Dynamic App Control not working as expected

Hi,

in v17 Beta 2 I tried to do the following:

- All HTTP traffic should be filtered via Web Protection

- One Application (e.g. Brave Browser) should have direct access without proxy

 

Therefor I configured the following:

- Rule 1: Allow HTTP/HTTPS from LAN to WAN for Brave Browser (discovered by synchronized app control)

- Rule 2: Allow HTTP/HTTPS from LAN to WAN with content scanning "Scan HTTP" and Web Policy to block certain URLs

 

What I see:

- All HTTP traffic matches the first rule (Brave Browser, Firefox Browser, Chrome Browser)

 

Cheers

auda

- But in the Synchronized Application Control Pane the "Occurances"-Counter for the different Browsers rise as expected

 

Is this a bug or a wrong configuration or a misunderstanding of the Synchronized Application Control feature?

Parents Reply Children
  • It couldn't have worked before v17, as synchronized app control is a new feature of v17.

    And yes I want to make sure that HTTP traffic from the brave application gets through without proxy (rule id 4). All other HTTP traffic from all other applications should be inspected by the web proxy (rule id 5).

     

    Cheers,

    auda

  • On the last picture that you posted for allow brave application filter, modify it and add deny http application and see if that works.

  • Hi Billybob,

     

    no, that doesn't help. I tried to block HTTP and the firefox application as well, but this leads to a timeout in firefox browser instead of browsing via the web proxy.

    I get the impression, that the main problem is that I can't have an application filter with default action "Deny" as you mentioned. So the whole application control architecture seems to be build for blocking some well-known applications and not for allowing some well-known applications while blocking all others.

    If thats true, it's the same messy logic as in UTM.

    So I think the only solution would be to have a default "deny" action in an application filter or even better to be able to select applications the same way as services in a policy rule. But this would imply to have a logical 'not' for object definitions (to define a object "all applications but this one")

     

    Cheers

    auda

  • Hey @auda,

     

    What you are trying to archive isn't covered by Synchronized App Control, but by the Proxy/Firewall itself.

     

    Synchronized App Control won't control traffic for browsing the web since this is done by the proxy.

    Tto keep it short: If the endpoint tells to SAC that the detected application categorized as Browser or Browser Plugin, SAC won't touch it. That's completely up to the proxy.

    But what we do touch is if an application that isn't categorized browser but contains a WebView (a so called browser based application) and therefore opens some connections to the web.

  • You will need to create your own application filter with deny  and allow groups even though the name and description will show allow in fact it does deny traffic.

    If you wish I will take screenshots of the one I built to test this process. I had to modify it because I found apple update is classed as unwanted applications.

    Ian

    XG115W - v20.0.2 MR-2 - Home

    XG on VM 8 - v21 GA

    If a post solves your question please use the 'Verify Answer' button.

  • I got a hint from my local Sophos engineer. Sadly it is not possible, because the application is not a matching criteria for the policy rule. If the rule matches on IP addresses, ports and user, it is executed on a first match basis. So my rule id 5 will never get processed.

     

    auda