Fortinet black logo

Administration Guide

Application Control

Application Control

Select an application control profile from the tree menu to edit the profile details. Click Apply to apply any changes to the profile.

Name

The profile name.

Comment

Optionally, enter a description of the profile.

Categories

Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.

Application Overrides

Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.

Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Filter Overrides

Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.

Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Deep Inspection of Cloud Applications

Select to enable deep inspections of cloud applications.

Allow and Log DNS Traffic

Select to allow and log DNS traffic.

Replacement Messages for HTTP-based Applications

Select to enable replacement messages for HTTP based applications.

Logging of Other Applications

Select to enable the logging of other applications.

Logging of Unknown Applications

Select to enable the logging of unknown applications.

Advanced Options

Configure advanced options:

  • p2p-block-list: Select from bittorent, edonkey, and skype.
  • replacemsg-group: Select an option from the dropdown list.

Application Control

Select an application control profile from the tree menu to edit the profile details. Click Apply to apply any changes to the profile.

Name

The profile name.

Comment

Optionally, enter a description of the profile.

Categories

Select the action to take for each of the available categories: Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset.

Application Overrides

Click Add Signatures to add application override signatures to the table. The signatures list can be filtered to simplify adding them.

Right-click on a signature to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Filter Overrides

Click Add Filter to add filter overrides to the table. The filters list can be searched and filtered to simplify adding them.

Right-click on an override to change the action (Allow, Monitor, Block, Traffic Shaping, Quarantine, or Reset).

Deep Inspection of Cloud Applications

Select to enable deep inspections of cloud applications.

Allow and Log DNS Traffic

Select to allow and log DNS traffic.

Replacement Messages for HTTP-based Applications

Select to enable replacement messages for HTTP based applications.

Logging of Other Applications

Select to enable the logging of other applications.

Logging of Unknown Applications

Select to enable the logging of unknown applications.

Advanced Options

Configure advanced options:

  • p2p-block-list: Select from bittorent, edonkey, and skype.
  • replacemsg-group: Select an option from the dropdown list.