How to Bypass Untangle

You can use the bypass rules to ensure particular or certain traffic to bypass the Untangle Virtual Machine (UVM). Once in a while, you try to open a web page and it says that the web page you are looking for is blocked. It means that you do not have the permission to access that content. You can follow certain easy steps to know how to bypass untangle. Also, you need to have a brief understanding of the untangle server process.

Let’s have a brief description of the untangle architecture:

Bypass rules ensure specific traffic to bypass the UVM. The UVM is an untangle server process. UVM is a Java virtual machine that processes all the traffic that reaches the untangle server. By default, it does not matter if untangle server is a bridge or gateway, the untangle server traffic always goes through the UVM and after then on to the racks.

Traffic can reach the racks by first passing through the UVM. So, if the data doesn’t pass through the UVM, then it never reaches its way to the racks. Data traffic that has a bypass rule enters an interface and then passes to Linux kernel, then exits another interface. Now it is the Linux kernel, not the UVM that processes the traffic.

In most cases, you don’t have to know about the untangle virtual machine (UVM). However, there is no need to learn about this component in the context of bypass rules.

Creating User Bypass Rules:

When you establish a bypass rule, then you’re really creating a user bypass rule.  Bypass rules are of two types:

  • User bypass rules:

User bypass rules are those bypass rules, which do not exist by default. You can add these rules yourself.

  • System bypass rules:

Those bypass rules that exist by default are known as system bypass rules. One such default bypass rule is VoIP. These rules come preconfigured with the untangle server.

Untangle always want to know the rules that users add to the untangle server. So, you should contact Untangle Technical Support when you add any bypass rules.  This can help untangle to determine if these rules need to be added to the default list. This can help users to ease up the task.

Bypass rules allow you to use technology that wouldn’t otherwise work in an untangle server environment. This is because the data traffic needs special handling. The traffic either depends on Windows protocol (IPSEC/PPTP) or time-sensitive (VoIP). The bypass rules tell specific traffic to bypass the Untangle Virtual Machine (UVM). However, for VoIP, the untangle server understands the default bypass rule.

You can use the bypass rule for high priority protocols such as SIP, which is used for VoIP.  The Untangle Server bypass rules work with SIP and asterisk sessions only. SIP is an application protocol that allows VoIP sessions between caller and sender. Under SIP, you have UDP or TCP transport protocols. Many VoIP applications support SIP and Asterisk protocols. The Untangle Server bypass rules don’t work with RTP and H323 sessions. Microsoft Net meeting makes VoIP calls with the help of these sessions.

To create a bypass rule:

  1. Choose Config > Networking from the navigation pane. The Network Configuration page comes.
  2. Then choose bypass rules from the advanced drop-down menu.
  3. State how you want the untangle server to recognize the traffic. After that, click Save.

Here are few examples:

  • VoIP traffic: SIP supports either TCP or UDP protocol. Generally, it uses the port no. 5080, 5060, or 5061.
  • PPTP VPN connections: PPTP uses TCP and usually the port number is 1723.
  • IPSEC VPN connections.

Source address: It is the IP address of the host machine that sends the traffic.

Destined local: It is an external interface or external IP address on the untangle server. You do not have to state a value because “any” is the value by default.

Destination address: It is the IP address of the host that is intended to receive the traffic.

Source port: The port that first receives the traffic on the Untangle Server.

Source interface: The network interface that first receives the traffic on the Untangle Server.

Protocol: The transport or network protocol that the data traffic uses to move.

Next step: If you want to improve QoS, you have to enable untangle QoS. Bypass rules cannot bypass the QoS system since QoS is operated outside the untangle virtual machine. Whenever you use bypass rules for latency and priority, add a corresponding QoS rule. Mark the same traffic as High.

Bypass Rules vs. Protocol Control:

Both Bypass rules and Protocol Control serve two completely different functions.

You can use the Protocol control to implement policies whereas use bypass rules to make sure that the specific data traffic bypasses the untangle virtual machine (UVM).

You always want to see the desired web page at any cost. Sometimes, you do not get the access to see the requested content. You now want to see the blocked site by going for the proxy server. You can bypass untangle easily if you understand the UVM and bypass rules. I am quite sure that now you get enough information on how to bypass untangle. I also wish you a happy and safe surfing.


Related Content:

  1. How to Untangle your Headphones
  2. How to Untangle Bike Chain
  3. How to Untangle a Slinky
  4. How to Untangle a Phone Cord
  5. How to Untangle Matted Hair
. Tags: .

Leave a Reply