You must enable Application Control before you can use it. App Control and App Rules are both
enabled with global settings, and App Control must also be enabled on each network zone that you want to control.
You can configure App Control policies from the Dashboard > App Flow Monitor page by
selecting one or more applications or categories and then clicking the Create Rule button. A policy is automatically created on the Firewall > App Rules page, and can be edited just like any other policy.
You can configure Application Control global blocking or logging policies for application
categories, signatures, or specific applications on the Firewall > App Control Advanced page. Corresponding match objects are created. You can also configure match objects for these application categories, signatures, or specific applications on the Firewall > Match Objects page. The objects can be used in an App Rules policy, no matter how they were created.
You can configure policies in App Rules using the wizard or manually on the Firewall > App
Rules page. The wizard provides a safe method of configuration and helps prevent errors that could result in unnecessary blocking of network traffic. Manual configuration offers more flexibility for situations that require custom actions or policies.
The Firewall > App Rules page contains two global settings:
You must enable App Rules to activate the functionality. App Rules is licensed as part of App
Control, which is licensed on
www.mysonicwall.com
on the Service Management - Associated Products page under GATEWAY SERVICES. You can view the status of your license at the top of the Firewall > App Rules page, as shown below.
To enable App Rules and configure the global settings:
Step 2
|
To log all policy matches, leave the
Global Log Redundancy Filter
field set to zero. To enforce a delay between log entries for matches to the same policy, enter the number of seconds to delay.
|
Global log redundancy settings apply to all App Rules policies. If set to zero, a log entry is
created for each policy match found in passing traffic. Other values specify the minimum number of seconds between log entries for multiple matches to the same policy. For example, a log redundancy setting of 10 will log no more than one message every 10 seconds for each policy match. Log redundancy can also be set on a per-policy basis in the Add/Edit Policy
page where each individual policy configuration has its own log redundancy filter setting that can override the global log redundancy filter setting.
When you have created a match object, and optionally, an action or an email address object,
you are ready to create a policy that uses them. For information about configuring these, see the following sections:
For information about using the App Control Wizard to create a policy, see the
“Using the Application Control Wizard” section
.
For information about policies and policy types, see
“App Rules Policy Creation”
.
To configure an App Rules policy, perform the following steps:
Step 2
|
Below the
App Rules Policies
table, click Add New Policy
.
|
Step 3
|
In the
App Control Policies Settings
window, type a descriptive name into the Policy Name
field.
|
Step 4
|
Select a
Policy Type
from the drop-down list. Your selection here will affect available options in the window. For information about available policy types, see “App Rules Policy Creation”
.
|
Step 7
|
For
Exclusion Address
, optionally select an Address Group or Address Object from the drop-down list. This address will not be affected by the policy.
|
Step 8
|
For
Match Object
, select a match object from the drop-down list. The list contains the defined match objects that are applicable to the policy type.
|
Step 9
|
For
Action
, select an action from the drop-down list. The list contains actions that are applicable to the policy type, and can include the predefined actions, plus any customized actions. For a log-only policy, select No Action
.
|
Step 10
|
For
Users/Groups
, select from the drop-down lists for both Included
and Excluded
. The selected users or group under Excluded
will not be affected by the policy.
|
Step 11
|
If the policy type is
SMTP Client
, select from the drop-down lists for MAIL FROM
and RCPT
TO
, for both Included
and Excluded
. The selected users or group under Excluded
will not be affected by the policy.
|
Step 12
|
For
Schedule
, select from the drop-down list. The list provides a variety of schedules for the policy to be in effect.
|
Step 15
|
If the policy type is
IPS Content
, select the Log using IPS message format
checkbox to display the category in the log entry as “Intrusion Prevention” rather than “Application Control”, and to use a prefix such as “IPS Detection Alert” in the log message rather than “Application Control Alert.” This is useful if you want to use log filters to search for IPS alerts.
|
Step 16
|
If the policy type is
App Control Content
, select the Log using App Control message format
checkbox to display the category in the log entry as “Application Control”, and to use a prefix such as “Application Control Detection Alert” in the log message. This is useful if you want to use log filters to search for Application Control alerts.
|
Step 17
|
If the policy type is
CFS
, select the Log using CFS message format
checkbox to display the category in the log entry as “Network Access”, and to use a log message such as “Web site access denied” in the log message rather than no prefix. This is useful if you want to use log filters to search for content filtering alerts.
|
Step 18
|
For
Log Redundancy Filter
, you can either select Global Settings
to use the global value set on the Firewall > App Rules
page, or you can enter a number of seconds to delay between each log entry for this policy. The local setting overrides the global setting only for this policy; other policies are not affected.
|
Step 19
|
For
Connection Side
, select from the drop-down list. The available choices depend on the policy type and can include Client Side
, Server Side
, or Both
, referring to the side where the traffic originates. IPS Content
, App Control Content
, or CFS
policy types do not provide this configuration option.
|
Step 20
|
For
Direction
, click either Basic
or Advanced
and select a direction from the drop-down list. Basic
allows you to select incoming, outgoing, or both. Advanced
allows you to select between zones, such as LAN to WAN. IPS Content
, App Control Content
, or CFS
policy types do not provide this configuration option.
|
Step 21
|
If the policy type is
IPS Content
, App Control Content
, or CFS
, select a zone from the Zone
drop-down list. The policy will be applied to this zone.
|
Step 22
|
If the policy type is
CFS
, select an entry from the CFS Allow List
drop-down list. The list contains any defined CFS Allow/Forbidden List
type of match objects, and also provides None
as a selection. The domains in the selected entry will not be affected by the policy.
|
Step 23
|
If the policy type is
CFS
, select an entry from the CFS Forbidden List
drop-down list. The list contains any defined CFS Allow/Forbidden List
type of match objects, and also provides None
as a selection. The domains in the selected entry will be denied access to matching content, instead of having the defined action applied.
|
Step 24
|
If the policy type is
CFS
, select the Enable Safe Search Enforcement
checkbox to prevent safe search enforcement from being disabled on search engines such as Google, Yahoo, Bing, and others.
|
The Application Control wizard provides safe configuration of App Control policies for many
common use cases, but not for everything. If at any time during the wizard you are unable to find the options that you need, you can click Cancel and proceed using manual configuration. When configuring manually, you must remember to configure all components, including match objects, actions, email address objects if required, and finally, a policy that references them. For the manual policy creation procedure, see the “Configuring an App Rules Policy” section
.
To use the wizard to configure Application Control, perform the following steps:
Step 3
|
Select the
Application Control Wizard
radio button and then click Next
.
|
Step 4
|
In the
Application Control Wizard Introduction
screen, click Next
.
|
Step 5
|
In the
Application Control Policy Type
screen, click a selection for the policy type, and then click Next
.
|
You can choose among
SMTP
, incoming POP3
, Web Access
, or FTP
file transfer. The policy that you create will only apply to the type of traffic that you select. The next screen will vary depending on your choice here.
Step 6
|
In the
Select <your choice> Rules for Application Control
screen, select a policy rule from the choices supplied, and then click Next
.
|
Depending on your choice in the previous step, this screen is one of four possible screens:
In the
Set Application Control Object Keywords and Policy Direction
screen, perform the following steps:
|
•
|
In the
Direction
drop-down list, select the traffic direction to scan from the drop-down list. Select one of Incoming
, Outgoing
, or Both
.
|
|
–
|
In the
Content
text box, type or paste a text or hexadecimal representation of the content to match, and then click Add
. Repeat until all content is added to the List
text box.
|
If you selected a policy type in the previous step that did
not
result in the Set Application
Control Object Keywords and Policy Direction
screen with the standard options, the wizard displays a screen that allows you to select the traffic direction, and certain other choices depending on the policy type.
|
•
|
In the
Direction
drop-down list, select the traffic direction to scan.
|
|
•
|
SMTP: In the
Set Maximum Email Size
screen, in the Maximum Email Size
text box, enter the maximum number of bytes for an email message.
|
|
•
|
Web Access: In the
Application Control Object Settings
screen, the Content
text box has a drop-down list with a limited number of choices, and no Load From File
button is available. Select a browser from the drop-down list.
|
|
•
|
FTP: In the special-case
Set Application Control Object Keywords and Policy Direction
screen, you can only select the traffic direction to scan.
|
Step 8
|
In the
Application Control Action Settings
screen, select the action to take when matching content is found in the specified type of network traffic, and then click Next
.
|
You will see one or more of the following choices depending on the policy type, as shown below:
Step 9
|
In the second
Application Control Action Settings
screen (if it is displayed), in the Content
text box, type the text or URL that you want to use, and then click Next
.
|
The second
Application Control Action Settings
screen is only displayed when you selected an action in the previous step that requires additional text. For a Web Access policy type, if you selected an action that redirects the user, you can type the new URL into the Content
text box.
Step 10
|
In the
Select Name for Application Control Policy
screen, in the Policy Name
text box, type a descriptive name for the policy, and then click Next
.
|
Step 11
|
In the
Confirm Policy Settings
screen, review the displayed values for the new policy and do one of the following:
|
Step 12
|
In the
Application Control Policy Complete
screen, to exit the wizard, click Close
.
|