Back=right
mouse click.
HTTPS Tunnels can be used to communicate between network locations with restricted connectivity – usually being locations behind NATs, firewalls, or proxy servers. Restricted connectivity is usually the result of blocked TCP/IP ports, blocked traffic initiated from outside the network, or from the blocking of most network protocols is how a network can be locked down to secure it against internal and external threats.
Similar to a global trusted list, domain tunneling allows administrators to maintain a list of trusted sites.
Go to HTTPS > HTTPS Decryption > Tunneling.
Enter the domain name match to be added.
Select to match by a string (exact name) or to match by an entire domain. (An asterisk will appear next to tunnels made through entire domains.)
If you have a previously created file with approved entries already included, click Choose File, select the file you want to add, then click Import.
The Tunneled Domains you add will appear in the Tunneled Domains box.
Click Save.
Obsolete tunnels can be deleted by highlighting the tunnelled domain and clicking Remove, or clear the entire list by clicking Remove all. You can also save your list of tunnelled domains by clicking Export and saving the list to a secure location.
Exceptions can be listed as well. All domains in the exception list will be decrypted.