Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The choice decision to add incorporate a bypass code to into your security policy is optional. When you choose to add a bypass code in conjunction with a security policy, the bypass code does not directly affect have a direct impact on networks, DNS forwarding proxies, or Endpoints. What the bypass code controls endpoints. Its influence is dependent on how the bypass code is configured.  Bypass codes only work Bypass codes are effective solely when used in conjunction with the Block-Redirect action. This is the only means of , which represents the exclusive method for interacting with the DNS response. For more information, see additional details, refer to Using Bypass Codes.

To set configure your bypass codes for the security policy, complete the following:

  1. On the Bypass Codes page of the Create New Security Policy wizard, complete the following:

    • Choose the applicable bypass codes from the AVAILABLE table and move them to the SELECTED table using the right-pointing arrow icon.

    • You can click the double, right-pointing arrows icon to select all the bypass codes.

    • You can also search for a specific bypass code using the Search function.

    • To remove an object from the SELECTED table, click the close icon or the the trashcan icon.

  2. After you choose the bypass codes, you can proceed to the Summary page to review your configuration.

  3. Click Next in the wizard to view the summary.

For information about other tasks in creating a new security policy, see the following: