Can you enable No Ads in firewall rule, but have certain sites be whitelisted?

There are some sites that I need Ads blocker disabled, or I wouldn't be able to continue.  Is it possible to whitelist?

SFVH (SFOS 18.5.1 MR-1-Build326)



Added TAGs
[edited by: emmosophos at 10:57 PM (GMT -7) on 28 Oct 2021]
  • No,

    before scanning otherwise XG would not be able scan the url download.

    Ian

     
    V18.5.x - e3-1225v5 6gb ram with 4 ports - 20w. 
    If a post solves your question use the 'This helped me' link.
  • Ok.  thanks for the confirmation.  I'm undecided due to need to install CA on each device.  

    How often do you need to reinstall a new CA on existing devices?  Is it 1x only, no need to update, reinstall new CA?  

  • Hi,

    once should be enough, but sometimes after updates to devices.

    Ian

     
    V18.5.x - e3-1225v5 6gb ram with 4 ports - 20w. 
    If a post solves your question use the 'This helped me' link.
  • Thank you for patiently answering my questions!  I will create a new firewall rule and test on some devices first.  

  • Thanks for giving me instructions on enabling, installing CA.  Currently, I've only installed/ enabled it on 2 devices, for testing, so as not to disrupt web access.  Without the CA, I can't do anything, with CA installed, I can surf easily.  

    I'm trying to create web exceptions for sites.  I chose web category instead.  I'm not seeing option to bypass ad block though.

  • Hi,

    you would tick policy check for that function,

    ian

     
    V18.5.x - e3-1225v5 6gb ram with 4 ports - 20w. 
    If a post solves your question use the 'This helped me' link.
  • Thanks!

    A follow-up question, not sure if still related.  SSL/ TLS inspection is related to "Decrypt HTTPS during web proxy filtering?"  So should turn it on to start derypting HTTPS?  Furthermore, clients without CA installed won't be able to surf if they on the same firewall rule?  Can I exclude clients from decrypting https?  Do I do this by creating a new ssl/ tls rule, with specific source networks and devices?  

  • Hi,

    there is a post from Lucar on the subject, though not sure in what thread. Ssl/tls scans the traffic before passing it for the proxy if the proxy is ticked.

     The only way that i am aware of is seperate rule for those clients with out the ca installed. Do you use an AD for authentication otherwise  I suggest you look at the various client types in the authentication tab.

    ian

     
    V18.5.x - e3-1225v5 6gb ram with 4 ports - 20w. 
    If a post solves your question use the 'This helped me' link.
  • Don't use AD.  So far, I've created a separate firewall rule, and given my 2 devices for testing it's own firewall rule, with above recommendations, and SSL/ TLS enabled on the 2 devices.  So far, I'm seeing in Firewall page how many % decrypted.  Without this, it's always 0.  I think I'm doing it correctly now.  Thanks!

  • It is quite simple: 

    There are two completely different engines in SFOS. Web Proxy and DPI engine. If you tick those both option on the right site in the firewall rule, the traffic will be going over the web proxy (But only 80/443). If you leave it untick and have a TLS/SSL Decryption rule, it will use the DPI Engine. The picture above is by not uing the legacy (old) proxy. 

    The Web Proxy on the right site of the firewall rule has advantages over the DPI Engine. Means that if you use it, it will be used instead of the DPI Engine. 

    __________________________________________________________________________________________________________________