Bypass Categories

Updated 3 months ago by admin

Bypass Categories are similar to Custom URLs, except that they're used by agents to ignore something; for example, a domain, an IP range, a system process or SSL Interception. Bypasses are a powerful way to mitigate against applications that do not support proxying and to relax filtering where appropriate. The Web Security product supports a large number of Bypass types, but there are variations between desktop agents and gateway agent support, which are described in this section.

Bypass Type

Behaviour

Agent support

Example

Bypass destination domain completely

Do not intercept HTTP or HTTPS traffic destined for the given domain

Windows, Mac, Gateway

domain.com

Bypass destination IP/CIDR completely

Do not intercept HTTP or HTTPS traffic destined for the given IP or CIDR

Windows, Mac, Gateway

10.0.0.5, 192.168.1.1/24

Bypass File Extension

Do not intercept HTTP or HTTPS traffic that has the specified file extension

Windows, Mac

.css, .js, .png

Bypass Executable/Process Name

Do not intercept HTTP or HTTPS traffic that is generated by the given executable or process

Windows, Mac

DropBox.exe, itunes

Bypass destination domain for SSL Interception

Do not intercept HTTPS traffic destined for the given domain

Windows, Mac, Gateway

secureserver.com

Bypass destination IP/CIDR for SSL Interception

Do not intercept HTTPS traffic destined for the given IP or CIDR

Gateway

10.0.0.5, 192.168.1.1/24

Bypass source IP/CIDR completely

Do not intercept HTTP or HTTPS traffic originating from the given IP or CIDR

Gateway

10.0.0.5, 192.168.1.1/24

Bypass source IP/CIDR for SSL Interception

Do not intercept HTTPS traffic originating from the given IP or CIDR

Gateway

10.0.0.5, 192.168.1.1/24

Bypass source IP/CIDR for user authentication

Do not authenticate HTTP or HTTPS traffic originating from the given IP or CIDR

Gateway

10.0.0.5, 192.168.1.1/24

Bypass user authentication for destination domain

Do not authenticate HTTP or HTTPS requests destined for a particular domain

Gateway - explicit proxy

java.com

Bypass source MAC address for user authentication

Do not authenticate HTTP or HTTPS traffic originating from the given MAC address

Gateway (16.04 version only)

70:85:C2:0E:E9:4E

Bypass Types and behaviour

Managing Bypass Categories

To access the Bypass section, visit your USS Dashboard, and then click ProductsWeb SecurityBypass.

The list of current Bypass Categories is shown on the left. Click a Category to see the Bypass Patterns contained in the Category.

Searching Bypass Patterns

You can locate a specific Bypass pattern using the Search bar.

Enter your search query and click (or just hit `Enter`). The Bypass list will now only show Bypasses containing a keyword pattern that matches your search query.

To return to the full list of Bypasses, just click the button.

Adding a new Bypass Category

To add a new Bypass Category, click the button, and enter details for the new Bypass in the form that's displayed.

Name

Choose a name for the new Bypass.

Gateway Mode

The Gateway Mode dictates how and when the Bypass will function.

  • Choose Direct Proxy to force SSL decryption and filtering on direct connections to the proxy on port 8080 (for example, via a browser configuration or WPAD).
  • Choose Captive Portal to force SSL decryption and filtering on transparently-provided proxied connections (for example, Captive/Guest portal, WCCP, gateway mode).
  • If you need the Direct Proxy and Captive Portal coverage, choose Any.

Click the button to create the new Bypass Category.

Editing Bypass Categories

To update a Bypass Category, simply double-click it. Once you've made any required changes, click to save your changes.

Deleting Bypass Categories

Removing a Bypass will remove it from any Agent Configuration Profiles that reference the Bypass, and will also remove all the keyword Patterns that belong to this Bypass Category.

To delete a Bypass Category, just select it and click the button.

Managing Patterns

In the context of Bypass Categories, Patterns represent different domains, IP addresses, or ranges and processes as described in the Bypass Types table above.

Adding Bypass Patterns

To add a new Pattern, first select the Bypass Category to which the new Pattern should belong. Then, click the button and enter the details in the form that's displayed.

Bypass Type

The Bypass Type to use, as described in the Bypass Types table, above.

Pattern

The pattern against which to match. The pattern format will depend on the Type selected - see the Bypass Types table, above.

Comment

An optional comment or description about this Bypass pattern.

Click to create the new Custom URL Pattern.

Updating Patterns

To edit a Pattern, double-click it. Make the changes you require, and then click .

Deleting Patterns

To delete a Pattern, select it and click the button.

Using Bypasses in Agent Profiles

Custom URLs can be used within Agent Configuration Profiles in order to bypass filtering for particular domains, IP ranges or processes. For example, you may want to add your company Intranet to a Bypass so that it is never filtered.


How did we do?