app-id
- rules can be created for specific apps not just ports
app-id traffic identification
app-id identification technologies
application signatures
-database of signatures that is regularly updated
unknown protocol decoder
-heuristics engine that attempts to identify apps based on network behaviour
known protocol decoder
-decoders that understand the syntax and commands of common apps
protocol decryption
-ssl/tls decryption
app-id operation
application shifts
-since security policy rules are examined for every packet, firewall can detect protocol changes within a session
application dependencies
-when creating a security policy to allow an app you must also allow its’ dependencies
application filters
app groups
-static admin defined set of apps that can be used to define a single policy for all of them
application block page
updating app-id
content-id
security profiles
available security profiles
vulnerability protection security profiles
antivirus security profiles
anti spyware security profiles
file blocking security profiles
file blocking actions
data filtering security profiles
- useful for data loss prevention ex. credit card number
denial of service protection
- mitigates layer 3 and 4 attacks designed to disrupt network operation