Application Control Flashcards
Does Application Control use proxy-based scans?
No, it uses flow-based and IP engine to match patterns of the application.
What evasive techniques do P2P apps use to evade firewalls?
Port randomization, pinholes, and changing encryption patterns.
Is the application control database the same as the IPS database?
No
What are unknown applications in the Application Control profile?
Apps that don’t match an application control signature.
What can cause decreased performance when using application control?
When an app is unknown it is logged, if you have many unknown apps you get frequent logs and decreased performance.
What is QUIC?
It is a protocol from Google that uses UDP instead of TCP for web access.
What does allowing QUIC do?
FTG inspects Google Chrome Packets for a QUIC header and logs.
What does Blocking QUIC do?
FTG blocks QUIC and forces Google Chrome to use HTTP2/TLS1.2. By default it is blocked
In what order does FTG apply Application order
1 application and filter overriders
2. categories
What comes first Web filtering or Application Control?
Application Control then web filtering. Note that web filtering may block something permitted by the application control.
Do you need Deep-inspection to do application control
Yes, if you want to identify apps that are encrypted.
When using NGFW policy-based mode for Application control, what must be configured?
Consolidated Authentication and SSL inspection policy and SNAT
What happens when you configure URL Categories within the same security police as application control?
Application control only scans applications in browser-based technology category.
Describe the process of NGFW Policy-based application filtering
Step one traffic is allowed while forwarding packets to IPS engine. (may_dirty) flag set
Step two: IPS identifies session and may update session table with either (dirty or app_valid) flag and App ID
Step three FortiOS kernels relooks up policy using L4 and L7 info. Applies action
What are the two types of Traffic shaping policies?
Shared Shaper
Per-IP Shaper