The choice decision to add incorporate a bypass code to into your security policy is optional. When you choose to add included, a bypass code in conjunction with a security policy, the bypass code does not directly affect has no direct effect on networks, DNS forwarding proxies, or Endpoints. What the bypass code controls is dependent on how the bypass code endpoints. Its behavior depends on how it is configured. Bypass Bypass codes are effective only work when used with the Block-Redirect action. This , which is the only means sole method of interacting with the DNS response. For more information, see refer to Using Bypass Codes.
To
...
Configure Bypass Codes for a Security Policy:
On the Bypass Codes page of
...
the Create New Security Policy
...
wizard, complete the following steps:
...
Select the
...
desired bypass codes from the AVAILABLE
...
table and move them to the SELECTED
...
table using the
...
right-arrow icon.
...
To select all
...
bypass codes
...
, click the double right-arrow icon.
Use the Search function to locate a specific bypass code
...
, if necessary.
To remove
...
a bypass code from the SELECTED table, click the
...
close icon or the trashcan icon.
After
...
selecting the bypass codes,
...
proceed to the Summary page to review
...
the configuration.
Click Next
...
to continue.
For information about other tasks in additional tasks related to creating a new security policy, see refer to the following topics: