The application signature databases that were previously included with SonicWall Intrusion Prevention Service (IPS) are now part of the Application Control feature. These signature databases are used to protect users from application vulnerabilities as well as worms, Trojans, peer-to-peer transfers, spyware and backdoor exploits. The extensible signature language used in SonicWall’s Deep Packet Inspection engine also provides proactive defense against newly discovered application and protocol vulnerabilities.
When configured within the Application Firewall environment, the administrator is allowed far more granular control over the configuration and actions than could previously be applied to IPS signatures. This article describes the method to block the P2P application BitTorrent using Application Control.Â
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
To create an Application Control policy, first create a match object of type Application Category List, Application List, Application Signature List. These three types allow for selection of either general application categories, applications or individual application signatures. As we are blocking individual applications in this article, we will be creating a match object of type Application List.Â
Creating Match Object
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000Enpa1.png)
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000Enpa3.png)
Creating App Rules policy
Now that we have created a match object of what we need to block, let's create a App Rules policy to define who will be blocked.
Â
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000EnpZF.png)
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000Enpa2.png)
Â
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000EnpZN.png)
App Control policies can be made more specific by:
Log Messages
When hosts behind the SonicWall get blocked or when their action triggers a policy based on the App Control policies, SonicWall will log them in either of the following formats, depending on whether Log using App Control message format is checked or not:
Go to Investigate | Logs | Event Logs:
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000EnpZM.png)
Â
The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.
To create an Application Control policy, first create a match object of type Application Category List, Application List, Application Signature List. These three types allow for selection of either general application categories, applications or individual application signatures. As we are blocking individual applications in this article, we will be creating a match object of type Application List.Â
Creating Match Object
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000EnpZL.png)
Creating App Rules policy
Now that we have created a match object of what we need to block, let's create a App Rules policy to define who will be blocked.
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000Enpa4.png)
App Control policies can be made more specific by:
Log Messages
When hosts behind the SonicWall get blocked or when their action triggers a policy based on the App Control policies, SonicWall will log them in either of the following formats, depending on whether Log using App Control message format is checked or not:
-using-Application-Control-Policies-kA1VN0000000G9f0AE-0EMVN00000EnpZz.png)