Due to additional security measures, we have implemented Multi-Factor Authentication (MFA) on this Support Portal. Please log in using your registered email ID or phone number. In case of any difficulty, kindly reach out to Seqrite Support by emailing us at "support@seqrite.com".

How-To Articles

How to Bypass UTM Security policy from custom rule

04-03-2020 15:58:43

Overview

This article shows how you can bypass security scanning traffic using a custom rule.It provides flexibility to admin to bypass applied security policies for a certain set of Users, IPs

Admin can bypass Web/mail policies, IPS/IDS using this rule.

Note: Policies except Internet Quota and Traffics Shaping will not be applicable to this traffic.

Applicable Version: 2.4 and Above

Configuration:

Please follow below steps for configuring custom rule:

Navigate to Firewall > Custom Rules.

Select + Add Firewall Rule.

Select the Source Zone to LAN.

Definition Type: Network Definition

ADD IP or Network into Source which you want to bypass from security polices.

ADD Services as ANY

Select the Source Zone to WAN

Definition Type: Network Definition

ADD Destination Zone: ANY

Apply NAT:

Select types: Masquerade

Select Bypass security policy options:

Bypass UTM policies option :Select this option if you want to bypass UTM web & mail proxy traffic

Bypass IPS/IDS/ACC option : The traffic sent from mentioned host will not be scanned by IPS/ACC if enabled.

Bypass IPS/IDS/ACC option : The traffic sent from mentioned host will not be scanned by IPS/ACC if enabled.

Please contact Seqrite Technical Support for more assistance