Document toolboxDocument toolbox

Adding Bypass Codes to a Security Policy

The decision to incorporate a bypass code into your security policy is optional. When you choose to add a bypass code in conjunction with a security policy, the bypass code does not have a direct impact on networks, DNS forwarding proxies, or endpoints. Its influence is dependent on how the bypass code is configured. Bypass codes are effective solely when used in conjunction with the Block-Redirect action, which represents the exclusive method for interacting with the DNS response. For additional details, refer to Using Bypass Codes.

To configure your bypass codes for the security policy, complete the following:

  1. On the Bypass Codes page of the Create New Security Policy wizard, complete the following:

    • Choose the applicable bypass codes from the AVAILABLE table and move them to the SELECTED table using the right-pointing arrow icon.

    • You can click the double, right-pointing arrows icon to select all the bypass codes.

    • You can also search for a specific bypass code using the Search function.

    • To remove an object from the SELECTED table, click the close icon or the the trashcan icon.

  2. After you choose the bypass codes, you can proceed to the Summary page to review your configuration.

  3. Click Next in the wizard to view the summary.

For information about other tasks in creating a new security policy, see the following: