If you are deploying a proxy in a transparent configuration and would like to test functionality for a few users before applying policy to the entire organization the restricted intercept function of the proxy could be used to accomplish this.
The default behavior of the Proxy SG is to use the entries in proxy services and evaluate base on this whether traffic should be intercepted or bypassed. To override this behavior you can create and use a restricted intercept list. Only IP addresses that are a part of the list will have policies applied to them. All other user traffic will be bypassed.
You can use the static bypass list in conjunction with the restricted intercept list but the static bypass list will take precedence over the restricted intercept list.
Subscribing will provide email updates when this Article is updated. Login is required to Subscribe
Thanks for your feedback. Let us know if you have additional comments below. (requires login)
Subscribed to the Article.
Unable to subscribe
Thanks for your additional feedback !!!
Enterprise Support Virtual Agent
Rate Me :
Tell us more:
Welcome! My name is Sami, the Enterprise Support Virtual Agent answering technical support questions.