ProSecure Unified Threat Management UTM10 or UTM25 Reference Manual
Content Filtering and Optimizing Scans 6-45
v1.0, September 2009
2. In the Add Scanning Exclusions section of the screen, specify an exclusion rule as explained in
Table 6-14.
3. In the Add column, click the add table button to add the exclusion rule to the Scanning
Exclusions table. The new exclusion rule is enabled by default.
To disable a rule, select the checkbox in the Enable column for the rule. (Unlike the operation of
the Web Management Interface on other screens, you do not need to click any other button to
disable the rule.)
To delete an exclusion rule from the Scanning Exclusions table, click the delete table button in the
Action column to the right of the rule that you want to delete.
Figure 6-20
Table 6-14. Add Scanning Exclusion Settings
Setting Description (or Subfield and Description)
Client IP The client IP address and optional subnet mask that are excluded from all scanning.
Destination IP The destination IP address and optional subnet mask that are excluded from all
scanning.
Port The port number that is excluded from all scanning.
Brief Description A description of the exclusion rule for identification and management purposes.