Fortinet Document Library

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:

Version:


Table of Contents

Administration Guide

Application control restricted administrator

Application control sensors specify what action to take with network traffic generated by a large number of applications.

Custom signatures for application control
To create a custom signature for Application Control:
  1. Log on as a Restricted Administrator.
  2. Go to Application Control > Custom Signatures.
  3. Click Create New. The Create New Custom Application Signature screen appears.

  4. Specify the values for the following and click OK.
    • Name - specify a name for the custom signature.
    • Signature - add a custom signature.
    • Comment - toggle the status to ON.
Application control profiles
To create a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the toolbar, click Create New.
  4. Configure the profile settings, and click OK.
Tooltip

To clone an existing profile, right-click the profile in the content pane, and select Clone.

To edit a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the content pane select a profile, and take one of the following actions:
    • In the toolbar, click Edit.
    • Right-click the profile, and select Edit.
  4. Edit the settings, and click OK.

    Name

    The profile name.

    Comment

    Optionally, enter a description of the profile.

    Categories

    Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.

    Application Overrides

    Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.

    Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

    Filter Overrides

    Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.

    Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

    Deep Inspection of Cloud Applications

    Select to enable deep inspections of cloud applications.

    Allow and Log DNS Traffic

    Select to allow and log DNS traffic.

    Replacement Messages for HTTP-based Applications

    Select to enable replacement messages for HTTP based applications.

    Logging of Other Applications

    Select to enable the logging of other applications.

    Logging of Unknown Applications

    Select to enable the logging of unknown applications.

    Advanced Options

    Configure advanced options:

    • p2p-block-list: Select from bittorent, edonkey, and skype.
    • replacemsg-group: Select an option from the dropdown list.
To view where a profile is being used:
  1. Log in as a restricted administrator.
  2. In the tree menu, select Profiles.
  3. In the content pane, select a profile from the list, and click Where Used in the More dropdown menu.
    The dialog window displays the ADOM and policy package/block where the package is currently being used.
  4. (Optional) Select a policy in the list, and click View to display the policy details.

Application control restricted administrator

Application control sensors specify what action to take with network traffic generated by a large number of applications.

Custom signatures for application control
To create a custom signature for Application Control:
  1. Log on as a Restricted Administrator.
  2. Go to Application Control > Custom Signatures.
  3. Click Create New. The Create New Custom Application Signature screen appears.

  4. Specify the values for the following and click OK.
    • Name - specify a name for the custom signature.
    • Signature - add a custom signature.
    • Comment - toggle the status to ON.
Application control profiles
To create a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the toolbar, click Create New.
  4. Configure the profile settings, and click OK.
Tooltip

To clone an existing profile, right-click the profile in the content pane, and select Clone.

To edit a profile:
  1. Log in as a Restricted Administrator.
  2. In the tree menu, select Application Control, and then select a profile category.
  3. In the content pane select a profile, and take one of the following actions:
    • In the toolbar, click Edit.
    • Right-click the profile, and select Edit.
  4. Edit the settings, and click OK.

    Name

    The profile name.

    Comment

    Optionally, enter a description of the profile.

    Categories

    Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.

    Application Overrides

    Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.

    Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

    Filter Overrides

    Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.

    Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

    Deep Inspection of Cloud Applications

    Select to enable deep inspections of cloud applications.

    Allow and Log DNS Traffic

    Select to allow and log DNS traffic.

    Replacement Messages for HTTP-based Applications

    Select to enable replacement messages for HTTP based applications.

    Logging of Other Applications

    Select to enable the logging of other applications.

    Logging of Unknown Applications

    Select to enable the logging of unknown applications.

    Advanced Options

    Configure advanced options:

    • p2p-block-list: Select from bittorent, edonkey, and skype.
    • replacemsg-group: Select an option from the dropdown list.
To view where a profile is being used:
  1. Log in as a restricted administrator.
  2. In the tree menu, select Profiles.
  3. In the content pane, select a profile from the list, and click Where Used in the More dropdown menu.
    The dialog window displays the ADOM and policy package/block where the package is currently being used.
  4. (Optional) Select a policy in the list, and click View to display the policy details.