Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
      All Products A–Z
      Free Trials
    • Network Security
      • Next-Generation Firewall (NGFW)
      • Network Security Services
      • Network Security Management
      • Secure SD-WAN
    • Threat Protection
      • Advanced Threat Protection Cloud
      • Advanced Threat Protection Appliance
      • Capture Labs
    • Secure Access Service Edge (SASE)
      • Zero-Trust Network Access (ZTNA)
    • Cloud Security
      • Cloud Firewall
      • Cloud App Security
    • Endpoint Security
      • Endpoint Detection & Response (EDR)
    • Email Security
      • Cloud Email Security
      • Hosted Email Security
      • On-Prem Email Security
    • Secure Access
      • Wireless Access Points
      • Network Switch
      • Virtual Private Network (VPN)
    • Wi-Fi 6 Access Points

      SonicWall SonicWave 600 series access points provide always-on, always-secure connectivity for complex, multi-device environments.

      Read More
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Network Segmentation
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure Wi-Fi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Events
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Events
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • SonicWall Promotions
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How do I exclude traffic from firewall security services?

10/14/2021 158 People found this article helpful 202,458 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    At times it's necessary to exclude traffic from security services. This can be necessary when certain applications don't interact well with threat scans, additional throughput is required, or traffic is simply going from trusted device to trusted device. This article will detail how to exclude traffic using a variety of methods, such as IP Address, Port, Signature, etc., from the various SonicWall Threat Engines.

    Furthermore this article will describe the different methods of excluding traffic, both by the security services themselves as well as via App Rules.

    For the purpose of this article security services will be Gateway Anti-Virus (GAV), Intrusion Prevention (IPS), Anti-Spyware (AS), and App Control. Similar setups will also work for the Botnet Filter and Geo-IP Filter features, although those will not be explicitly touched on.

    Resolution

    Resolution for SonicOS 7.X

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.






    Excluding Traffic via security service Features

    TIP: Using the security service feature itself to exclude traffic is the simpler, although less granular, method that we will begin with. If you'd like more granular control over the type of traffic excluded from security services please use the App Rules method detailed below.

    1. Login to the SonicWall management GUI and navigate to the Feature you'd like to exclude traffic for. Navigate to POLICY | Security Services  and select the feature where you want to apply the exclusion.

    2. Each feature will have a Configure option, select that and a pop-up window will appear. From this menu you may select a single Address Object or Address Group to Exclude from the Security Feature. Once you've made your selections, click OK. 

      TIP: If you have multiple IP Address to Exclude, add them to an Address Group. 
       NOTE: App Control can inherit Exclusions from IPS by using the Use IPS Exclusion List option.
      Image

      Image


    Excluding Traffic via App Rules

     TIP: Excluding Traffic via App Rules allows for more granular control over exemptions but also requires more configuration. If you'd like a quicker, less granular method please use the steps listed above.

    1. Login to the SonicWall Management GUI and navigate to OBJECT | Match Objects | Match Objects.
       NOTE: If you want to Exclude Traffic by IP Address or Port, skip to Step 5.

    2. Click Add and a pop-up Match Object Settings window will appear.
    3. Change the Match Object Type field to whatever you wish to use. Typically this will be Application Signature List but any of the available options are valid.
    4. Select any sub-categories, if necessary, and input any needed values. Click Save.
       EXAMPLE: I'd like to Exclude Windows Updates from being subjected to security services. For my Match Object I select the following:
      1. Match Object Type Application Signature List
      2. Application Category: APP-UPDATE
      3. Application: APP-UPDATE Microsoft Windows Updates
      4. Application Signature: Select each entry, select Add, and repeat until all Signatures are included in the List field.

        Image

    5. Nnavigate to POLICY | Rules and Policies | App Rules and click Add Rule. A pop-up window will appear.
    6. Set the following information for the App Rule Policy:
      1. Name - This will be a Friendly Name.
      2. Policy Type - Set to Custom Policy if you created a Match Object, otherwise set to App Control Content.
      3. Address | Service | Exclusion Address - Set these as needed. Service is required when going by Ports, Address when going by IP Address.
      4. Match Object - If you created a Match Object in the earlier steps, select it now. Otherwise leave this blank.
      5. Action Object - Select the security service you'd like to Bypass, such as IPS.
      6. Users/Group - Which Users and/or Groups will be included or excluded from this Policy.
      7. Schedule - You may optionally set a time during which this Policy is in effect.
         CAUTION: Remember that if you're creating a Policy which Excludes Traffic from a security service Engine, Excluding an IP Address, User, or Port will effectively exclude them from the exclusion.

    7. Click OK. You should now see your new Policy in the App Rules Table.
       EXAMPLE: In the image below you can see a sample App Rule which exempts all SIP Traffic from the IPS Engine.

      Image







    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.












    Excluding Traffic via security service Features

    TIP: Using the security service feature itself to exclude traffic is the simpler, although less granular, method that we will begin with. If you'd like more granular control over the type of traffic excluded from security services please use the App Rules method detailed below.

    1. Login to the SonicWall Management GUI and navigate to the Feature you'd like to exclude traffic for. For App Control navigate to Manage| Policies| Rules| App Control, for all other Features navigate to Security Configuration| Security Services and select the appropriate option.

    2. Each feature will have an option for Configure ______ Settings, select that and a pop-up window will appear. From this menu you may select a single Address Object or Address Group to Exclude from the Security Feature. Once you've made your selections, click OK. 
      TIP: If you have multiple IP Address to Exclude, add them to an Address Group.
      NOTE: App Control can inherit Exclusions from IPS by using the Use IPS Exclusion List option.

      Image


    Excluding Traffic via App Rules

    TIP: Excluding Traffic via App Rules allows for more granular control over exemptions but also requires more configuration. If you'd like a quicker, less granular method please use the steps listed above.

    1. Login to the SonicWall Management GUI and navigate to Manage | Policies| Objects | Match Objects.
      NOTE: If you want to Exclude Traffic by IP Address or Port, skip to Step 5.

    2. Select Add New Match Object and a pop-up window will appear.
    3. Change the Match Object Type field to whatever you wish to use. Typically this will be Application Signature List but any of the available options are valid.
    4. Select any sub-categories, if necessary, and input any needed values. Click OK.
      EXAMPLE: I'd like to Exclude Windows Updates from being subjected to security services. For my Match Object I select the following:
      1. Match Object Type Application Signature List
      2. Application Category: APP-UPDATE
      3. Application: APP-UPDATE Microsoft Windows Updates
      4. Application Signature: Select each entry, select Add, and repeat until all Signatures are included in the List field.
        Image

    5. Navigate to Manage | Policies| Rules| App Rules and select Add New Policy. A pop-up window will appear.
    6. Set the following information for the App Rule Policy:
      1. Name - This will be a Friendly Name.
      2. Policy Type - Set to Custom Policy if you created a Match Object, otherwise set to App Control Content.
      3. Address | Service | Exclusion Address - Set these as needed. Service is required when going by Ports, Address when going by IP Address.
      4. Match Object - If you created a Match Object in the earlier steps, select it now. Otherwise leave this blank.
      5. Action Object - Select the security service you'd like to Bypass, such as IPS.
      6. Users/Group - Which Users and/or Groups will be included or excluded from this Policy.
      7. Schedule - You may optionally set a time during which this Policy is in effect.
        CAUTION: Remember that if you're creating a Policy which Excludes Traffic from a security service Engine, Excluding an IP Address, User, or Port will effectively exclude them from the exclusion.
    7. Click OK. You should now see your new Policy in the App Rules Table.
      EXAMPLE: In the image below you can see a sample App Rule which exempts all SIP Traffic from the IPS Engine.
      Image

    Related Articles

    • Bandwidth usage and tracking in SonicWall
    • How to force an update of the Security Services Signatures from the Firewall GUI
    • Configure Guest VLAN in the TZ firewall, for guest users to access Internet only.

    Categories

    • Firewalls > TZ Series > IPS/GAV/Spyware
    • Firewalls > SonicWall SuperMassive 9000 Series > IPS/GAV/Spyware
    • Firewalls > SonicWall NSA Series > IPS/GAV/Spyware

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2023 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top