Application content control – Amer Networks E5Web GUI User Manual
Page 212

2.
Specify a suitable name for the list, in this case bt_app_list
3.
Select Application Control
4.
In the dialog:
•
Set Enable Application Control to Yes
•
Set the Application Rule Set to bt_app_list
•
Click OK to close the dialog
5.
Click OK
Note: BitTorrent should include uTP
As seen in the above example, when application control is configured to target
BitTorrent, the two signatures bittorrent and utp should both be selected.
Application Content Control
So far, application control has been described in terms of targeting specific applications such as
BitTorrent or Facebook™. However, cOS Core allows a further level of filtering within application
control where the content of targeted applications decide if the traffic will be allowed, blocked
or just logged. This feature is called Application Content Control.
Note: Application Content Control is not configurable with the
CLI
The ability to configure application content control is not available in the CLI. Only the
Web Interface or InControl can be used to configure this feature.
Application content control is configured on application rule objects within an application rule
set. Application content control can be used to target specific content within a targeted
application. Facebook™ provides a good example of how this can be applied. The rule can target
Facebook and then application content can be used to target types of Facebook content such as
specific games, applications, chat or messages.
If there are multiple IP policies in a rule set that are using deep content control, then all policies
may need to perform the same filtering since a higher policy in the rule set might trigger before a
lower one. For example, if only the Chrome browser is being allowed, all IP policies using
application content control should test if the HTTP user-agent is Chrome.
Example 3.28. Application Content Control
This example shows how only the Chrome and Firefox browsers only will be allowed by an
application rule using application content control.
Associating the application rule set created together with an IP policy will not be included in the
example but follows the same steps shown in the previous example.
Chapter 3: Fundamentals
212