Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

App Control Advance: Exclusion Logic

10/14/2021 204 People found this article helpful 95,909 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Many a times, App control application/signature exclusion does not work as configured.

    The logic for exclusion which firewall understands is if category is blocked completely , then it will skip the checking for exclusion/inclusion list of its corresponding applications. Similarly, if application is blocked completely, then it will skip the checking for the exclusion/inclusion list of its corresponding signatures.


     EXAMPLE: Lets take an example of 'Multimedia' category which has been blocked completely through application control advanced but we need to access YouTube website.

    If we directly go to the application YouTube and configure it with an exclusion list, it will fail to execute the exclusion list because at the category level it has been blocked and hence firewall will not check the exclusion list of individual applications.


    • SonicOS 7.XImage

      Image


    • SonicOS 6.5
      Image

      Image



    • Due to this, YouTube will still be blocked for all devices as the exclusion logic is not applied.
      Image



    Resolution

    Resolution for SonicOS 7.X

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.5 and earlier firmware. The below resolution is for customers using SonicOS 7.X firmware.







    A reverse logic should be implemented to achieve these kind of requirements. Lets take the same example where multimedia category is still blocked and YouTube needs to be allowed.

    • Instead of configuring the exclusion list, we will configure a reverse logic where we will configure the inclusion list as shown below. Here, firewall will check the exclusion/inclusion list as now the block has been disabled which is different than its parent category level. Image

    • Now the "testpc" device should be able to access YouTube.
      Image

      NOTE: Same logic can be applied for signature level as well if we have specific signature which needs to be excluded but its parent application needs to be blocked.


    Please refer to the following information if internal DNS servers are being used in the network.


    • Even after following the above steps mentioned in this article, if the users are unable to access the allowed application then the issue might be due to using internal DNS servers and these DNS servers may not have been added to the "Included IP Address Range" or "Included Users/Groups" field in the above scenario. The following points explains the reason behind adding the DNS servers to the list and various methods on how to allow DNS servers traffic from App Control.
    • Many applications have DNS queries as one of the signature. When internal DNS servers are used, all DNS queries from every user device in the network goes through these internal DNS servers. When DNS servers are not added to the allowed list of these applications then even the allowed users will be unable to access the applications as the DNS queries are being blocked.
    • If an IP Address Group is being used to allow a group of IP addresses from an application then it would be recommended to add the DNS server IP address also to this Address Group.


    • If a User Group is being used to allow a group of users from an application. Try one of the following,



    - If the DNS server also has a user account then this user account can be added to the allowed User Group

    - If DNS server User account cannot be added to the User Group then DNS server IP address can be excluded in two ways,

    1. Add the DNS servers to the global App Control Exclusion List or else,

    2. Instead of using App Control, use App Rules to exclude both User Group and IP Address Object/Group.

    • If both User Group and IP address Group is selected to be in the "Included" field of an Application in App control, then the only traffic that will be allowed is the traffic that is matching both IP Address Group AND also User Group. If the traffic matches either IP Address Group OR User Group then the traffic will not be allowed.



    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.







    A reverse logic should be implemented to achieve these kind of requirements. Lets take the same example where multimedia category is still blocked and YouTube needs to be allowed.

    • Instead of configuring the exclusion list, we will configure a reverse logic where we will configure the inclusion list as shown below. Here, firewall will check the exclusion/inclusion list as now the block has been disabled which is different than its parent category level.
      ImageImage

      NOTE: Same logic can be applied for signature level as well if we have specific signature which needs to be excluded but its parent application needs to be blocked.


    Please refer to the following information if internal DNS servers are being used in the network.


    • Even after following the above steps mentioned in this article, if the users are unable to access the allowed application then the issue might be due to using internal DNS servers and these DNS servers may not have been added to the "Included IP Address Range" or "Included Users/Groups" field in the above scenario. The following points explains the reason behind adding the DNS servers to the list and various methods on how to allow DNS servers traffic from App Control.
    • Many applications have DNS queries as one of the signature. When internal DNS servers are used, all DNS queries from every user device in the network goes through these internal DNS servers. When DNS servers are not added to the allowed list of these applications then even the allowed users will be unable to access the applications as the DNS queries are being blocked.
    • If an IP Address Group is being used to allow a group of IP addresses from an application then it would be recommended to add the DNS server IP address also to this Address Group.


    • If a User Group is being used to allow a group of users from an application. Try one of the following,



    - If the DNS server also has a user account then this user account can be added to the allowed User Group

    - If DNS server User account cannot be added to the User Group then DNS server IP address can be excluded in two ways,

    1. Add the DNS servers to the global App Control Exclusion List or else,

    2. Instead of using App Control, use App Rules to exclude both User Group and IP Address Object/Group.

    • If both User Group and IP address Group is selected to be in the "Included" field of an Application in App control, then the only traffic that will be allowed is the traffic that is matching both IP Address Group AND also User Group. If the traffic matches either IP Address Group OR User Group then the traffic will not be allowed.


    ISSUE ID:

    Jira GEN6-2534

    Related Articles

    • How to disable TOTP for a Local User with admin privileges via CLI.
    • Parserror on Event logs.
    • Switch from the Policy mode to classic mode on Gen 7 appliances

    Categories

    • Firewalls > NSv Series > Application Firewall
    • Firewalls > SonicWall NSA Series > Application Firewall
    • Firewalls > TZ Series > Application Firewall
    • Firewalls > NSa Series > Application Firewall
    • Firewalls > SonicWall SuperMassive 9000 Series > Application Firewall

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top
    Trace:dd05288e52973a5809ba22c373a5ba22-70