Monitoring and blocking P2P traffic | Cookbook (2024)

In this recipe, you will use Application Control to monitor application traffic on your network and then selectively block unwanted traffic. Peer-to-peer (P2P) traffic is blocked in this example.

Monitoring and blocking P2P traffic | Cookbook (1)

1. Enabling Application Control and Multiple Security Profiles

Go to System > Feature Select and ensure that Application Control and Multiple Security Profiles are enabled.

Monitoring and blocking P2P traffic | Cookbook (2)

2. Using the default Application Control profile to monitor network traffic

The default Application Control profile is set to monitor all applications except for Unknown pplications. You will use this profile to monitor traffic and identify any applications that should be blocked.

Go to Security Profiles > Application Control and view the default profile.

Confirm that all Categories are set to Monitor with the exception of Unknown Applications.

Monitoring and blocking P2P traffic | Cookbook (3)

3. Editing the security policy for outgoing traffic

Go to Policy & Objects > IPv4 Policy and edit the policy that allows connections from the internal network to the Internet.

Under Security Profiles, turn on Application Control and use the default profile.

To inspect all traffic, SSH inspection must be set to deep-inspection profile. Using the deep-inspection profile may cause certificate errors. See Preventing certificate warnings for more information.

Monitoring and blocking P2P traffic | Cookbook (4)

4. Reviewing the FortiView dashboards

Go to FortiView > Applications and select the now view to display network traffic flowing through your FortiGate listed by application.

You can see P2P traffic occurring in your network.

Monitoring and blocking P2P traffic | Cookbook (5)

Double-click any application to view drilldown information, including traffic sources, traffic destinations, and information about individual sessions.

Monitoring and blocking P2P traffic | Cookbook (6)

5. Creating an application profile to block P2P applications

In step 4, Application Control detected traffic from BitTorrent, a P2P downloading application. In this step, you create an Application Control profile to block all P2P applications.

Go to Security Profiles > Application Control and create a new profile.

Set the P2P category to Block.

Monitoring and blocking P2P traffic | Cookbook (7)

6. Adding the blocking profile to a security policy

Go to Policy & Objects > IPv4 Policy and edit the policy that allows connections from the internal network to the Internet.

Set Application Control to use the new profile.

Monitoring and blocking P2P traffic | Cookbook (8)

7. Results

Attempt to visit the BitTorrent site. A FortiGuard warning message will appear, stating that the application was blocked. Application Control uses flow-based inspection; if you apply an additional security profile to your traffic that is proxy-based, the connection will simply timeout rather than display the warning message.

Monitoring and blocking P2P traffic | Cookbook (9)

Test the P2P blocking by attempting to use the BitTorrent application. Traffic blocked.

To view information about the blocked traffic, go to FortiView > Applications, select the 5 minutes view, and filter the traffic by Security Action: Blocked.

Monitoring and blocking P2P traffic | Cookbook (10)

For further reading, check out Application control in the FortiOS 5.4 Handbook.

Monitoring and blocking P2P traffic | Cookbook (2024)
Top Articles
What Is Ransomware? - Definition, Prevention & More | Proofpoint US
Difference Between RFID Blocking Cards And Sleeves
Elleypoint
Ffxiv Shelfeye Reaver
El Paso Pet Craigslist
Tesla Supercharger La Crosse Photos
The Potter Enterprise from Coudersport, Pennsylvania
Khatrimaza Movies
Cvs Devoted Catalog
Declan Mining Co Coupon
Milk And Mocha GIFs | GIFDB.com
William Spencer Funeral Home Portland Indiana
Lesson 2 Homework 4.1
FAQ: Pressure-Treated Wood
Best Suv In 2010
Tcu Jaggaer
Tnt Forum Activeboard
Craigslist In Visalia California
Nhl Tankathon Mock Draft
Transactions (zipForm Edition) | Lone Wolf | Real Estate Forms Software
Rs3 Eldritch Crossbow
‘The Boogeyman’ Review: A Minor But Effectively Nerve-Jangling Stephen King Adaptation
Dewalt vs Milwaukee: Comparing Top Power Tool Brands - EXTOL
Imouto Wa Gal Kawaii - Episode 2
Riversweeps Admin Login
Accuradio Unblocked
R/Airforcerecruits
Tinyzonehd
Encore Atlanta Cheer Competition
His Only Son Showtimes Near Marquee Cinemas - Wakefield 12
Ringcentral Background
Datingscout Wantmatures
Red Sox Starting Pitcher Tonight
Craigslist Com Humboldt
67-72 Chevy Truck Parts Craigslist
How to Play the G Chord on Guitar: A Comprehensive Guide - Breakthrough Guitar | Online Guitar Lessons
Omnistorm Necro Diablo 4
Powerspec G512
Die Filmstarts-Kritik zu The Boogeyman
Tillman Funeral Home Tallahassee
My Locker Ausd
Academy Sports New Bern Nc Coupons
Busted Newspaper Mcpherson Kansas
Courses In Touch
Mychart University Of Iowa Hospital
Noga Funeral Home Obituaries
Graduation Requirements
Gear Bicycle Sales Butler Pa
Electric Toothbrush Feature Crossword
7 Sites to Identify the Owner of a Phone Number
Lake County Fl Trash Pickup Schedule
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6173

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.