Detailed instructions for use are in the User's Guide.
[. . . ] Application Control in SonicOS 5. 8
Document Scope
This document describes how to configure and manage the Application Control feature in SonicOS 5. 8. This document contains the following sections:
· · · · · ·
"Application Control Overview" on page 1 "Licensing Application Control" on page 25 "Using Application Control" on page 27 "Useful Tools" on page 50 "Use Cases" on page 57 "Glossary" on page 85
Application Control Overview
This section provides an introduction to the SonicOS 5. 8 Application Control feature. This section contains the following subsections:
· · · ·
"What is Application Control?" on page 1 "Benefits of Application Control" on page 3 "How Does Application Control Work?" on page 4 "Supported Platforms" on page 24
What is Application Control?
Application Control provides a solution for setting policy rules for application signatures. Application Control policies include global App Control policies, and App Rules policies that are more targeted. [. . . ] The next screen will vary depending on your choice here.
Step 6
In the Select <your choice> Rules for Application Control screen, select a policy rule from the choices supplied, and then click Next. Depending on your choice in the previous step, this screen is one of four possible screens:
· · · ·
Select SMTP Rules for Application Control Select POP3 Rules for Application Control Select Web Access Rules for Application Control Select FTP Rules for Application Control
Step 7
The screen displayed here will vary depending on your choice of policy rule in the previous step. For the following policy rules, the wizard displays the Set Application Control Object Keywords and Policy Direction screen on which you can select the traffic direction to scan, and the content or keywords to match.
· · · ·
All SMTP policy rule types except Specify maximum email size All POP3 policy rule types All Web Access policy rule types except Look for usage of certain web browsers and Look for usage of any web browser, except the ones specified All FTP policy types except Make all FTP access read-only and Disallow usage of SITE command
In the Set Application Control Object Keywords and Policy Direction screen, perform the following steps:
·
In the Direction drop-down list, select the traffic direction to scan from the drop-down list. Select one of Incoming, Outgoing, or Both.
38
Application Control in SonicOS 5. 8
Using Application Control
·
Do one of the following:
Note
If you selected a choice with the words except the ones specified in the previous step, content that you enter here will be the only content that does not cause the action to occur. See "Negative Matching" on page 14.
In the Content text box, type or paste a text or hexadecimal representation of the content to match,
and then click Add. Repeat until all content is added to the List text box.
To import keywords from a predefined text file that contains a list of content values, one per line,
click Load From File.
·
Click Next.
If you selected a policy type in the previous step that did not result in the Set Application Control Object Keywords and Policy Direction screen with the standard options, the wizard displays a screen that allows you to select the traffic direction, and certain other choices depending on the policy type.
· · ·
In the Direction drop-down list, select the traffic direction to scan. SMTP: In the Set Maximum Email Size screen, in the Maximum Email Size text box, enter the maximum number of bytes for an email message. Web Access: In the Application Control Object Settings screen, the Content text box has a drop-down list with a limited number of choices, and no Load From File button is available. Select a browser from the drop-down list. FTP: In the special-case Set Application Control Object Keywords and Policy Direction screen, you can only select the traffic direction to scan. Click Next.
· · Step 8
In the Application Control Action Settings screen, select the action to take when matching content is found in the specified type of network traffic, and then click Next. You will see one or more of the following choices depending on the policy type, as shown below: Policy Type All Types All Types SMTP SMTP SMTP POP3 Web Access Web Access Web Access Web Access Available Action Log Only Bypass DPI Blocking Action - block and send custom email reply Blocking Action - block without sending email reply Add Email Banner (append text at the end of email) Blocking Action - disable attachment and add custom text Blocking Action - custom block page Blocking Action - redirect to new location Blocking Action - Reset Connection Manage Bandwidth
Step 9
In the second Application Control Action Settings screen (if it is displayed), in the Content text box, type the text or URL that you want to use, and then click Next. The second Application Control Action Settings screen is only displayed when you selected an action in the previous step that requires additional text. For a Web Access policy type, if you selected an action that redirects the user, you can type the new URL into the Content text box.
Application Control
39
Using Application Control
Step 10 In the Select Name for Application Control Policy screen, in the Policy Name text box, type a
descriptive name for the policy, and then click Next.
Step 11 In the Confirm Policy Settings screen, review the displayed values for the new policy and do one of the
following:
· · ·
To create a policy using the displayed configuration values, click Apply. To change one or more of the values, click Back. To exit the wizard without creating the policy, click Cancel.
Step 12 In the Application Control Policy Complete screen, to exit the wizard, click Close.
Note
You can configure Application Control policies without using the wizard. When configuring manually, you must remember to configure all components, including match objects, actions, email address objects if required, and finally, a policy that references them.
Configuring Match Objects
This section describes how to manually create a match object. For detailed information about match object types, see "Match Objects" on page 9. To configure a match object, perform the following steps:
Step 1
In the navigation pane on the left side, click Firewall and then click Match Objects.
Step 2
In the Match Objects screen, click Add New Match Object.
40
Application Control in SonicOS 5. 8
Using Application Control
Step 3
In the Match Object Settings window, in the Object Name text box, type a descriptive name for the object.
Step 4 Step 5 Step 6 Step 7
Select an Match Object Type from the drop-down list. Your selection here will affect available options in this screen. See Table 2 on page 10 for a description of match object types. Select a Match Type from the drop-down list. [. . . ] A reverse shell exploit could be used by an attacker if he or she is successful in gaining access to your system by means of a Zero-day exploit. A Zero-day exploit refers to an attack whose signature is not yet recognized by security software. In an early stage while still unknown, malicious payloads can pass through the first line of defense which is the IPS and Gateway Anti-Virus (GAV) running at the Internet gateway, and even the second line of defense represented by the host-based Anti-Virus software, allowing arbitrary code execution on the target system. In many cases, the executed code contains the minimal amount of instructions needed for the attacker to remotely obtain a command prompt window (with the privileges of the exploited service or logged on user) and proceed with the penetration from there. [. . . ]