10/14/2021 82 People found this article helpful 404,654 Views
The Bypass DPI action excludes Match Objects from Deep Packet Inspection (DPI) components IPS, GAV, Anti-Spyware and Application Control. This article describes a method to exclude an App Control Advanced signature from being blocked when the signature's parent application group is blocked.
For the purpose of this article, the signature SID # 8559 - GZIP (HTTP Download) is excluded when its parent application group - Archive under Category FILE-TYPE-HTTP - is blocked. The reason for choosing this particular SID is because enabling this signature for blocking will block access to most HTTP sites.
This article assumes that there already exists an App Rules policy blocking FILE-TYPE-HTTP | Archive.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
To bypass the DPI, follow these steps.
Select the below options:
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
To bypass the DPI, follow these steps.
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Login to the SonicWall management GUI
Navigate to the Firewall | Match Objects page
Create the following Match Object.
Navigate to the Firewall | App Rules page.
Create the following App Rules policy. Notice that the Action Object selected is Bypass DPI.