Description | This article describes how to create a rule to whitelist or bypass traffic that is required to not be inspected, namely by using an object group to easily populate the list in the GUI. |
Scope | FortiGate. |
Solution |
Once the traffic is confirmed to be matching the policy, the logging can be disabled.
|
Geat article @Carlos !!! Congratulations and thank you so much for your contribution!
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.