Many a times, App control application/signature exclusion does not work as configured.
The logic for exclusion which firewall understands is if category is blocked completely , then it will skip the checking for exclusion/inclusion list of its corresponding applications. Similarly, if application is blocked completely, then it will skip the checking for the exclusion/inclusion list of its corresponding signatures.
 EXAMPLE: Lets take an example of 'Multimedia' category which has been blocked completely through application control advanced but we need to access YouTube website.
If we directly go to the application YouTube and configure it with an exclusion list, it will fail to execute the exclusion list because at the category level it has been blocked and hence firewall will not check the exclusion list of individual applications.





This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.
A reverse logic should be implemented to achieve these kind of requirements. Lets take the same example where multimedia category is still blocked and YouTube needs to be allowed.


NOTE:Â Same logic can be applied for signature level as well if we have specific signature which needs to be excluded but its parent application needs to be blocked.Please refer to the following information if internal DNS servers are being used in the network.
If an IP Address Group is being used to allow a group of IP addresses from an application then it would be recommended to add the DNS server IP address also to this Address Group.
If a User Group is being used to allow a group of users from an application. Try one of the following,
- If the DNS server also has a user account then this user account can be added to the allowed User Group
-Â If DNS server User account cannot be added to the User Group then DNS server IP address can be excluded in two ways,
1. Add the DNS servers to the global App Control Exclusion List or else,
2. Instead of using App Control, use App Rules to exclude both User Group and IP Address Object/Group.
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
A reverse logic should be implemented to achieve these kind of requirements. Lets take the same example where multimedia category is still blocked and YouTube needs to be allowed.


NOTE: Same logic can be applied for signature level as well if we have specific signature which needs to be excluded but its parent application needs to be blocked.Please refer to the following information if internal DNS servers are being used in the network.
If an IP Address Group is being used to allow a group of IP addresses from an application then it would be recommended to add the DNS server IP address also to this Address Group.
If a User Group is being used to allow a group of users from an application. Try one of the following,
- If the DNS server also has a user account then this user account can be added to the allowed User Group
-Â If DNS server User account cannot be added to the User Group then DNS server IP address can be excluded in two ways,
1. Add the DNS servers to the global App Control Exclusion List or else,
2. Instead of using App Control, use App Rules to exclude both User Group and IP Address Object/Group.