Bypassing devices by MAC address with tags

Overview

Bypass Rules do not provide an option to bypass a device by its hardware or MAC address. However, you can use tags to achieve the desired effect.

 

Tag the device

In the Devices viewer, locate the Tags column and click in the field for the device you would like to tag. In the menu that appears, click Add to create your tag, then click Done to apply the tag to the device.

The tag can be whatever you like. We recommend making it obvious what function the tag is intended to perform; in this case, "bypass".

 

Create your Bypass rule

In Config > Network > Bypass Rules, click Add to create a new rule. In the rule's conditions, use Client Tagged and enter the tag you created in the previous step.

Click Done to enable your bypass.

Follow
Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.

Powered by Zendesk