Select the override application for traffic
flows that match the above rule criteria. When overriding to a custom
application, there is no threat inspection that is performed. The
exception to this is when you override to a pre-defined application
that supports threat inspection. |