Adding Bypass Codes to a Security Policy
The decision to incorporate a bypass code into your security policy is optional. When included, a bypass code has no direct effect on networks, DNS forwarding proxies, or endpoints. Its behavior depends on how it is configured. Bypass codes are effective only when used with the Block-Redirect action, which is the sole method of interacting with the DNS response. For more information, refer to Using Bypass Codes.
To Configure Bypass Codes for a Security Policy:
On the Bypass Codes page of the Create New Security Policy wizard, complete the following steps:
Select the desired bypass codes from the AVAILABLE table and move them to the SELECTED table using the right-arrow icon.
To select all bypass codes, click the double right-arrow icon.
Use the Search function to locate a specific bypass code, if necessary.
To remove a bypass code from the SELECTED table, click the close icon or the trashcan icon.
After selecting the bypass codes, proceed to the Summary page to review the configuration.
Click Next to continue.
For additional tasks related to creating a new security policy, refer to the following topics: