Monitoring and blocking P2P traffic | Cookbook (2024)

In this recipe, you will use Application Control to monitor application traffic on your network and then selectively block unwanted traffic. Peer-to-peer (P2P) traffic is blocked in this example.

Monitoring and blocking P2P traffic | Cookbook (1)

1. Enabling Application Control and Multiple Security Profiles

Go to System > Feature Select and ensure that Application Control and Multiple Security Profiles are enabled.

Monitoring and blocking P2P traffic | Cookbook (2)

2. Using the default Application Control profile to monitor network traffic

The default Application Control profile is set to monitor all applications except for Unknown pplications. You will use this profile to monitor traffic and identify any applications that should be blocked.

Go to Security Profiles > Application Control and view the default profile.

Confirm that all Categories are set to Monitor with the exception of Unknown Applications.

Monitoring and blocking P2P traffic | Cookbook (3)

3. Editing the security policy for outgoing traffic

Go to Policy & Objects > IPv4 Policy and edit the policy that allows connections from the internal network to the Internet.

Under Security Profiles, turn on Application Control and use the default profile.

To inspect all traffic, SSH inspection must be set to deep-inspection profile. Using the deep-inspection profile may cause certificate errors. See Preventing certificate warnings for more information.

Monitoring and blocking P2P traffic | Cookbook (4)

4. Reviewing the FortiView dashboards

Go to FortiView > Applications and select the now view to display network traffic flowing through your FortiGate listed by application.

You can see P2P traffic occurring in your network.

Monitoring and blocking P2P traffic | Cookbook (5)

Double-click any application to view drilldown information, including traffic sources, traffic destinations, and information about individual sessions.

Monitoring and blocking P2P traffic | Cookbook (6)

5. Creating an application profile to block P2P applications

In step 4, Application Control detected traffic from BitTorrent, a P2P downloading application. In this step, you create an Application Control profile to block all P2P applications.

Go to Security Profiles > Application Control and create a new profile.

Set the P2P category to Block.

Monitoring and blocking P2P traffic | Cookbook (7)

6. Adding the blocking profile to a security policy

Go to Policy & Objects > IPv4 Policy and edit the policy that allows connections from the internal network to the Internet.

Set Application Control to use the new profile.

Monitoring and blocking P2P traffic | Cookbook (8)

7. Results

Attempt to visit the BitTorrent site. A FortiGuard warning message will appear, stating that the application was blocked. Application Control uses flow-based inspection; if you apply an additional security profile to your traffic that is proxy-based, the connection will simply timeout rather than display the warning message.

Monitoring and blocking P2P traffic | Cookbook (9)

Test the P2P blocking by attempting to use the BitTorrent application. Traffic blocked.

To view information about the blocked traffic, go to FortiView > Applications, select the 5 minutes view, and filter the traffic by Security Action: Blocked.

Monitoring and blocking P2P traffic | Cookbook (10)

For further reading, check out Application control in the FortiOS 5.4 Handbook.

Monitoring and blocking P2P traffic | Cookbook (2024)
Top Articles
Restricted Keys Gold Coast | What Is A Restricted Key?
I shipped an package and it got broken in the mail am I still responsible for the package and who pa
Use Copilot in Microsoft Teams meetings
Dte Outage Map Woodhaven
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Nfr Daysheet
7543460065
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Back to basics: Understanding the carburetor and fixing it yourself - Hagerty Media
Jscc Jweb
Indiana Immediate Care.webpay.md
10 Free Employee Handbook Templates in Word & ClickUp
سریال رویای شیرین جوانی قسمت 338
Dirt Removal in Burnet, TX ~ Instant Upfront Pricing
Jayah And Kimora Phone Number
Craigslist Mt Pleasant Sc
Golden Abyss - Chapter 5 - Lunar_Angel
Labby Memorial Funeral Homes Leesville Obituaries
Zoe Mintz Adam Duritz
Google Doodle Baseball 76
CVS Near Me | Columbus, NE
Sea To Dallas Google Flights
Parc Soleil Drowning
Gotcha Rva 2022
Craigslist Roseburg Oregon Free Stuff
Dark Entreaty Ffxiv
Weldmotor Vehicle.com
Copper Pint Chaska
Afni Collections
Horses For Sale In Tn Craigslist
Infinite Campus Asd20
Dailymotion
Craigslistodessa
Kamzz Llc
Mercedes W204 Belt Diagram
Account Now Login In
The Rise of "t33n leaks": Understanding the Impact and Implications - The Digital Weekly
Petsmart Distribution Center Jobs
404-459-1280
The 50 Best Albums of 2023
The Transformation Of Vanessa Ray From Childhood To Blue Bloods - Looper
Infinite Campus Farmingdale
2132815089
Coroner Photos Timothy Treadwell
Dickdrainersx Jessica Marie
Embry Riddle Prescott Academic Calendar
Headlining Hip Hopper Crossword Clue
Dlnet Deltanet
18 Seriously Good Camping Meals (healthy, easy, minimal prep! )
The Plug Las Vegas Dispensary
Edict Of Force Poe
Latest Posts
Article information

Author: Merrill Bechtelar CPA

Last Updated:

Views: 6173

Rating: 5 / 5 (50 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Merrill Bechtelar CPA

Birthday: 1996-05-19

Address: Apt. 114 873 White Lodge, Libbyfurt, CA 93006

Phone: +5983010455207

Job: Legacy Representative

Hobby: Blacksmithing, Urban exploration, Sudoku, Slacklining, Creative writing, Community, Letterboxing

Introduction: My name is Merrill Bechtelar CPA, I am a clean, agreeable, glorious, magnificent, witty, enchanting, comfortable person who loves writing and wants to share my knowledge and understanding with you.