Policy Configuration : Configuring Access Rules

Controlling Risky Applications
The SonicWALL application signature databases are part of the App Control feature, allowing very granular control over policy configuration and actions relating to them. These signature databases are used to protect users from application vulnerabilities as well as worms, Trojans, peer-to-peer transfers, spyware, and backdoor exploits. The extensible signature language used in the SonicWALL Reassembly Free Deep Packet Inspection engine also provides proactive defense against newly discovered application and protocol vulnerabilities.
App Control provides two ways to create policies for controlling applications. On the Firewall > App Control Advanced page, you can quickly create a policy for a specific category, application, or signature. You can select blocking, logging, or both to control the traffic. While a category includes many applications, this method does not allow you to control applications belonging to more than one category with a single policy. Similarly, while an application can include multiple signatures, you cannot include signatures from different applications in a policy, unless you create a policy for the whole category.
By using the Add Application List Object feature on the Firewall > Match Objects page, you can achieve more granularity and select specific applications from different categories. Then, this object can be used in an App Rules policy.
To include signatures from different applications in a single policy, you need to use the Add New Match Object feature with a Match Object Type of Application Signature List. This allows you to select any signature from the same database that is used for Firewall > App Control Advanced, no matter what category or application the signature belongs to, and add them into a single match object. You can then create an App Rules policy using this match object to control those specific signatures.
Our example in this use case uses the Add Application List Object feature to create an object containing the riskiest applications in the database. We then create an App Rules policy using this object, and block the application traffic using the predefined Reset/Drop action.
See the following sections:
Creating the Application List Object
This procedure shows how to select the riskiest applications in the database, and create a single object containing them.
To create the application list object:
1
2
Navigate to the Firewall > Match Objects page on the Policies tab.
3
Click Add Application List Object.
The Add Application List Object screen displays.
 
4
On the Application tab, to name this object, clear Auto-generate match object name and then type a name such as “Riskiest apps” for the object in the Match Object Name field.
5
6
Under Threat Level, clear all threat level check boxes except for the one next to SEVERE. The list of applications in the lower panel changes as you clear the threat level check boxes.
7
The screen now shows all applications that have a threat level of SEVERE.
If you want to see the signatures included by any of the applications, click the arrow next to the application name to expand the details for it.
 
8
In the application list where you see the names of all the SEVERE rated applications, click the Plus sign next to Name to select all of the listed applications for your object. A dialog box pops up to warn you that selecting the entire list might take awhile. In our case, it will not take too long because there are only a dozen or so applications in the list.
 
9
Click OK in the warning dialog box. All of the Plus signs change to green check marks, and the applications that are added to the Application Group field are on the right.
 
10
Click OK. The Modify Task Description and Schedule window displays.
11
For the Schedule, select Immediate to create the object immediately.
12
Click Accept to save the object with the selected schedule.
The new object is listed on the Firewall > Match Objects page.
Creating an App Control Content App Rules Policy
The next step is to create an App Rules policy that uses our application list object and combines it with an action object to block these risky applications.
To create the App Rules policy:
1
On the Firewall > App Rules page, click Add New Policy.
2
In the App Control Policies Settings window, type a descriptive name such as “Block Risky Apps” into the Policy Name field.
3
Select App Control Content from the Policy Type pull-down list.
 
4
Leave Any in the Address pull-down list.
5
Leave None in the Exclusion Address pull-down list.
6
In the Match Object pull-down list, select the Riskiest apps match object that was just created.
7
In the Action pull-down list, select the Reset/Drop predefined action.
8
For Users/Groups, select All from the pull-down list under Included and select None in the Excluded pull-down list.
9
For Schedule, select Always on from the pull-down list.
10
Optionally select Enable Flow Reporting to enable internal and external flow reporting based on data flows, connection related flows, non-connection related flows regarding applications, viruses, spyware, intrusions, and other information.
11
Select Enable Logging. This causes the policy to create a log entry when a match is found.
12
13
Select Log using App Control message format. This changes logging to display the category in the log entry as “Application Control,” and to use a prefix such as “Application Control Detection Alert” in the log message. This is useful if you want to use log filters to search for Application Control alerts.
14
For Log Redundancy Filter, select Global Settings. This uses the global value set on the Firewall > App Rules page. Alternatively, you can enter a number of seconds to delay between each log entry for this policy. The local setting overrides the global setting only for this policy; other policies are not affected.
15
Select Any from the Zone pull-down list to apply this policy to all zones.
16
Click OK. The Modify Task Description and Schedule window displays.
17
For the Schedule, select Immediate to create the policy immediately.
18
Click Accept to save the policy with the selected schedule.
The new policy is listed on the Firewall > App Rules page.