At times it's necessary to exclude traffic from security services. This can be necessary when certain applications don't interact well with threat scans, additional throughput is required, or traffic is simply going from trusted device to trusted device. This article will detail how to exclude traffic using a variety of methods, such as IP Address, Port, Signature, etc., from the various SonicWall Threat Engines.
Furthermore this article will describe the different methods of excluding traffic, both by the security services themselves as well as via App Rules.
For the purpose of this article security services will be Gateway Anti-Virus (GAV), Intrusion Prevention (IPS), Anti-Spyware (AS), and App Control. Similar setups will also work for the Botnet Filter and Geo-IP Filter features, although those will not be explicitly touched on.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Excluding Traffic via security service Features
TIP: Using the security service feature itself to exclude traffic is the simpler, although less granular, method that we will begin with. If you'd like more granular control over the type of traffic excluded from security services please use the App Rules method detailed below.
TIP: If you have multiple IP Address to Exclude, add them to an Address Group.
NOTE: App Control can inherit Exclusions from IPS by using the Use IPS Exclusion List option.

Excluding Traffic via App Rules
TIP: Excluding Traffic via App Rules allows for more granular control over exemptions but also requires more configuration. If you'd like a quicker, less granular method please use the steps listed above.
EXAMPLE: I'd like to Exclude Windows Updates from being subjected to security services. For my Match Object I select the following:

EXAMPLE: In the image below you can see a sample App Rule which exempts all SIP Traffic from the IPS Engine.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Excluding Traffic via security service Features
TIP: Using the security service feature itself to exclude traffic is the simpler, although less granular, method that we will begin with. If you'd like more granular control over the type of traffic excluded from security services please use the App Rules method detailed below.
TIP: If you have multiple IP Address to Exclude, add them to an Address Group.
NOTE: App Control can inherit Exclusions from IPS by using the Use IPS Exclusion List option.
Excluding Traffic via App Rules
TIP: Excluding Traffic via App Rules allows for more granular control over exemptions but also requires more configuration. If you'd like a quicker, less granular method please use the steps listed above.
EXAMPLE: I'd like to Exclude Windows Updates from being subjected to security services. For my Match Object I select the following:

EXAMPLE: In the image below you can see a sample App Rule which exempts all SIP Traffic from the IPS Engine.