You can configure Workload Security to allow trusted traffic to bypass the firewall
using the following steps:
- Create a new IP list of trusted traffic sources
- Create incoming and outbound firewall rules for trusted traffic using the IP list
- Assign the firewall rules to a policy used by computers that trusted traffic flows through
After the firewall rules have been assigned to a policy, Workload Security allows
traffic from trusted sources in the IP list and does not scan the traffic for stateful
issues or vulnerabilities.
Create a new IP list of trusted traffic sources
- Click Policies.
- In the left pane, click .
- Click .
- Enter a name for the IP list.
- Paste the IP addresses for your trusted sources into the IP(s) box, one per line.
- Click OK.
Create incoming and outgoing firewall rules for trusted traffic using the IP list
- Click Policies.
- In the left pane, click Rules.
- Click .
- Create a firewall rule for incoming trusted traffic using the following values:
Name:source name Traffic - IncomingAction:BypassProtocol:AnyPacket Source:IP List (select the IP list created above)
- Create a firewall rule for outgoing trusted traffic using the following values:
Name:source name Traffic - OutgoingAction:BypassProtocol:AnyPacket Destination:IP List (select the IP list created above)
Assign the firewall rules to a policy used by computers through which trusted traffic flows
- Click Policies.
- In the left pane, click Policies.
- Double-click a policy to open its properties window.
- In the left pane of the policy's Properties window, click Firewall.
- Click Assign/Unassign.
- Ensure your view at the top left shows All firewall rules.
- Use the search window to find the rules you created and select them.
- Click OK.
- Repeat the preceding steps for each computer through which trusted traffic flows.