Views:

To bypass dedicated network interface, follow the procedure for your environment:

  1. Determine the MAC address of each interface that you want to bypass.

    netstat -I <interface name>

    Below is an example:

    -bash-3.2# netstat -I en0  Name  Mtu   Network     Address            Ipkts Ierrs    Opkts Oerrs  Coll  en0   1500  link#2      26.3e.22.8a.c.4   6169460     0  1069162     0     0  en0   1500  10.203.144  qa-aix71          6169460     0  1069162     0     0
  2. Convert the MAC address to uppercase with 0 padding and colon separators.
    For example, convert "26.3e.22.8a.c.4" to "26:3E:22:8A:0C:04".
  3. Assemble the MAC addresses into a comma-separated list with prefix "MAC_EXCLUSIVE_LIST=".
    For example, "MAC_EXCLUSIVE_LIST=26:3E:2C:86:AB:04,26:3E:22:8A:0C:04".
  4. On the AIX server, stop the ds_agent process. This will not interfere with business operations and will not affect the protection of the AIX server, as the ds_filter kernel module remains loaded and functional.

    #stopsrc -s ds_agent

  5. On the AIX server, use vi or another editor to create or edit the file /etc/ds_filter.conf by adding the line of text from Step 3 to the file.
  6. On the AIX server, start the ds_agent process. Again, this will not interfere with business operations and will not affect the protection of the AIX server.

    #startsrc -s ds_agent

  7. The traffic on the interfaces in the list from Step 3 will now be bypassed by the Deep Security Agent. Please collect the output from the following commands to confirm that the configuration is correct:

    #netstat -I <interface_name>
    #netstat -I <interface_name>
    #cat /etc/ds_filter.conf
    #ls -l /etc/ds_filter.conf
    #ps -ef |grep ds_agent

If you have ORACLE RAC cluster in Solaris, Linux or even Windows, to bypass the NIC, follow the steps in this KB article: Bypassing a network interface in Windows, Linux and Unix.