Software Secure Firewall Threat Defense
Platform Secure Firewall Threat Defense Virtual
Activity Onboard

Configuring Interactive Blocking

The following procedure explains how to allow users to bypass URL filtering rules.

Procedure

1

As part of access control, configure an access control rule that matches web traffic; see Create and Edit Access Control Rules:

2

(Optional) In the access control policy HTTP Responses, choose a custom interactive-block HTTP response page; see Choosing HTTP Response Pages.

3

(Optional) In access control policy Advanced settings, change the user bypass timeout; see Setting the User Bypass Timeout for a Blocked Website.

After a user bypasses a block, the system allows the user to browse to that page without warning until the timeout period elapses.

4

Save the access control policy.

5

Deploy configuration changes.