Decryption policy rules granularly define the traffic
to decrypt or not to decrypt based on the source, destination, service
(application port), and URL category.
Before
you create a Decryption policy rule, make sure you understand that
the set of IPv4 addresses is treated as a subset of the set of IPv6
addresses, as described in detail in
Policy.