SonicOS 7.0 DPI-SSL
- SonicOS 7.0
- About DPI-SSL
- DPI-SSL/TLS Client
- Deploying the DPI-SSL/TLS Client
- Applying DPI-SSL/TLS Client
- Viewing DPI-SSL Status
- DPI-SSL/TLS Server
- SonicWall Support
Configuring Exclusions and Inclusions
By the default, when DPI-SSL is enabled, it applies to all traffic on the appliance. You can customize to which traffic DPI-SSL inspection applies:
- Exclusion/Inclusion lists exclude or include specified objects and groups
- Common Name exclusions excludes specified host names
- CFS Category-based Exclusion/Inclusion excludes or includes specified categories based on CFS categories
This customization allows individual exclusion or inclusion of alternate names for a domain that is part of a list of domains supported by the same server (certificate). In deployments that process a large amount of traffic, to reduce the CPU impact of DPI-SSL and to prevent the appliance from reaching the maximum number of concurrent DPI-SSL inspected connections, it can be useful to exclude trusted sources.
If DPI-SSL is enabled on the firewall when using Google Drive, Apple iTunes, or any other application with pinned certificates, the application may fail to connect to the server. To allow the application to connect, exclude the associated domains from DPI-SSL. For example, to allow Google Drive to work, exclude:
.google.com
.googleapis.com
.gstatic.com
As Google uses one certificate for all its applications, excluding these domains allows Google applications to bypass DPI-SSL.
Alternatively, exclude the client machines from DPI-SSL.
- Configuring Exclusions and Inclusions by Objects and Groups
- Configuring Exclusions and Inclusions by Common Name
- Configuring Exclusions and Inclusions by CFS Category
Was This Article Helpful?
Help us to improve our support portal