To bypass dedicated network interface, follow the procedure for your environment:
- Determine the MAC address of each interface that you want to bypass.
netstat -I <interface name>
Below is an example:
-bash-3.2# netstat -I en0 Name Mtu Network Address Ipkts Ierrs Opkts Oerrs Coll en0 1500 link#2 26.3e.22.8a.c.4 6169460 0 1069162 0 0 en0 1500 10.203.144 qa-aix71 6169460 0 1069162 0 0
- Convert the MAC address to uppercase with 0 padding and colon separators.
For example, convert "26.3e.22.8a.c.4" to "26:3E:22:8A:0C:04". - Assemble the MAC addresses into a comma-separated list with prefix "MAC_EXCLUSIVE_LIST=".
For example, "MAC_EXCLUSIVE_LIST=26:3E:2C:86:AB:04,26:3E:22:8A:0C:04". - On the AIX server, stop the ds_agent process. This will not interfere with business operations and will not affect the protection of the AIX server, as the ds_filter kernel module remains loaded and functional.
#stopsrc -s ds_agent
- On the AIX server, use vi or another editor to create or edit the file /etc/ds_filter.conf by adding the line of text from Step 3 to the file.
- On the AIX server, start the ds_agent process. Again, this will not interfere with business operations and will not affect the protection of the AIX server.
#startsrc -s ds_agent
- The traffic on the interfaces in the list from Step 3 will now be bypassed by the Deep Security Agent. Please collect the output from the following commands to confirm that the configuration is correct:
#netstat -I <interface_name>
#netstat -I <interface_name>
#cat /etc/ds_filter.conf
#ls -l /etc/ds_filter.conf
#ps -ef |grep ds_agent
If you have ORACLE RAC cluster in Solaris, Linux or even Windows, to bypass the NIC, follow the steps in this KB article: Bypassing a network interface in Windows, Linux and Unix.