Configuring Interactive Blocking
The following procedure explains how to allow users to bypass URL filtering rules.
Procedure
Step 1 | As part of access control, configure an access control rule that matches web traffic; see Create and Edit Access Control Rules:
|
Step 2 | (Optional) In the access control policy HTTP Responses, choose a custom interactive-block HTTP response page; see Choosing HTTP Response Pages. |
Step 3 | (Optional) In access control policy Advanced settings, change the user bypass timeout; see Setting the User Bypass Timeout for a Blocked Website. After a user bypasses a block, the system allows the user to browse to that page without warning until the timeout period elapses. |
Step 4 | Save the access control policy. |
Step 5 | Deploy configuration changes. |