Overview
This article shows how you can bypass security scanning traffic using a custom rule.It provides flexibility to admin to bypass applied security policies for a certain set of Users, IPs
Admin can bypass Web/mail policies, IPS/IDS using this rule.
Note: Policies except Internet Quota and Traffics Shaping will not be applicable to this traffic.
Applicable Version: 2.4 and Above
Configuration:
Please follow below steps for configuring custom rule:
Navigate to Firewall > Custom Rules.
Select + Add Firewall Rule.
Select the Source Zone to LAN.
Definition Type: Network Definition
ADD IP or Network into Source which you want to bypass from security polices.
ADD Services as ANY
Select the Source Zone to WAN
Definition Type: Network Definition
ADD Destination Zone: ANY
Apply NAT:
Select types: Masquerade
Select Bypass security policy options:
Bypass UTM policies option :Select this option if you want to bypass UTM web & mail proxy traffic
Bypass IPS/IDS/ACC option : The traffic sent from mentioned host will not be scanned by IPS/ACC if enabled.
Bypass IPS/IDS/ACC option : The traffic sent from mentioned host will not be scanned by IPS/ACC if enabled.
Please contact Seqrite Technical Support for more assistance