Which of the following statements is false regarding Firewall rules using the Bypass action?

Which of the following statements is false regarding Firewall rules using the Bypass action?
A . Applying a Firewall rule using the Bypass action to traffic in one direction automatically applies the same action to traffic in the other direction.
B. Firewall rules using the Bypass action do not generate log events.
C. Firewall rules using the Bypass action allow incoming traffic to skip both Firewall and Intrusion Prevention analysis.
D. Firewall rules using the Bypass action can be optimized, allowing traffic to flow as effi-ciently as if a Deep Security Agent was not there.

Answer: A

Explanation:

Firewall rules using Bypass have the following noteworthy characteristics:

• Bypass skips both Firewall and Intrusion Prevention analysis.

• Since stateful inspection is for bypassed traffic, bypassing traffic in one direction does not automatically bypass the response in the other direction. As a result firewall rules using Bypass are always created in pairs, one for incoming traffic and another for outgoing.

• Firewall rules using Bypass will not be logged. This is not a configurable behavior.

• Some firewall rules using Bypass are optimized, in that traffic will flow as efficiently as if the Deep Security Agent/Deep Security Virtual Appliance was not there.

Explication: Study Guide – page (236)

Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments