Configuring and viewing traffic interception exclusions

To add a traffic interception exclusion, run the following command:

kesl-control --add-bypass-endpoints --direction <in|out> --remote-ip <remote IP address> --dst-port <destination port>

where:

In an exclusion, you may specify an IP address of the remote device without a port or a destination port without an IP address.

If you specify only the IP address of the remote device in an exclusion for inbound traffic (without specifying a port on the protected device), all traffic from the remote device is excluded from interception. We recommend configuring this exclusion only for traffic from devices that you trust.

To view the list of configured traffic interception exclusions, run the following command:

kesl-control --list-bypass-endpoints

The following information is displayed for each exclusion:

Page top