Skip to main content
Version: 7.2.10

Auto Disable a temp-use policy

BLUF:
Sometimes we need to allow access to some servers during a maintenance window.
Creating a schedule for such policies is a great idea, but sometimes you need a patch
thats out of schedule. I use this automation stitch to automatically disable outbound access
upon admin logout. If you're admin timeout short you might run into problems.

Auto-disable a policy upon logout

Servers in the DANGER network are not allowed access to the internet. Occaisionally, the servers in this segment require updates. This automation stitch serves to disable the outbound policy for this segment 5 minutes after the admin logs out.

Admittedly, this howto is light on explanation. As time allows, I'll update it. But you should have no problem implementing this Automation stitch.

💡 This is a convenience feature for environments where strict maintenance windows are not used. This is not a replacement for proper policy. Its simply a way to avoid leaving the barnyard gate open.

Create an outbound policy

Policy

Create a Trigger

Trigger

Create an Action

Action

Assemble the automation stitch

Stitch

Usage

Upon login of the firewall, simply enable the policy that allows outbound internet connectivity. Then, go about the process of performing upgrades.

💡 Don't forget: Your admin session will time-out due to inactivity. If your timeout is set to 5 minutes, and you've added a 5 minute delay to the automation stitch, you'll have 10 minutes to perform your work. You can always extend the first five minutes by navitating to a new page in the fortigate.