to rename.
  3. Click
    Rename
    .
    A dialog box displays.
  4. Enter the new name in the dialog box and click
    Save
    .
    The BIG-IQ system shows the status of the renaming operation in the dialog box.
  5. Click
    Close
    to exit the dialog box.
The rule schedule has been renamed.

Delete rule schedules

You delete rule schedules that you no longer use to avoid confusion in the user interface.
  1. Click
    Configuration
    SECURITY
    Network Security
    Rule Schedules
    .
    The Rule Schedules screen opens.
  2. Click the check box next to the rule schedule that you want to delete.
  3. Click
    Delete
    .
  4. In the confirmation dialog box that opens, click
    Delete
    to confirm the removal.
The rule schedule is removed from the list.