On which occasions should I use the DMZ bypass or Host bypass?
The DMZ is a trust area so that we do not have to check thetraffic from this area and the high throughput is desired. The sameidea is also applied for hosts. A network administrator can insertthe DMZ servers into DMZ bypass list and host into host bypass listfor the wire-speed performance from DFL-M510. (But there is nolog/report for the bypassed traffic.)