Application Content Control - D-Link NetDefendOS User Manual

Network security firewall
Hide thumbs Also See for NetDefendOS:
Table of Contents

Advertisement

Application Content Control

So far, application control has been described in terms of targeting specific applications such as
BitTorrent or Facebook™. However, NetDefendOS allows a further level of filtering within
application control where the content of targeted applications decide if the traffic will be
allowed, blocked or just logged. This feature is called Application Content Control.
Note: Application Content Control is not CLI configurable
The ability to configure application content control is not available in the CLI. Only the
Web Interface can be used to configure this feature.
Application content control is configured on application rule objects within an application rule
set. Application content control can be used to target specific content within a targeted
application. Facebook™ provides a good example of how this can be applied. The rule can target
Facebook and then application content can be used to target types of Facebook content such as
specific games, applications, chat or messages.
If there are multiple IP policies in a rule set that are using deep content control, then all policies
may need to perform the same filtering since a higher policy in the rule set might trigger before a
lower one. For example, if only the Chrome browser is being allowed, all IP policies using
application content control should test if the HTTP user-agent is Chrome.
Example 3.41. Application Content Control
This example shows how only the Chrome and Firefox browsers only will be allowed by an
application rule using application content control.
Associating the application rule set created together with an IP policy will not be included in the
example but follows the same steps shown in the previous example.
Web Interface
First, define the Application Rule Set:
1.
Go to: Policies > Firewalling > Application Rule Sets > Add > Application Rule Set
2.
Specify a suitable name for the list, in this case browser_list
3.
Set the Default Action to Allow
4.
Click OK
Next, define an Application Rule in this rule set:
1.
Go to: Policies > Firewalling > Application Rule Sets > browser_list > Add > Application
Rule
2.
Select Allow for the Action
3.
Under Application Filter press Select filter.
4.
In the Search field enter http
5.
Select Matches specific applications
259
Chapter 3: Fundamentals

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents