Follow

How to Bypass Traffic from Filtering

Bypass rules have three great functions:

  1. Prevent traffic from being scanned by the Application Layer-7 filtering provided by modules such as Web Filter, SSL Inspector, Application Control...etc.
  2. Excluding devices from using a license/seat; managing what devices are being filtered/license entitled
  3. Troubleshooting

Bypass rules are located in Config > Network > Bypass Rules tab. By default there are some example rules already created. We always recommend that the rule for port 53 DNS traffic is enabled. It is also highly recommended to created custom rules for any VoIP ports in addition to the template rules for ports 5060 and 4569.

config_network_bypassrulestab.png

To bypass one host completely from all filtering, two rules are required; one for traffic sourced from that host and another for the traffic destined to that host.

Bypass traffic sourced from 10.15.0.10:

src_bypass.png

Bypass traffic destined to 10.15.0.10 

dst_bypass.png

Additional documentation:

Bypass Rules Wiki - https://wiki.untangle.com/index.php/Bypass_Rules

Untangle Rule Creation - https://wiki.untangle.com/index.php/Rules

Untangle Rule Syntax - https://wiki.untangle.com/index.php/Untangle_Rule_Syntax

 

 

 

 

 

Was this article helpful?
1 out of 1 found this helpful
Have more questions? Submit a request

Comments

Powered by Zendesk