From the course: Juniper Security Policies Fundamentals

Unlock the full course today

Join today to access over 22,700 courses taught by industry experts or purchase this course individually.

Using a policy scheduler

Using a policy scheduler

From the course: Juniper Security Policies Fundamentals

Start my 1-month free trial

Using a policy scheduler

- [Instructor] A scheduler by itself is of no use unless it is configured to be used within a policy. In an earlier movie, we saw how to configure a scheduler. We configured a scheduler that's active during office hours. Before using the scheduler in a policy, let's verify the state of the scheduler. I'm going to go to the operation mode and issue the command show schedulers, and here, we can see the scheduler that we configured earlier called OFFICE-HOURS, and the state is unused. And that's because the scheduler is not configured within a policy. To configure this, I'm going to enter the configuration mode. And let's start with show security policies from-zone trust to-zone untrust. So here we have a policy called ALLOW-WEB-TUST-UNTRUST, which matches any source address, any destination address, HTTP and HTTPS traffic, and the action is set to permit. We are configuring the scheduler to block browsing traffic during office hours. But before we do that, let's verify if browsing…

Contents