Table of contents

Allow trusted traffic to bypass the firewall

You can configure Workload Security to allow trusted traffic to bypass the firewall using the following steps:

  1. Create a new IP list of trusted traffic sources
  2. Create incoming and outbound firewall rules for trusted traffic using the IP list
  3. Assign the firewall rules to a policy used by computers that trusted traffic flows through

After the firewall rules have been assigned to a policy, Workload Security allows traffic from trusted sources in the IP list and does not scan the traffic for stateful issues or vulnerabilities.

Create a new IP list of trusted traffic sources

  1. Click Policies.
  2. In the left pane, click Lists > IP Lists.
  3. Click New > New IP List.
  4. Enter a name for the IP list.
  5. Paste the IP addresses for your trusted sources into the IP(s) box, one per line.
  6. Click OK.

Create incoming and outgoing firewall rules for trusted traffic using the IP list

  1. Click Policies.
  2. In the left pane, click Rules.
  3. Click Firewall Rules > New > New Firewall Rule.
  4. Create a firewall rule for incoming trusted traffic using the following values:
    Name:source name Traffic - Incoming
    Action:Bypass
    Protocol:Any
    Packet Source:IP List (select the IP list created above)
  5. Create a firewall rule for outgoing trusted traffic using the following values:
    Name:source name Traffic - Outgoing
    Action:Bypass
    Protocol:Any
    Packet Destination:IP List (select the IP list created above)

Assign the firewall rules to a policy used by computers through which trusted traffic flows

  1. Click Policies.
  2. In the left pane, click Policies.
  3. Double-click a policy to open its properties window.
  4. In the left pane of the policy's Properties window, click Firewall.
  5. Click Assign/Unassign.
  6. Ensure your view at the top left shows All firewall rules.
  7. Use the search window to find the rules you created and select them.
  8. Click OK.
  9. Repeat the preceding steps for each computer through which trusted traffic flows.