Main Menu
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • English English English en
  • BLOG
  • CONTACT SALES
  • FREE TRIALS
  • English English English en
SonicWall
  • Products
    • Network Security
      • Next Generation FirewallNext-generation firewall for SMB, Enterprise, and Government
      • Security ServicesComprehensive security for your network security solution
      • Network Security ManagerModern Security Management for today’s security landscape
    • Advanced Threat Protection
      • Capture ATPMulti-engine advanced threat detection
      • Capture Security applianceAdvanced Threat Protection for modern threat landscape
    • Access Security
      • Cloud Edge Secure AccessDeploy Zero-Trust Security in minutes
      • Secure Mobile AccessRemote, best-in-class, secure access
      • Wireless Access PointsEasy to manage, fast and secure Wi-FI
      • SwitchesHigh-speed network switching for business connectivity
    • Email Security
      • Email SecurityProtect against today’s advanced email threats
    • Cloud Security
      • Cloud App SecurityVisibility and security for Cloud Apps
      • Cloud Firewall (NSv)Next-generation firewall capabilities in the cloud
    • Endpoint Security
      • Capture ClientStop advanced threats and rollback the damage caused by malware
      • Content Filtering ClientControl access to unwanted and unsecure web content
    • Product Widgets
      • Product Menu Right Image
      • Capture Cloud Platform
        Capture Cloud Platform

        A security ecosystem to harness the power of the cloud

    • Button Widgets
      • Products A-Z
        all products A–Z FREE TRIALS
  • Solutions
    • Industries
      • Distributed Enterprises
      • Retail & Hospitality
      • K-12 Education
      • Higher Education
      • State & Local
      • Federal
      • Healthcare
      • Financial Services
      • Carriers
    • Use Cases
      • Secure SD-Branch
      • Zero Trust Security
      • Secure SD-WAN
      • Office 365 Security
      • SaaS Security
      • Secure WiFi
    • Solutions Widgets
      • Solutions Content Widgets
        Federal

        Protect Federal Agencies and Networks with scalable, purpose-built cybersecurity solutions

      • Solutions Image Widgets
  • Partners
    • SonicWall Partners
      • Partners Overview
      • Find a Partner
      • Authorized Distributors
      • Technology Partners
    • Partner Resources
      • Become a Partner
      • SonicWall University
      • Training & Certification
    • Partner Widgets
      • Custom HTML : Partners Content WIdgets
        Partner Portal

        Access to deal registration, MDF, sales and marketing tools, training and more

      • Partners Image Widgets
  • Support
    • Support
      • Support Portal
      • Knowledge Base
      • Technical Documentation
      • Community
      • Video Tutorials
      • Product Life Cycle Tables
      • Partner Enabled Services
      • Contact Support
    • Resources
      • Resource Center
      • Free Trials
      • Blog
      • SonicWall University
      • MySonicWall
    • Capture Labs
      • Capture Labs
      • Security Center
      • Security News
      • PSIRT
      • Application Catalog
    • Support Widget
      • Custom HTML : Support Content WIdgets
        Support Portal

        Find answers to your questions by searching across our knowledge base, community, technical documentation and video tutorials

      • Support Image Widgets
  • COMPANY
    • Boundless Cybersecurity
    • Press Releases
    • News
    • Awards
    • Leadership
    • Press Kit
    • Careers
  • PROMOTIONS
    • Customer Loyalty Program
  • MANAGED SERVICES
    • Managed Security Services
    • Security as a Service
    • Professional Services
  • Contact Sales
  • Menu

How to Block UltraSurf (From 11.03 onwards) using Application Control Advanced and DPI-SSL

10/14/2021 63 People found this article helpful 102,332 Views

    Download
    Print
    Share
    • LinkedIn
    • Twitter
    • Facebook
    • Email
    • Copy URL The link has been copied to clipboard

    Description

    Ultrasurf allows end users to circumvent gateway security devices like web filters and secure web gateways in order to surf the Internet without restrictions.

    Resolution

    This article describes how to block UltraSurf versons 11.03 and above using App Control Advanced signatures.


    Please Note: SID 7 is a firmware-based App Control signature and requires SonicOS 5.8.1.8-57o and above



    Resolution for SonicOS 6.5

    This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.



    This article describes how to block UltraSurf versons 11.03 and above using App Control Advanced signatures.

    Summary of configuration required to effectively block UltraSurf

    1. Enable DPI-SSL Client Inspection (CI)
    2. Enable Application Firewall under DPI-SSL CI
    3. Enable App Control Advanced signatures (see list below)

    The following table lists the application group or the signature IDs used to block UltraSurf:

    CategoryApplication NameSignature NameSignature ID
    PROXY-ACCCESSEncrypted Key ExchangeRandom Encryption(Skype,UltraSurf,Emule)5
    PROXY-ACCCESSEncrypted Key ExchangeUDP Random Encryption(UltraSurf)7
    PROXY-ACCCESSNon-SSL Traffic over SSL PortTraffic Anomaly Detection6
    PROXY-ACCCESSUltraSurfUltraSurf Application Group
    PROXY-ACCCESSHTTP ProxyHTTP Proxy Application Group



    NOTE

    Enabling the above signatures has the unintended consequence of blocking outbound encrypted UDP packets which includes Skype traffic, SonicWall GVC connections and/or encrypted Syslog traffic to a GMS server. This is due to SID # 7 which blocks encrypted UDP packets. In the case of GVC connections this shouldn't be considered a drawback. Instead, it's a way to control unauthorised outbound VPN connections. Administrators can exclude remote gateway IP addresses and/or GMS server IP address from SID # 7.

    This article illustrates how to enable the above signatures and how to exclude IP addresses from SID # 7.


    Procedure:

    Enabling DPI-SSL Client Inspection



    NOTE:

    Enabling DPI-SSL Client Inspection would entail a restart of the appliance; thereafter, DPI-SSL would re-sign all SSL/TLS connections passing through it. This could cause disruption in the network. Read the following article before enabling DPI-SSL CI : How to Configure Client DPI-SSL (Video Tutorial and KB Article)


    • Login to the SonicWall Management GUI.
    • Click Manage in the top navigation menu.
    • Navigate to Security Configuration | Deep packet Inspection | SSL Client Deployment
    • Under General tab, enable the check box Enable SSL Client Inspection
    • Enable the check box against Application Firewall
    • Click on Accept at the top to save the changes

    Enabling Signature ID 5,6 & 7.

    • Click Manage in the top navigation menu.
    • Navigate to the Policies | Rules | Advanced Application Control
    • Check the box against Enable App Control
    • Under Lookup Signature ID, enter 5, 6 and 7 one after another and click on the configure button for each signature.
    • In the Edit App Control Signature window, set Block and Log to Enable.
    • Click on OK to save the settings.

    Image


    ImageImage

    Image
    Enabling Application Block - UltraSurf

    • On the App Control Advanced page, select Category as PROXY-ACCESS
    • Select Ultrasurf under Application
    • Click on the configure button to bring up the Edit App Control App window.
    • Select Enable under Block and Log.
    • Click on OK to save.

    Image

    Image

    Enabling Application Signature Group - HTTP Proxy

    • On the App Control Advanced page, select Category as PROXY-ACCESS
    • Select HTTP Proxy under Application
    • Click on the configure button to bring up the Edit App Control App window.
    • Select Enable under Block and Log.
    • Click on OK to save.

    Image

    Enabling Application Control on LAN zone

    • Click Manage in the top navigation menu.
    • Navigate to System Setup | Network | Zones
    • Click on the configure button under the zone where you want enable App Control.
    • Check Enable App Control Service.

     Image


    Excluding gateway IP addresses of SonicWall GVC from SID # 7

    Signature ID 7 blocks encrypted UDP packets. SonicWall GVC connection uses UDP 4500 & 500. To allow GVC connections, exclude the gateway IP addresses of the GVC connection from SID # 7.

    Image


    How to Test:

    From a host behind the SonicWall start UltraSurf. UltraSurf will try to contact its servers and eventually fail.

    Image

    Resolution for SonicOS 6.2 and Below

    The below resolution is for customers using SonicOS 6.2 and earlier firmware. For firewalls that are generation 6 and newer we suggest to upgrade to the latest general release of SonicOS 6.5 firmware.



    Summary of configuration required to effectively block UltraSurf

    1. Enable DPI-SSL Client Inspection (CI)
    2. Enable Application Firewall under DPI-SSL CI
    3. Enable App Control Advanced signatures (see list below)

    The following table lists the application group or the signature IDs used to block UltraSurf:

    CategoryApplication NameSignature NameSignature ID
    PROXY-ACCCESSEncrypted Key ExchangeRandom Encryption(Skype,UltraSurf,Emule)5
    PROXY-ACCCESSEncrypted Key ExchangeUDP Random Encryption(UltraSurf)7
    PROXY-ACCCESSNon-SSL Traffic over SSL PortTraffic Anomaly Detection6
    PROXY-ACCCESSUltraSurfUltraSurf Application Group
    PROXY-ACCCESSHTTP ProxyHTTP Proxy Application Group



    NOTE

    Enabling the above signatures has the unintended consequence of blocking outbound encrypted UDP packets which includes Skype traffic, SonicWall GVC connections and/or encrypted Syslog traffic to a GMS server. This is due to SID # 7 which blocks encrypted UDP packets. In the case of GVC connections this shouldn't be considered a drawback. Instead, it's a way to control unauthorised outbound VPN connections. Administrators can exclude remote gateway IP addresses and/or GMS server IP address from SID # 7.

    This article illustrates how to enable the above signatures and how to exclude IP addresses from SID # 7.


    Procedure:

    Enabling DPI-SSL Client Inspection



    NOTE:

    Enabling DPI-SSL Client Inspection would entail a restart of the appliance; thereafter, DPI-SSL would re-sign all SSL/TLS connections passing through it. This could cause disruption in the network. Read the following article before enabling DPI-SSL CI : How to Configure Client DPI-SSL (Video Tutorial and Article)


    • Login to the SonicWall Management GUI.
    • Navigate to the DPI-SSL | Client SSL page.
    • Under General settings, enable the check box Enable SSL Client Inspection
    • Enable the check box against Application Firewall
    • Click on Accept at the top to save the changes

    Enabling Signature ID 5,6 & 7.

    • Navigate to the Firewall | App Control Advanced page.
    • Check the box against Enable App Control.
    • Under Lookup Signature ID, enter 5, 6 and 7 one after another and click on the configure button for each signature.
    • In the Edit App Control Signature window, set Block and Log to Enable.
    • Click on OK to save the settings.

    Image

    Image

    Image Image

    Image
    Enabling Application Signature Group - UltraSurf

    • On the App Control Advanced page, select Category as PROXY-ACCESS
    • Select Ultrasurf under Application
    • Click on the configure button to bring up the Edit App Control App window.
    • Select Enable under Block and Log.
    • Click on OK to save.

    Image

    Image

    Enabling Application Signature Group - HTTP Proxy

    • On the App Control Advanced page, select Category as PROXY-ACCESS
    • Select HTTP Proxy under Application
    • Click on the configure button to bring up the Edit App Control App window.
    • Select Enable under Block and Log.
    • Click on OK to save.

    Image

    Enabling Application Control on LAN zone

    • Navigate to Network | Zones
    • Click on the configure button under the zone where you want enable App Control.
    • Check Enable App Control Service.

     Image


    Excluding gateway IP addresses of SonicWall GVC from SID # 7

    Signature ID 7 blocks encrypted UDP packets. SonicWall GVC connection uses UDP 4500 & 500. To allow GVC connections, exclude the gateway IP addresses of the GVC connection from SID # 7.

    Image


    How to Test:

    From a host behind the SonicWall start UltraSurf. UltraSurf will try to contact its servers and eventually fail.

    Image

    The following App Control messages will be logged under Log | View when UltraSurf traffic is detected and blocked:Image

    Related Articles

    • Supported SonicWall and 3rd party SFP and SFP+ modules that can be used with SonicWall NSA series
    • L2TP user to access the network across site to site vpn.
    • Global VPN Client slowing down the internet speed

    Categories

    • Firewalls > SonicWall NSA Series > Application Firewall
    • Firewalls > TZ Series > Application Firewall
    • Firewalls > SonicWall SuperMassive 9000 Series > Application Firewall

    Not Finding Your Answers?

    ASK THE COMMUNITY

    Was This Article Helpful?

    YESNO

    Article Helpful Form

    Article Not Helpful Form

    Company
    • Careers
    • News
    • Leadership
    • Awards
    • Press Kit
    • Contact Us
    Popular resources
    • Communities
    • Blog
    • SonicWall Capture Labs

    Stay In Touch

    • By submitting this form, you agree to our Terms of Use and acknowledge our Privacy Statement. You can unsubscribe at any time from the Preference Center.
    • This field is for validation purposes and should be left unchanged.
    • Facebook
    • Twitter
    • Linkedin
    • Youtube
    • Instagram

    © 2022 SonicWall. All Rights Reserved.

    • Legal
    • Privacy
    • English
    Scroll to top
    Trace:dd05288e52973a5809ba22c373a5ba22-70