Fortinet white logo
Fortinet white logo

Administration Guide

Application Control

Application Control

Application control sensors specify what action to take with network traffic generated by a large number of applications.

To create a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the toolbar, click Create New.
  4. Configure the profile settings, and click OK.
Tooltip

To clone an existing profile, right-click the profile in the content pane, and select Clone.

To edit a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the content pane select a profile, and take one of the following actions:
    • In the toolbar, click Edit.
    • Right-click the profile, and select Edit.
  4. Edit the settings, and click OK.

Name

The profile name.

Comment

Optionally, enter a description of the profile.

Categories

Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.

Application Overrides

Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.

Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Filter Overrides

Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.

Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Deep Inspection of Cloud Applications

Select to enable deep inspections of cloud applications.

Allow and Log DNS Traffic

Select to allow and log DNS traffic.

Replacement Messages for HTTP-based Applications

Select to enable replacement messages for HTTP based applications.

Logging of Other Applications

Select to enable the logging of other applications.

Logging of Unknown Applications

Select to enable the logging of unknown applications.

Advanced Options

Configure advanced options:

  • p2p-block-list: Select from bittorent, edonkey, and skype.
  • replacemsg-group: Select an option from the dropdown list.

Application Control

Application Control

Application control sensors specify what action to take with network traffic generated by a large number of applications.

To create a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the toolbar, click Create New.
  4. Configure the profile settings, and click OK.
Tooltip

To clone an existing profile, right-click the profile in the content pane, and select Clone.

To edit a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the content pane select a profile, and take one of the following actions:
    • In the toolbar, click Edit.
    • Right-click the profile, and select Edit.
  4. Edit the settings, and click OK.

Name

The profile name.

Comment

Optionally, enter a description of the profile.

Categories

Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.

Application Overrides

Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.

Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Filter Overrides

Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.

Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Deep Inspection of Cloud Applications

Select to enable deep inspections of cloud applications.

Allow and Log DNS Traffic

Select to allow and log DNS traffic.

Replacement Messages for HTTP-based Applications

Select to enable replacement messages for HTTP based applications.

Logging of Other Applications

Select to enable the logging of other applications.

Logging of Unknown Applications

Select to enable the logging of unknown applications.

Advanced Options

Configure advanced options:

  • p2p-block-list: Select from bittorent, edonkey, and skype.
  • replacemsg-group: Select an option from the dropdown list.