OpenDoor is a proxy application for Apple iPad, iPhone and iPad. OpenDoor allows users to bypass firewall restrictions and browse the Internet freely. It is a browser based proxy using HTTPS to establish connections.
This article describes how to block OpenDoor using App Rules (Application Firewall) with Client DPI-SSL enabled.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Here's how to block OpenDoor using App Rules:



Enabling Client DPI-SSL
Note:Â Before enabling Client DPI-SSL, administrators must be aware that Client DPI-SSL will proxy all outgoing SSL connections. To this end, SonicWall will re-sign the SSL certificates passing to hosts. This in turn will trigger certificate errors in the browsers. To avoid these errors, import the SonicWall DPI-SSL CA certificate as a trusted Root CA into the browser's (or the computer's) certificate store. For more information, see:Â Distributing the Default SonicWall DPI-SSL CA certificate to client computers using Group Policy

This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Here's how to block OpenDoor using App Rules:
                                
    9.Navigate to the Manage| Rules | App Rules page and create the following App Rule referencing the above Match Object. Make sure Connection Side and Direction are set to Both.
                       
    10.On the App Rules page enable check box Enable App Rules.
Enabling Client DPI-SSL
Note:Â Before enabling Client DPI-SSL, administrators must be aware that Client DPI-SSL will proxy all outgoing SSL connections. To this end, SonicWall will re-sign the SSL certificates passing to hosts. This in turn will trigger certificate errors in the browsers. To avoid these errors, import the SonicWall DPI-SSL CA certificate as a trusted Root CA into the browser's (or the computer's) certificate store. For more information, see:Â Distributing the Default SonicWall DPI-SSL CA certificate to client computers using Group Policy
                        
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
Here's how to block OpenDoor using App Rules:


Enabling Client DPI-SSL
Note: Before enabling Client DPI-SSL, administrators must be aware that Client DPI-SSL will proxy all outgoing SSL connections. To this end, SonicWall will re-sign the SSL certificates passing to hosts. This in turn will trigger certificate errors in the browsers. To avoid these errors, import the SonicWall DPI-SSL CA certificate as a trusted Root CA into the browser's (or the computer's) certificate store. For more information, see: Distributing the Default SonicWall DPI-SSL CA certificate to client computers using Group Policy

Testing
Test by accessing a website in the OpenDoor browser.