Experience Center
About Application Bypass
You can configure IP-based and process-based applications to bypass traffic in the Admin Portal. In App Profiles, you can then select IP-based applications to bypass traffic for Zscaler Tunnel (Z-Tunnel) 2.0 configuration and process-based applications to bypass traffic for both Z-Tunnel 1.0 and 2.0 when using the Windows filter driver.
You cannot configure domain-based bypasses on this page. If you want to bypass a specific domain, you can add it to a custom PAC file. To learn more, see Best Practices for Using PAC Files with Zscaler Client Connector.
Application bypass provides the following benefits and enables you to:
- View, add, and search for IP-based or process-based applications to bypass traffic.
- Explore details of a bypassed application.
About the Application Bypass Page
On the Application Bypass page (Infrastructure > Common Resources > Application), you can do the following:
- View a list of IP-based applications that are bypassed in Z-Tunnel 2.0 configuration with the Last Edited Timestamp details.
- Add an IP-based application.
- Search for existing applications added to Application Bypass.
- Click the View icon to view the following details of a bypassed IP-based application:
- Protocol
- Port
- IP Address
- View and add process-based applications.