Note: It is a recommended best practice to utilize inspection bypass rules to bypass encrypted traffic. This is recommended because the IPS cannot inspect encrypted traffic and attempting to do so can impact performance and cause unnecessary CPU processing load.
Note: If SSL traffic inspection is required, TippingPoint offers the Threat Protection System (TPS) devices. The TPS devices (with appropriate SSL license) decrypt SSL traffic between clients and site servers and sends the decrypted traffic to the IPS device for analysis. After inspection the SSL traffic is re-encrypted and sent on its way.