The approved and blocked lists allow traffic to
override the defined policies, web reputation, and advanced threat protection settings.
If authentication is enabled, the approved and blocked lists are matched after
authentication. The end user has already finished authentication before entries are
matched in
the approved and blocked lists.
NoteYou cannot use the Approved List to bypass authentication. However, you can use
a bypass policy (destination IP addresses) to bypass authentication.
|
By default, Deep Discovery Web
Inspector
automatically determines whether to add an input entry as a Server IP address match,
a domain
match, a URL match, or a File SHA1 object type.
Instead of using auto mode, you can use advanced options to manually specify the
object type when adding the entry.
Match Entries
Keep the following in mind when adding entries to a list:
-
The approved list takes precedence over the blocked list.
-
An asterisk (*) denotes a wild card.
-
You can add multiple entries to the approved or blocked list at the same time by using a delimiter between each entry.Valid delimiters are semicolon (;), comma (,), or linefeed (\r, \n, or \r\n).
| Match Type | Description | Examples |
| Auto |
You can let Deep Discovery Web
Inspector automatically determine the object type when adding an entry
to the approved and blocked lists.
Domain and URL
Server IP address
File (SHA1)
|
|
| Server IP address |
You can input an IP address entry as a single entry or delimited list of IP
addresses, Class InterDomain Routing (CIDR) networks, or IP address ranges.
|
|
| Domain |
|
|
| URL |
|
|
| File (SHA1) |
|
058f2491a3e13ce2078b7b5e3e62c59dc518ecbb |
