If the Bandwidth Management Type on the
Firewall Settings > BWM page is set to Global, application layer bandwidth management functionality is supported with eight predefined, default BWM priority levels, available when adding a policy from the Firewall > App Rules page. There is also a customizable
Bandwidth Management type action, available when adding a new action from the Firewall > Action Objects page.
As a best practice, configuring the Global Bandwidth Management settings on the Firewall Settings > BWM page should always be done before configuring any BWM policies.
Changing the Bandwidth Management Type on the
Firewall Settings > BWM page from Advanced to
Global disables BWM in all Access Rules. However, the default BWM action objects in App Control policies are converted to the global bandwidth management settings.
When you change the Bandwidth Management Type from
Global to Advanced, the default BWM actions that are in use in any App Rules policies are automatically converted to Advanced BWM Medium, no matter what level they were set to before the change.
When you toggle between Advanced and
Global, the default BWM actions are converted to BWM Global-Medium. The firewall does not store your previous priority levels when you switch the type back and forth. You can view the conversions on the
Firewall >
App Rules page.
Custom BWM actions behave differently than the default BWM actions. Custom BWM actions are configured by creating action objects on the Firewall >
Action Objects page. Custom Bandwidth Management actions, and the policies that use those actions, retain their priority settings whenever the
Bandwidth Management Type is toggled between
Global and Advanced.
The following figure shows the same policy after the global Bandwidth Management Type is set to
Global. Only the Priority appears in the tooltip, because no values are set in the Global Priority Queue for guaranteed or maximum bandwidth for level 5.
When the Bandwidth Management Type is set to Global, the Add/Edit Action Object screen provides the Bandwidth Priority option, but uses the values that are specified in the Priority table on the
Firewall Settings > BWM page for Guaranteed Bandwidth and Maximum Bandwidth.
Figure 14 shows the Bandwidth Priority selections in the
Add/Edit Action Objects screen when the global
Bandwidth Management Type is set to
Global on the
Firewall Settings >
BWM page.
A number of BWM action options are also available in the predefined, default action list. The BWM action options change depending on the Bandwidth Management Type setting on the
Firewall Settings > BWM page. If the
Bandwidth Management Type is set to
Global, all eight priorities are selectable. If the
Bandwidth Management Type is set to Advanced, no priorities are selectable, but the predefined priorities are available when adding a policy.
To control the Packet Monitor action to capture only the packets related to your policy, click Configure on the Packet Monitor page and select
Enable Filter based on the firewall/app rule on the
Monitor Filter tab (see
Figure 15). In this mode, after you click
Start Capture on the Packet Monitor page, packets are not captured until some traffic triggers the App Control policy (or Firewall Access Rule). You can see the Alert message in the Log > View page when the policy is triggered. This works when Packet Monitor is selected in App Control policies created with the Create Rule button or with the App Rules method using an action object, or in Firewall Access Rules, and allows you to specify configuration or filtering for what to capture or mirror. You can download the capture in different formats and look at it in a Web page, for example.
To set up mirroring, go to the Mirror tab and pick an interface to which to send the mirrored traffic in the
Mirror filtered packets to Interface field under Local Mirroring Settings. You can also configure one of the Remote settings. This allows you to mirror the application packets to another computer and store everything on the hard disk. For example, you could capture everyone’s MSN Instant Messenger traffic and read the conversations.
The Dashboard > AppFlow Monitor page provides a Create Rule button. If, while viewing the AppFlow Monitor, you see an application that seems suspicious or is using excessive amounts of bandwidth, you can simply select the application in the list, then click Create Rule and configure an App Control policy for it immediately. You can also select multiple applications and then use Create Rule to configure a policy that applies to all of them.
Figure 16 shows the Create Rule window displayed over the Dashboard > AppFlow Monitor page.
In the Firewall > App Rules page, you can access the Policy Settings screen, shown below for a Policy Type of SMTP Client. The screen changes depending on the Policy Type you select.
In the Add/Edit Match Object window, you can add multiple entries to create a list of content elements to match. All content that you provide in a match object is case-insensitive for matching purposes. A hexadecimal representation is used to match binary content. You can use a hex editor or a network protocol analyzer like Wireshark to obtain hex format for binary files. For more information about these tools, see the following sections:
You can use the Load From File button to import content from predefined text files that contain multiple entries for a match object to match. Each entry in the file must be on its own line. The Load From File feature allows you to easily move Application Control settings from one firewall to another.
Popular regular expression primitives such as ‘.’, (the any character wildcard), ‘
*’, ‘
?’, ‘
+’, repetition count, alternation, and negation are supported. Though the syntax and semantics are similar to popular regular expression implementations such as Perl, vim, and others, there are some minor differences. For example, beginning (
^) and end of line (
$) operators are not supported. Also, ‘
\z’ refers to the set of non-zero digits,
[1-9], not to the end of the string as in PERL. For syntax information, see the
Regular Expression Syntax .
Regular expressions are matched efficiently by building a data structure called Deterministic Finite Automaton (DFA). The DFA’s size is dictated by the regular expression provided by the user and is constrained by the memory capacities of the device. A lengthy compilation process for a complex regular expression can consume extensive amounts of memory on the appliance. It may also take up to two minutes to build the DFA, depending on the expressions involved.
Also at risk of rejection are expressions containing a large number of characters rather than a character range or class. That is, the expression ‘(a|b|c|d|. . .|z)’ to specify the set of all lower-case letters is more likely to be rejected than the equivalent character class ‘
\l’. When a range such as ‘
[a-z]’ is used, it is converted internally to ‘
\l’. However, a range such as
‘
[d-y]’ or ‘
[0-Z]’ cannot be converted to any character class, is long, and may cause the rejection of the expression containing this fragment.
The Firewall > Match Objects page also contains the Add Application List Object button, which opens the
Create Match Object window. This window provides two tabs:
The Application tab provides a list of applications for selection. You can control which applications are displayed by selecting one or more application categories, threat levels, and technologies. You can also search for a keyword in all application names by typing it into the Search field near the top right of the display. For example, type in “bittorrent” into the Search field and click the Search icon to find multiple applications with “bittorrent” (not case-sensitive) in the name.
As you select the applications for your filter, they appear in the Application Group field on the right. You can edit the list in this field by deleting individual items or by clicking the eraser to delete all items. The image below shows several applications in the
Application Group field. The selected applications are also marked with a green checkmark icon in the application list on the left side.
When finished selecting the applications to include, you can type in a name for the object in the Match Object Name field (first, clear the
Auto-generate match object name checkbox) and click the
Save Application Match Object button. You will see the object name listed on the Firewall > Match Objects page with an object type of
Application List. This object can then be selected when creating an App Rules policy.
Match Objects created using the Auto-generate match object name option display a tilde (~) as the first character of the object name.
The Category tab provides a list of application categories for selection. You can select any combination of categories and then save your selections as a category filter object with a custom name. The image below shows the screen with the description of the IM category displayed.
You can hover your mouse pointer over each category in the list to see a description of it. To create a custom category filter object, simply type in a name for the object in the Match Object Name field (first, clear the
Auto-generate match object name checkbox), select one or more categories, and click the
Save Category Match Object button. You will see the object name listed on the Firewall > Match Objects page with an object type of
Application Category List. This object can then be selected when creating an App Rules policy.
Match Objects created using the Auto-generate match object name option display a tilde (~) as the first character of the object name.
A number of BWM action options are also available in the predefined, default action list. The BWM action options change depending on the Bandwidth Management Type setting on the
Firewall Settings > BWM page. If the
Bandwidth Management Type is set to Global, all eight priorities are selectable. If the
Bandwidth Management Type is set to
Advanced, no priorities are selectable, but the predefined priorities are available when adding a policy.
See Table 47 for descriptions of these action types.