In SonicOS 5.8, the Application Firewall feature of previous SonicOS releases has been significantly enhanced with Application Control functionality. As part of this solution, the set of application relevant signatures have been extracted from the existing set of IPS signatures and placed under the realm of the Application Control feature. This change impacts the way that application control policies and dynamic objects are configured and used.
SonicOS 5.8 introduces a new user interface for application control with the new Firewall | App Control Advanced page. In some TZ models the App Control Advanced page is located under Security Services. This screen provides a simple and direct way of configuring application control rules. In SonicOS 5.8, all of the application configuration which was previously available under Security Services | Intrusion Prevention is now moved to the App Rules page, leaving IPS to handle threats and attacks. This change means that applications have their own user interface now, and you no longer have to configure them under Intrusion Prevention.
The most significant enhancement made in the configuration of application signatures is the addition of a new level configuration called Application. Hitherto, under IPS signatures were grouped under Priority, Categories and Signatures. With Application level, application signatures are grouped based on the name of the application. For eg. the 8 signatures of Google Chat have been grouped under the Application name "Google Chat" (See screenshot below). The advantage of this level of granularity is that administrators can prevent application traffic by configuring the Application rather than configure each signature. Keeping with the example above, to block Google Chat an administrator need only enable prevention of Google Chat, instead of enabling prevention on each of the 8 signatures.
You can enable prevention or detection for a whole category of applications with one click, and can easily locate and do the same for an individual application or individual signature. Once enabled, Category, Application, or Signature is blocked or logged globally.
TIP:Video Tutorial: Click here for the video tutorial of How to block applications using application control advanced.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
Enable Application Control


Category based Application ControlÂ
|
Blocking an application while allowing the category.
In this example we configure the application Twitter to be blocked although the parent category Social-Networking is set to Allow.
|
Signature based Application Control
|
Including / Excluding IP Address Range
| Category layer | All:Â This applies to all hosts behind the SonicWall. Custom and default address objects and groups:Â Can either use the default objects like LAN Subnets, or create a custom address object for individual IP addresses, range of IP addresses. |
| Application layer | Use Category Settings:Â Selecting this option would inherit the settings configured in the parent Category. All:Â This applies to all hosts behind the SonicWall. Custom and default address objects and groups:Â Can either use the default objects like LAN Subnets, or create a custom address object for individual IP addresses, range of IP addresses. |
| Signature layer | Use App Settings:Â Selecting this option would inherit the settings configured in the parent Application. All:Â This applies to all hosts behind the SonicWall. Custom and default address objects and groups:Â Can either use the default objects like LAN Subnets, or create a custom address object for individual IP addresses, range of IP addresses. |

Including / Excluding Users / User Groups
| Category layer | All:Â This applies to all users behind the SonicWall. Custom and default user objects and groups: Can either use the default user objects like Everyone, Trusted Users etc. or create a local user. |
| Application layer | Use Category Settings:Â Selecting this option would inherit the settings configured in the parent Category. All:Â This applies to all users behind the SonicWall. Custom and default user objects and groups: Can either use the default user objects like Everyone, Trusted Users etc. or create a local user. |
| Signature layer | Use App Settings:Â Selecting this option would inherit the settings configured in the parent Application. All:Â This applies to all users behind the SonicWall. Custom and default user objects and groups: Can either use the default user objects like Everyone, Trusted Users etc. or create a local user. |

This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
Enable Application Control
NOTE: Enable App Control per zone by checking the box under Enable App Control Service on each zone.
App Control view style

EXAMPLE: By selecting category IM with the following Viewed By settings will get the following.
|
![]() |
|
![]() |
|
![]() |
Category based Application Control
|
![]() |
Blocking a category while allowing an application within the category.
In this example we configure the application Kakao Talk to be allowed although the parent category IM is set to Block.
|
                                              ![]() |
Blocking a signature while allowing the parent application


Including / Excluding IP Address Range
EXAMPLE:Â IM) is selected on each layer of configuring App Control the following options are there to include or exclude IP addresses.| Category layer | All: This applies to all hosts behind the SonicWall. Custom and default address objects and groups: Can either use the default objects like LAN Subnets, or create a custom address object for individual IP addresses, range of IP addresses. |
| Application layer | Use Category Settings: Selecting this option would inherit the settings configured in the parent Category. All: This applies to all hosts behind the SonicWall. Custom and default address objects and groups: Can either use the default objects like LAN Subnets, or create a custom address object for individual IP addresses, range of IP addresses. |
| Signature layer | Use App Settings: Selecting this option would inherit the settings configured in the parent Application. All: This applies to all hosts behind the SonicWall. Custom and default address objects and groups: Can either use the default objects like LAN Subnets, or create a custom address object for individual IP addresses, range of IP addresses. |



Including / Excluding Users / User Groups
| Category layer | All: This applies to all users behind the SonicWall. Custom and default user objects and groups: Can either use the default user objects like Everyone, Trusted Users etc. or create a local user. |
| Application layer | Use Category Settings: Selecting this option would inherit the settings configured in the parent Category. All: This applies to all users behind the SonicWall. Custom and default user objects and groups: Can either use the default user objects like Everyone, Trusted Users etc. or create a local user. |
| Signature layer | Use App Settings: Selecting this option would inherit the settings configured in the parent Application. All: This applies to all users behind the SonicWall. Custom and default user objects and groups: Can either use the default user objects like Everyone, Trusted Users etc. or create a local user. |
App Control Logs
When a category, application or a signature is blocked, logs similar to the ones below can be seen under the Investigate tab | Event Logs.To be able to see Application Control logs make sure the following are true:
Â