A Remove or Decommission Access Request removes network access. For example, you may need to remove network access that is no longer required, or for an access request ticket that has reached its expiration date and its network access should be removed from the system.
Designer determines whether removing access requires rules to be removed or modified, or network groups need to be modified for each Access Request in a ticket. If a ticket includes multiple Access Requests, each Access Request is listed separately in Designer. A single ticket can include requests to add access, as well as requests to remove access.
If the Access Decommission contains user identities or application identities in the access request, Designer will only provide suggestions to remove access on the following supported devices:
In the Designer Recommendations screen, Access Requests to add access are colored green, Requests to remove access are colored orange.
To view the rules which will be affected by Designer's suggestions, see View Access Request and Related Rules.
You can use the Designer Debug tool to help the Tufin development team debug and fix escalations relevant to Designer and Verifier in access requests.
The following cases are set to Ignore by default:
For Designer to include these rules in its suggestions, in the Related Rules window, clear the Ignore checkbox next to these rules, click OK, and then Redesign.
Open or create an Access Request and click Designer.
If there is no Designer button, check if Designer was enabled in this step of the workflow configuration.
If your access request contains an AWS instance, you must Select Security Groups for the VPC.
Look through the Designer recommendations, organized by vendor > device > policy > access request.
If a later access request requires changes that are also required in an earlier access request, Designer notes that no changes will be implemented for the later access request.
In the recommendations, the Designer assigns names to the new servers/services/rule names using these guidelines:
Creates a name using the format:
host_<ip> / subnet_<ip>
If the request came from SecureApp, then it uses the name given in SecureApp
If an "i" icon appears next to the recommendation, then Designer has modified the name assigned in SecureApp to meet the vendor's requirements. For example if you created a new connection with the name “Connection 1” the Designer changes it to “Connection1” if spaces are not allowed.
Click to view the original name.
In the recommendations, you can click the following fields to change the values given by the Designer:
Object names
Rule names
Rule location (before or after specific rule number, or as last rule)
Logging levels
For new or existing rules, you can add or edit comments on the following devices:
Check Point R80 and above (Can also edit comments of existing rules)
Juniper SRX (Can also edit comments of existing rules; Rule IDs are not sequential)
Fortimanager (Can add rule name)
Cisco (Cannot change the name of a new rule)
ASA
NSX
Panorama
For NSX devices, when adding new rules, if the Access Requests has a Security Group as a Source or Destination, Designer can provide more specific suggestions based on the relevant security groups, instead of using DFW. Click the Applied to field to select the relevant security groups.
For Decommission Access Requests, if there are related rules, click Manage Related Rules, to review a list of related rules, and if required, select Ignore next to rules that should not receive suggestions by Designer, and click Redesign.
Click View rule to see the results as a firewall rule for the specified vendor.
Click Customize rule to see the objects that have alternative objects that match the access request. For example, when the access request specifies IP address 1.1.1.1 and the device has more than one object with that IP address, you can change the object that is used in the Designer results:
Click to save the change or
to cancel the change that you entered.
If you have permissions, to implement the changes:
Check Point:
Click Update Policy or to update all policies at one time click Update All Policies. The updated policies are saved in CMA/SmartCenter.
To have the Update Policy option, enabling the Designer to apply changes directly to Check Point policies, you need to configure SecureTrack to use an OPSEC object that has Read/Write permissions.
Use Check Point SmartDashboard to install the policies.
Cisco ASA, Cisco IOS, and Juniper SRX:
Juniper NetScreen:
Click Commands > Copy Commands.
Paste the commands on to the device's CLI.
Palo Alto/Panorama:
Click Close to return to the ticket.
If you click Close and save the progress on the task, the designer results are saved.
You can click next to the access request to see the results, and other handlers can click
in this step to see the results.
Once you have implemented the changes recommended by Designer, you can run Verifier to confirm that the changes were implemented, see Verifying Access Requests.
SecureChange > Requests > Open or create Request > Designer