#6 fortigate firewall how-to - application control

9,414 views

Published on

This new appointment with Fortinet FortiGate How-To series, is dedicated to Application Control, a functionality that allows you to better manage your security rules and
intercepting applications running over ports normally used by permitted protocols. Stay with us!

Published in: Technology
0 Comments
3 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
9,414
On SlideShare
0
From Embeds
0
Number of Embeds
611
Actions
Shares
0
Downloads
222
Comments
0
Likes
3
Embeds 0
No embeds

No notes for slide

#6 fortigate firewall how-to - application control

  1. 1. FORTIGATE FIREWALL HOW TO APPLICATION CONTROL www.ipmax.it
  2. 2. INTRODUCTION The first UTM functionality we will show you is Application Control. This feature lets you to identify the application flowing on your network, not only considering TCP or UDP ports, but also the signature unique to that protocol or service. This functionality will also allow you to better manage your security rules and intercepting applications running over ports normally used by permitted protocols. Lastly, Application Control will allow you to introduce you other UTM features like Antivirus, Antispyware and more. So, lets start.
  3. 3. CONFIGURING APPLICATION CONTROL Application Control and all other UTM features are based on Security Profiles. Security Profiles are rules used to activate and manage advanced inspection features. To enable the Application Control, we need to configure an application sensor, a selection of applications to monitor. Go to Security Profiles > Application Control > Application Sensors and click on the plus button, this will start the creation of a new application sensor. A new window requesting the sensor name will appear: fill the name field and click on the OK button to proceed.
  4. 4. CONFIGURING APPLICATION CONTROL CONTINUED Click on the “Create New” button and add a new application filter. The application filter is where you select which application to include in your service profile and the action you want to execute.
  5. 5. CONFIGURING APPLICATION CONTROL CONTINUED As you could see, here we can select which application to include. You could use “Filter Based” selection (according to category, popularity, Risk and so on) or manually select them.
  6. 6. CONFIGURING APPLICATION CONTROL CONTINUED Because we are trying to monitor applications on our network, we select all applications and specify the Monitor action at the bottom of the page. In case you want to block an application, click on Block. Click OK in order to save our configuration. The last configuration needed is to apply our security profile to a pre-existing traffic policy. Go to Policy > Policy > Policy and edit your policy. At the end of the policy configuration page we have the Security Profiles menu: enable the Application Control and select the just configured Security Profile.
  7. 7. MORE NEEDS? See hints on www.ipmax.it Or email us your questions to info_ipmax@ipmax.it
  8. 8. IPMAX IPMAX is a Fortinet Partner in Italy. IPMAX is the ideal partner for companies seeking quality in products and services. IPMAX guarantees method and professionalism to support its customers in selecting technologies with the best quality / price ratio, in the design, installation, commissioning and operation. IPMAX srl Via Ponchielli, 4 20063 Cernusco sul Naviglio (MI) – Italy +39 02 9290 9171

×