Configuring intelligent application bypass
Not all deployments require IAB, and those that do might use it in a limited fashion. Do not enable IAB unless you have expert knowledge of your network traffic, especially application traffic, and system performance, including the causes of predictable performance issues. Before you run IAB in bypass mode, make sure that trusting the specified traffic does not expose you to risk.
Before you begin
IAB settings are applicable for Snort2 devices or pre 7.2.0 Snort3 devices. For Snort 3 devices, use elephant flow detection instead.
Procedure
Step 1 | In the access control policy editor, click Advanced Settings from the More drop-down arrow at the end of the packet flow line. Then, click Edit ( |
Step 2 | Set the enabled State for IAB. Turn IAB Off or On, or enable IAB in Test mode. In test mode, connection events and dashboards tell you what the system would have done if IAB had been on, but traffic is not impacted. Use test mode to check your configuration. |
Step 3 | Set the Performance Sample Interval. The Performance Sample Interval specifies the time in seconds between IAB performance sampling scans, during which the system collects system performance metrics for comparison to IAB performance thresholds. The default is 5 seconds. The range is 1 to 1000 seconds. |
Step 4 | Select the Bypassable Applications and Filters. Choose from:
|
Step 5 | Configure the performance and flow thresholds. You must configure at least one Inspection Performance Thresholds and one Flow Bypass Thresholds. However, all have defaults and you do not need to change the settings if the defaults are appropriate for your network. When a performance threshold is exceeded, the system examines flow thresholds and, if one threshold is exceeded, trusts the specified traffic. If you enable more than one of either, only one of each must be exceeded. |
Step 6 | Click OK to save IAB settings. |
Step 7 | Click Save to save the policy. |
What to do next
-
Deploy configuration changes.