How to bypass blocking of an App Control Advanced signature using Bypass DPI in App Rules
03/26/2020 70 15438
The Bypass DPI action excludes Match Objects from Deep Packet Inspection (DPI) components IPS, GAV, Anti-Spyware and Application Control. This article describes a method to exclude an App Control Advanced signature from being blocked when the signature's parent application group is blocked.
For the purpose of this article, the signature SID # 8559 - GZIP (HTTP Download) is excluded when its parent application group - Archive under Category FILE-TYPE-HTTP - is blocked. The reason for choosing this particular SID is because enabling this signature for blocking will block access to most HTTP sites.
This article assumes that there already exists an App Rules policy blocking FILE-TYPE-HTTP | Archive.
Login to the SonicWall management GUI
Navigate to the Firewall | Match Objects page
Create the following Match Object.
Navigate to the Firewall | App Rules page.
Create the following App Rules policy. Notice that the Action Object selected is Bypass DPI.
When accessing a website, the log message generated will be in the following format, if Log using App Control message format is enabled in the App Rules policy (see screenshot):
Resolution for SonicOS 6.5
This release includes significant user interface changes and many new features that are different from the SonicOS 6.2 and earlier firmware. The below resolution is for customers using SonicOS 6.5 firmware.
To bypass the DPI, follow these steps.
- Login to the SonicWall management GUI
- Click Manage in the top navigation menu.
- Navigate to the Policies | Objects | Match Objects page, click on"Add" and choose "Match Object"
- Create the following Match Object.
Navigate to the Policies | Rules | Application Control page, click on"Add" and configure the rules as shown in the screenshot
- The Rule would be shown in the App rules as shown below in the screenshot
When accessing a website, the log message would be generated.