
Bypassing the Cato Cloud Using Predefined Applications: Simplify Secure Egress for Key Traffic
🕓 September 11, 2025
In modern enterprise environments, ensuring optimal performance for productivity applications—such as Zoom or Microsoft Teams—is critical. Manually managing outbound traffic by maintaining evolving IP lists can be cumbersome and error-prone. Cato Networks’ Bypassing the Cato Cloud capability addresses this challenge, and with the recent introduction of Predefined Application Bypass Rules, administrators now have a simpler way to optimize SaaS traffic.
The Bypassing the Cato Cloud feature allows administrators to configure Bypass Rules that let selected Internet-bound traffic egress directly from Socket and vSocket sites, instead of traversing Cato PoPs.
Key behaviors include:
This functionality is available for Socket and vSocket sites only.
Cato now provides Predefined Application Bypass Rules, which eliminate the need to manage dynamic IP ranges manually. These rules let administrators select specific business-critical applications directly when creating a bypass rule.
Currently supported applications include:
Cato continuously updates the IP definitions for these applications in the background. This ensures bypass rules always remain current without requiring administrator intervention.
Both approaches complement each other, providing flexibility for unique traffic scenarios and efficiency for common applications.
Not sure which bypass strategy fits your environment? Fill out the form and our team will contact you to discuss the best approach for your setup.
Bypassing the Cato Cloud is a powerful capability that provides direct egress for selected Internet traffic from Socket and vSocket sites. With the introduction of Predefined Application Bypass Rules, administrators gain a streamlined way to optimize traffic for commonly used SaaS platforms—without the operational burden of tracking IP ranges.
By combining traditional Bypass Rules and Predefined Application Bypass Rules, enterprises achieve both flexibility and efficiency, ensuring high performance for critical applications while maintaining centralized control.
Want to see how predefined bypass rules can improve your Teams and Zoom performance? Book a free consultation with our experts today.
A Bypass Rule is manually configured using IPs, ports, or protocols. A Predefined Application Bypass Rule lets administrators select specific applications from a list maintained by Cato.
No. Traffic defined in bypass rules does not pass through PoP-level security services. Only Socket-level QoS and bandwidth profiles apply.
Yes. Administrators can mix traditional Bypass Rules with Predefined Application Bypass Rules as needed.
No. Bypassing the Cato Cloud applies only to Socket and vSocket sites.
The Socket automatically reroutes traffic to the best available WAN link using real-time performance metrics.
Applications like Zoom and Teams are latency-sensitive. By routing them directly to the Internet, organizations reduce delay and improve quality for voice and video sessions.
Anas is an Expert in Network and Security Infrastructure, With over seven years of industry experience, holding certifications Including CCIE- Enterprise, PCNSE, Cato SASE Expert, and Atera Certified Master. Anas provides his valuable insights and expertise to readers.
Share it with friends!
🕓 September 11, 2025
🕓 September 10, 2025
🕓 September 9, 2025
share your thoughts