Dear Valued Customer, We are upgrading our customer portal to enhance your experience. For Support, please send mail on support@seqrite.com Thank you for your patience and understanding. Best regards, Seqrite

How-To Articles

How to Bypass UTM Security policy from custom rule

03-03-2020 22:28:43

Overview

This article shows how you can bypass security scanning traffic using a custom rule.It provides flexibility to admin to bypass applied security policies for a certain set of Users, IPs

Admin can bypass Web/mail policies, IPS/IDS using this rule.

Note: Policies except Internet Quota and Traffics Shaping will not be applicable to this traffic.

Applicable Version: 2.4 and Above

Configuration:

Please follow below steps for configuring custom rule:

Navigate to Firewall > Custom Rules.

Select + Add Firewall Rule.

Select the Source Zone to LAN.

Definition Type: Network Definition

ADD IP or Network into Source which you want to bypass from security polices.

ADD Services as ANY

Select the Source Zone to WAN

Definition Type: Network Definition

ADD Destination Zone: ANY

Apply NAT:

Select types: Masquerade

Select Bypass security policy options:

Bypass UTM policies option :Select this option if you want to bypass UTM web & mail proxy traffic

Bypass IPS/IDS/ACC option : The traffic sent from mentioned host will not be scanned by IPS/ACC if enabled.

Bypass IPS/IDS/ACC option : The traffic sent from mentioned host will not be scanned by IPS/ACC if enabled.

Please contact Seqrite Technical Support for more assistance