Add bypass sources and destinations

The following task discusses how to optionally bypass outbound traffic originating from source networks or going to destination networks. You should generally do this only if you trust the traffic from these networks.

Before you begin

Complete the tasks discussed in Create a standard decryption policy with outbound protection.

Procedure


Step 1

Click Add new under Bypass sources and destinations for either source network objects or destination network objects.

Step 2

In the dialog box that is displayed, do any of the following:

  • Search for a network object by entering text in the search field and pressing Enter.

  • From the Source network object or Destination network object list, choose an existing network object or click Add New to create a new one.

Note

Click Help (help icon) on any dialog box for more information.

The following figure shows an example.

This sample outbound decryption policy bypasses traffic from an internal network.

Step 3

Click Save.

Step 4

If you're finished configuring your policy, see Decryption policy actions.