# - full: keep tracking and inspection as normal. Unmodified content
# keyword signatures are inspected as well.
#
- # For best performance, select 'bypass'.
+ # For the best performance, select 'bypass'.
#
#encryption-handling: track-only
In some cases there are reasons to ignore certain traffic. Certain hosts
may be trusted, or perhaps a backup stream should be ignored.
-capture filters (BPF)
+Capture Filters (BPF)
---------------------
Through BPFs the capture methods pcap, af-packet, netmap and pf_ring can be
suppress gen_id 0, sig_id 0, track by_src, ip 1.2.3.4
-encrypted traffic
+Encrypted Traffic
-----------------
The TLS and SSH app layer parsers have the ability to stop processing
.. _bypass:
-bypassing traffic
+Bypassing Traffic
-----------------
Aside from using the ``bypass`` keyword in rules, there are three other ways