{"id":75,"date":"2022-04-02T21:21:00","date_gmt":"2022-04-03T01:21:00","guid":{"rendered":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/chapter\/chapter-2-1-application-profile\/"},"modified":"2025-12-11T14:19:44","modified_gmt":"2025-12-11T19:19:44","slug":"application-profile","status":"publish","type":"chapter","link":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/chapter\/application-profile\/","title":{"raw":"2.2 Application Profile","rendered":"2.2 Application Profile"},"content":{"raw":"<div class=\"textbox textbox--learning-objectives\"><header class=\"textbox__header\">\r\n<p class=\"textbox__title\">Learning Objectives<\/p>\r\n\r\n<\/header>\r\n<div class=\"textbox__content\">\r\n<ul>\r\n \t<li>Work with application profile in FortiGate<\/li>\r\n \t<li>Create a Traffic Shaper<\/li>\r\n \t<li>Apply Traffic Shaping to the traffic<\/li>\r\n<\/ul>\r\n<\/div>\r\n<\/div>\r\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: Application control uses IPS protocol decoders that can analyze network traffic to detect application traffic, even if the traffic uses non-standard ports or protocols. We are going to block social networks in the first example and then we are going to set Traffic Shaper for the local PCs in the second example. Finally, we will try to verify the connection speed in both PCs in the local network and compare them together.<\/div>\r\n<h2>Working with Application Profile<\/h2>\r\n<ol>\r\n \t<li>Go to <strong>Policy &amp; Objects<\/strong> &gt; <strong>Firewall Policy<\/strong> section, select <strong>LocalToInternet<\/strong> policy you have created in the previous section. Click on Edit.<\/li>\r\n \t<li>Go to <strong>Security Profile section<\/strong> &gt; <strong>Application Control<\/strong>.\r\n<ul>\r\n \t<li>Create a new Application Control<\/li>\r\n \t<li>Name: <strong>Ban-SocialNetwork<\/strong><\/li>\r\n \t<li>In Categories <strong>Block<\/strong> Social Media, Video\/Audio<\/li>\r\n<\/ul>\r\n[caption id=\"attachment_58\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-58\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071.jpg\" alt=\"Block Social Media, Video\/Audio\" width=\"500\" height=\"460\" \/> Figure 2.17: Block Social.Media and Video\/Audio[\/caption]\r\n\r\nFor Application and Filter Overrides. Because a filter override is configured to block applications that use excessive bandwidth, it will block all applications using excessive bandwidth, regardless of categories that allow these applications.<\/li>\r\n \t<li>In <strong>Application and Filter overrides<\/strong> &gt; <strong>Create a new<\/strong>.\r\n<ol>\r\n \t<li>Select <strong>Application<\/strong><\/li>\r\n \t<li>Action: <strong>Block<\/strong><\/li>\r\n \t<li>Application: <strong>YouTube<\/strong><\/li>\r\n<\/ol>\r\n[caption id=\"attachment_59\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-59\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074.jpg\" alt=\"Blocking YouTube\" width=\"500\" height=\"399\" \/> Figure 2.18: Block YouTube[\/caption]<\/li>\r\n \t<li>In <strong>Application and Filter overrides<\/strong> &gt; <strong>Create a new<\/strong>.\r\n<ol>\r\n \t<li>Select <strong>Application<\/strong><\/li>\r\n \t<li>Action: <strong>Block<\/strong><\/li>\r\n \t<li>Application: <strong>Facebook_Chat<\/strong><\/li>\r\n<\/ol>\r\n[caption id=\"attachment_60\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-60\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079.jpg\" alt=\"Blocking Facebook\" width=\"500\" height=\"400\" \/> Figure 2.19: Block Facebook[\/caption]<\/li>\r\n \t<li><strong>OK<\/strong> all and now open the browser and go to <strong>Twitter.com<\/strong> or <strong>YouTube.com<\/strong> and try to search for a video and you should receive an application block page.\r\n\r\n[caption id=\"attachment_61\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-61\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078.jpg\" alt=\"Application Control Blocked Page\" width=\"500\" height=\"391\" \/> Figure 2.20: Application Control Blocked page[\/caption]<\/li>\r\n \t<li>Go to <strong>Log &amp; Report<\/strong> &gt; <strong>Application Control<\/strong> and try to find the logs related to the previous step.\r\n\r\n[caption id=\"attachment_62\" align=\"alignnone\" width=\"1194\"]<img class=\"wp-image-62 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080.jpg\" alt=\"Application Control Logs\" width=\"1194\" height=\"717\" \/> Figure 2.21: Application Control logs[\/caption]<\/li>\r\n<\/ol>\r\n<h2>Part 2:Working with Application Profile<\/h2>\r\n[caption id=\"attachment_74\" align=\"aligncenter\" width=\"1090\"]<img class=\"wp-image-63 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081.jpg\" alt=\"main scenario\" width=\"1090\" height=\"535\" \/> Figure 2.22: Main scenario[\/caption]\r\n\r\n<div class=\"level4\">\r\n<table class=\"aligncenter\" style=\"border-collapse: collapse;width: 100%\" border=\"0\"><caption>Table 2.3: Devices Configuration<\/caption>\r\n<tbody>\r\n<tr style=\"height: 18px\">\r\n<th style=\"width: 17.8558%;height: 18px\" scope=\"col\">Device<\/th>\r\n<th style=\"width: 48.8108%;height: 18px\" scope=\"col\">Configuration<\/th>\r\n<\/tr>\r\n<tr style=\"height: 18px\">\r\n<td style=\"width: 17.8558%;height: 18px\">FortiGate<\/td>\r\n<td style=\"width: 48.8108%;height: 18px\"><span style=\"background-color: #ffff00\">Port 2: 192.168.1.1 , DHCP Server (192.168.1.20 - 192.168.1.30)<\/span>\r\n\r\nPort 3: DHCP Client<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px\">\r\n<td style=\"width: 17.8558%;height: 18px\">WebTerm1<\/td>\r\n<td style=\"width: 48.8108%;height: 18px\">DHCP Client<\/td>\r\n<\/tr>\r\n<tr style=\"height: 18px\">\r\n<td style=\"width: 17.8558%;height: 18px\">WebTerm3<\/td>\r\n<td style=\"width: 48.8108%;height: 18px\">DHCP Client<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<ol>\r\n \t<li>Remove the application control you have set for policies in the previous step.<\/li>\r\n \t<li>Add Ethernet Switch and <strong>WebTerm3 <\/strong>to your GNS3. WebTerm3 should receive an IP address from DHCP.\r\n\r\n[caption id=\"attachment_74\" align=\"aligncenter\" width=\"1281\"]<img class=\"wp-image-64 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084.jpg\" alt=\"Verify DHCP address in WebTerm3\" width=\"1281\" height=\"994\" \/> Figure 2.23: Verify DHCP address in WebTerm3[\/caption]<\/li>\r\n \t<li>Set traffic shaping for WebTerm3 to save the bandwidth.\r\n<ul>\r\n \t<li>Create an Address object for WebTerm3<em>. <\/em>Go to <strong>Addresses<\/strong> &gt; <strong>Create a new Address<\/strong> with the following information:<\/li>\r\n<\/ul>\r\n<table class=\"standard aligncenter\" style=\"width: 100%\"><caption>Table 2.4: Create a new Address for WebTerm3<\/caption>\r\n<tbody>\r\n<tr>\r\n<th scope=\"col\">Field<\/th>\r\n<th scope=\"col\">Value<\/th>\r\n<\/tr>\r\n<tr>\r\n<td>Name<\/td>\r\n<td>WebTerm3<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Type<\/td>\r\n<td>Subnet<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Subnet\/IP Range<\/td>\r\n<td>192.168.1.21\/32 (Check your IP in WebTerm3)<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Interface<\/td>\r\n<td>any<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n[caption id=\"attachment_65\" align=\"aligncenter\" width=\"450\"]<img class=\"wp-image-65\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086.jpg\" alt=\"WebTerm3 IP Address\" width=\"450\" height=\"251\" \/> Figure 2.24: WebTerm3 IP address[\/caption]<\/li>\r\n \t<li>Go to <strong>Policy &amp; Objects<\/strong> &gt; <strong>Traffic Shapers<\/strong> and create a new Per-IP traffic shaper. Shared affects upload speed while Per-IP affects download and upload speed.\r\n<table class=\"aligncenter\" style=\"width: 100%\"><caption>Table 2.5: Traffic Shaper Configuration<\/caption>\r\n<tbody>\r\n<tr>\r\n<th style=\"width: 264.987px\" scope=\"col\">Field<\/th>\r\n<th style=\"width: 231.012px\" scope=\"col\">Value<\/th>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 264.987px\">Type<\/td>\r\n<td style=\"width: 231.012px\">Per-IP<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 264.987px\">Name<\/td>\r\n<td style=\"width: 231.012px\">WebTerm3<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 264.987px\">Max Bandwidth<\/td>\r\n<td style=\"width: 231.012px\">10000<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"width: 264.987px\">Max Concurrent Connections<\/td>\r\n<td style=\"width: 231.012px\">5000<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n[caption id=\"attachment_66\" align=\"aligncenter\" width=\"917\"]<img class=\"wp-image-66\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085.jpg\" alt=\"Set Traffic Shaping\" width=\"917\" height=\"634\" \/> Figure 2.25: Set traffic shaping[\/caption]<\/li>\r\n \t<li>Go to <strong>Policy &amp; Objects &gt; Traffic Shaping Policy <\/strong>and create a new Policy.\r\n<table class=\"aligncenter\" style=\"width: 100%\"><caption>Table 2.6: Traffic Shaping Policy Configuration<\/caption>\r\n<tbody>\r\n<tr>\r\n<th scope=\"col\">Field<\/th>\r\n<th scope=\"col\">Value<\/th>\r\n<\/tr>\r\n<tr>\r\n<td>Source<\/td>\r\n<td>WebTerm3<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Destination<\/td>\r\n<td>ALL<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Service<\/td>\r\n<td>ALL<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Outgoing interface<\/td>\r\n<td>Port3<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>Per-IP Shaper<\/td>\r\n<td>WebTerm3<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n[caption id=\"attachment_67\" align=\"aligncenter\" width=\"500\"]<img class=\"wp-image-67\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087.jpg\" alt=\"Set traffic shaping policy\" width=\"500\" height=\"492\" \/> Figure 2.26: Set traffic shaping policy[\/caption]<\/li>\r\n \t<li>To verify open the browser in the WebTerm3 and go to <strong>Fast.com<\/strong>.\r\n\r\n[caption id=\"attachment_68\" align=\"aligncenter\" width=\"350\"]<img class=\"wp-image-68\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088.jpg\" alt=\"WebTerm3 speed test\" width=\"350\" height=\"301\" \/> Figure 2.27: WebTerm3 speed test[\/caption]<\/li>\r\n \t<li>Now, open the browser in WebTerm1 and go to <strong>Fast.com.<\/strong>\r\n\r\n[caption id=\"\" align=\"aligncenter\" width=\"400\"]<img src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00089.jpg\" alt=\"WebTerm1 speed test\" width=\"400\" height=\"344\" \/> Figure 2.28: WebTerm1 speed test[\/caption]<\/li>\r\n \t<li>We are going to allow only twitter Applications in WebTerm3. Other applications should be blocked. To do:\r\n<ol>\r\n \t<li>Add a new Policy from port2 to port3.\r\n\r\n[caption id=\"attachment_74\" align=\"aligncenter\" width=\"1162\"]<img class=\"wp-image-70 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092.jpg\" alt=\"Add a new Policy from port2 to port3\" width=\"1162\" height=\"790\" \/> Figure 2.29: Set Firewall Policy[\/caption]<\/li>\r\n \t<li>Add and Application Control and Block all applications except Twitter. Then, assign the WebTerm3 profile to Application Control.\r\n\r\n[caption id=\"attachment_1111\" align=\"aligncenter\" width=\"696\"]<img class=\"wp-image-1111 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1.png\" alt=\"\" width=\"696\" height=\"574\" \/> Figure 2.30:<span style=\"background-color: #ffff00\"> WebTerm3 Application Control Settings<\/span>[\/caption]\r\n\r\n[caption id=\"attachment_74\" align=\"aligncenter\" width=\"588\"]<img class=\"wp-image-72 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094.jpg\" alt=\"Set Application Control\" width=\"588\" height=\"589\" \/> Figure 2.31: Set Application Control[\/caption]<\/li>\r\n \t<li>Then, put the policy you have created above LocalToInternet Policy.\r\n\r\n[caption id=\"attachment_74\" align=\"aligncenter\" width=\"982\"]<img class=\"wp-image-73 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097.jpg\" alt=\"Priority of Policies\" width=\"982\" height=\"333\" \/> Figure 2.32: Priority of policies[\/caption]<\/li>\r\n \t<li><span style=\"background-color: #ffff00\">Verify in WebTerm1, you should be able to reach only twitter<\/span>.\r\n\r\n[caption id=\"attachment_1112\" align=\"aligncenter\" width=\"732\"]<img class=\"wp-image-1112\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836.png\" alt=\"\" width=\"732\" height=\"559\" \/> Figure 2.33: verify twitter.com or x.com is reachable.[\/caption]<\/li>\r\n<\/ol>\r\n<\/li>\r\n<\/ol>","rendered":"<div class=\"textbox textbox--learning-objectives\">\n<header class=\"textbox__header\">\n<p class=\"textbox__title\">Learning Objectives<\/p>\n<\/header>\n<div class=\"textbox__content\">\n<ul>\n<li>Work with application profile in FortiGate<\/li>\n<li>Create a Traffic Shaper<\/li>\n<li>Apply Traffic Shaping to the traffic<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<div class=\"textbox shaded\"><strong>Scenario<\/strong>: Application control uses IPS protocol decoders that can analyze network traffic to detect application traffic, even if the traffic uses non-standard ports or protocols. We are going to block social networks in the first example and then we are going to set Traffic Shaper for the local PCs in the second example. Finally, we will try to verify the connection speed in both PCs in the local network and compare them together.<\/div>\n<h2>Working with Application Profile<\/h2>\n<ol>\n<li>Go to <strong>Policy &amp; Objects<\/strong> &gt; <strong>Firewall Policy<\/strong> section, select <strong>LocalToInternet<\/strong> policy you have created in the previous section. Click on Edit.<\/li>\n<li>Go to <strong>Security Profile section<\/strong> &gt; <strong>Application Control<\/strong>.\n<ul>\n<li>Create a new Application Control<\/li>\n<li>Name: <strong>Ban-SocialNetwork<\/strong><\/li>\n<li>In Categories <strong>Block<\/strong> Social Media, Video\/Audio<\/li>\n<\/ul>\n<figure id=\"attachment_58\" aria-describedby=\"caption-attachment-58\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-58\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071.jpg\" alt=\"Block Social Media, Video\/Audio\" width=\"500\" height=\"460\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071.jpg 714w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071-300x276.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071-65x60.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071-225x207.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/03\/ScreenShot00071-350x322.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-58\" class=\"wp-caption-text\">Figure 2.17: Block Social.Media and Video\/Audio<\/figcaption><\/figure>\n<p>For Application and Filter Overrides. Because a filter override is configured to block applications that use excessive bandwidth, it will block all applications using excessive bandwidth, regardless of categories that allow these applications.<\/li>\n<li>In <strong>Application and Filter overrides<\/strong> &gt; <strong>Create a new<\/strong>.\n<ol>\n<li>Select <strong>Application<\/strong><\/li>\n<li>Action: <strong>Block<\/strong><\/li>\n<li>Application: <strong>YouTube<\/strong><\/li>\n<\/ol>\n<figure id=\"attachment_59\" aria-describedby=\"caption-attachment-59\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-59\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074.jpg\" alt=\"Blocking YouTube\" width=\"500\" height=\"399\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074.jpg 994w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074-300x239.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074-768x613.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074-65x52.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074-225x180.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00074-350x279.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-59\" class=\"wp-caption-text\">Figure 2.18: Block YouTube<\/figcaption><\/figure>\n<\/li>\n<li>In <strong>Application and Filter overrides<\/strong> &gt; <strong>Create a new<\/strong>.\n<ol>\n<li>Select <strong>Application<\/strong><\/li>\n<li>Action: <strong>Block<\/strong><\/li>\n<li>Application: <strong>Facebook_Chat<\/strong><\/li>\n<\/ol>\n<figure id=\"attachment_60\" aria-describedby=\"caption-attachment-60\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-60\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079.jpg\" alt=\"Blocking Facebook\" width=\"500\" height=\"400\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079.jpg 997w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079-300x240.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079-768x615.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079-65x52.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079-225x180.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00079-350x280.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-60\" class=\"wp-caption-text\">Figure 2.19: Block Facebook<\/figcaption><\/figure>\n<\/li>\n<li><strong>OK<\/strong> all and now open the browser and go to <strong>Twitter.com<\/strong> or <strong>YouTube.com<\/strong> and try to search for a video and you should receive an application block page.<br \/>\n<figure id=\"attachment_61\" aria-describedby=\"caption-attachment-61\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-61\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078.jpg\" alt=\"Application Control Blocked Page\" width=\"500\" height=\"391\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078.jpg 1127w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078-300x235.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078-1024x801.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078-768x601.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078-65x51.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078-225x176.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00078-350x274.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-61\" class=\"wp-caption-text\">Figure 2.20: Application Control Blocked page<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Log &amp; Report<\/strong> &gt; <strong>Application Control<\/strong> and try to find the logs related to the previous step.<br \/>\n<figure id=\"attachment_62\" aria-describedby=\"caption-attachment-62\" style=\"width: 1194px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-62 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080.jpg\" alt=\"Application Control Logs\" width=\"1194\" height=\"717\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080.jpg 1194w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080-300x180.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080-1024x615.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080-768x461.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080-65x39.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080-225x135.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00080-350x210.jpg 350w\" sizes=\"auto, (max-width: 1194px) 100vw, 1194px\" \/><figcaption id=\"caption-attachment-62\" class=\"wp-caption-text\">Figure 2.21: Application Control logs<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n<h2>Part 2:Working with Application Profile<\/h2>\n<figure id=\"attachment_74\" aria-describedby=\"caption-attachment-74\" style=\"width: 1090px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-63 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081.jpg\" alt=\"main scenario\" width=\"1090\" height=\"535\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081.jpg 1090w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081-300x147.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081-1024x503.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081-768x377.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081-65x32.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081-225x110.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00081-350x172.jpg 350w\" sizes=\"auto, (max-width: 1090px) 100vw, 1090px\" \/><figcaption id=\"caption-attachment-74\" class=\"wp-caption-text\">Figure 2.22: Main scenario<\/figcaption><\/figure>\n<div class=\"level4\">\n<table class=\"aligncenter\" style=\"border-collapse: collapse;width: 100%\">\n<caption>Table 2.3: Devices Configuration<\/caption>\n<tbody>\n<tr style=\"height: 18px\">\n<th style=\"width: 17.8558%;height: 18px\" scope=\"col\">Device<\/th>\n<th style=\"width: 48.8108%;height: 18px\" scope=\"col\">Configuration<\/th>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"width: 17.8558%;height: 18px\">FortiGate<\/td>\n<td style=\"width: 48.8108%;height: 18px\"><span style=\"background-color: #ffff00\">Port 2: 192.168.1.1 , DHCP Server (192.168.1.20 &#8211; 192.168.1.30)<\/span><\/p>\n<p>Port 3: DHCP Client<\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"width: 17.8558%;height: 18px\">WebTerm1<\/td>\n<td style=\"width: 48.8108%;height: 18px\">DHCP Client<\/td>\n<\/tr>\n<tr style=\"height: 18px\">\n<td style=\"width: 17.8558%;height: 18px\">WebTerm3<\/td>\n<td style=\"width: 48.8108%;height: 18px\">DHCP Client<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<ol>\n<li>Remove the application control you have set for policies in the previous step.<\/li>\n<li>Add Ethernet Switch and <strong>WebTerm3 <\/strong>to your GNS3. WebTerm3 should receive an IP address from DHCP.<br \/>\n<figure id=\"attachment_74\" aria-describedby=\"caption-attachment-74\" style=\"width: 1281px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-64 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084.jpg\" alt=\"Verify DHCP address in WebTerm3\" width=\"1281\" height=\"994\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084.jpg 1281w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084-300x233.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084-1024x795.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084-768x596.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084-65x50.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084-225x175.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00084-350x272.jpg 350w\" sizes=\"auto, (max-width: 1281px) 100vw, 1281px\" \/><figcaption id=\"caption-attachment-74\" class=\"wp-caption-text\">Figure 2.23: Verify DHCP address in WebTerm3<\/figcaption><\/figure>\n<\/li>\n<li>Set traffic shaping for WebTerm3 to save the bandwidth.\n<ul>\n<li>Create an Address object for WebTerm3<em>. <\/em>Go to <strong>Addresses<\/strong> &gt; <strong>Create a new Address<\/strong> with the following information:<\/li>\n<\/ul>\n<table class=\"standard aligncenter\" style=\"width: 100%\">\n<caption>Table 2.4: Create a new Address for WebTerm3<\/caption>\n<tbody>\n<tr>\n<th scope=\"col\">Field<\/th>\n<th scope=\"col\">Value<\/th>\n<\/tr>\n<tr>\n<td>Name<\/td>\n<td>WebTerm3<\/td>\n<\/tr>\n<tr>\n<td>Type<\/td>\n<td>Subnet<\/td>\n<\/tr>\n<tr>\n<td>Subnet\/IP Range<\/td>\n<td>192.168.1.21\/32 (Check your IP in WebTerm3)<\/td>\n<\/tr>\n<tr>\n<td>Interface<\/td>\n<td>any<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_65\" aria-describedby=\"caption-attachment-65\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-65\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086.jpg\" alt=\"WebTerm3 IP Address\" width=\"450\" height=\"251\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086.jpg 680w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086-300x168.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086-65x36.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086-225x126.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00086-350x196.jpg 350w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><figcaption id=\"caption-attachment-65\" class=\"wp-caption-text\">Figure 2.24: WebTerm3 IP address<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Policy &amp; Objects<\/strong> &gt; <strong>Traffic Shapers<\/strong> and create a new Per-IP traffic shaper. Shared affects upload speed while Per-IP affects download and upload speed.<br \/>\n<table class=\"aligncenter\" style=\"width: 100%\">\n<caption>Table 2.5: Traffic Shaper Configuration<\/caption>\n<tbody>\n<tr>\n<th style=\"width: 264.987px\" scope=\"col\">Field<\/th>\n<th style=\"width: 231.012px\" scope=\"col\">Value<\/th>\n<\/tr>\n<tr>\n<td style=\"width: 264.987px\">Type<\/td>\n<td style=\"width: 231.012px\">Per-IP<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 264.987px\">Name<\/td>\n<td style=\"width: 231.012px\">WebTerm3<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 264.987px\">Max Bandwidth<\/td>\n<td style=\"width: 231.012px\">10000<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 264.987px\">Max Concurrent Connections<\/td>\n<td style=\"width: 231.012px\">5000<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_66\" aria-describedby=\"caption-attachment-66\" style=\"width: 917px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-66\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085.jpg\" alt=\"Set Traffic Shaping\" width=\"917\" height=\"634\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085.jpg 917w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085-300x207.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085-768x531.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085-65x45.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085-225x156.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00085-350x242.jpg 350w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/><figcaption id=\"caption-attachment-66\" class=\"wp-caption-text\">Figure 2.25: Set traffic shaping<\/figcaption><\/figure>\n<\/li>\n<li>Go to <strong>Policy &amp; Objects &gt; Traffic Shaping Policy <\/strong>and create a new Policy.<br \/>\n<table class=\"aligncenter\" style=\"width: 100%\">\n<caption>Table 2.6: Traffic Shaping Policy Configuration<\/caption>\n<tbody>\n<tr>\n<th scope=\"col\">Field<\/th>\n<th scope=\"col\">Value<\/th>\n<\/tr>\n<tr>\n<td>Source<\/td>\n<td>WebTerm3<\/td>\n<\/tr>\n<tr>\n<td>Destination<\/td>\n<td>ALL<\/td>\n<\/tr>\n<tr>\n<td>Service<\/td>\n<td>ALL<\/td>\n<\/tr>\n<tr>\n<td>Outgoing interface<\/td>\n<td>Port3<\/td>\n<\/tr>\n<tr>\n<td>Per-IP Shaper<\/td>\n<td>WebTerm3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<figure id=\"attachment_67\" aria-describedby=\"caption-attachment-67\" style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-67\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087.jpg\" alt=\"Set traffic shaping policy\" width=\"500\" height=\"492\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087.jpg 766w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087-300x295.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087-65x64.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087-225x221.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00087-350x345.jpg 350w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><figcaption id=\"caption-attachment-67\" class=\"wp-caption-text\">Figure 2.26: Set traffic shaping policy<\/figcaption><\/figure>\n<\/li>\n<li>To verify open the browser in the WebTerm3 and go to <strong>Fast.com<\/strong>.<br \/>\n<figure id=\"attachment_68\" aria-describedby=\"caption-attachment-68\" style=\"width: 350px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-68\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088.jpg\" alt=\"WebTerm3 speed test\" width=\"350\" height=\"301\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088.jpg 1066w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088-300x258.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088-1024x882.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088-768x661.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088-65x56.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088-225x194.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00088-350x301.jpg 350w\" sizes=\"auto, (max-width: 350px) 100vw, 350px\" \/><figcaption id=\"caption-attachment-68\" class=\"wp-caption-text\">Figure 2.27: WebTerm3 speed test<\/figcaption><\/figure>\n<\/li>\n<li>Now, open the browser in WebTerm1 and go to <strong>Fast.com.<\/strong><br \/>\n<figure style=\"width: 400px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00089.jpg\" alt=\"WebTerm1 speed test\" width=\"400\" height=\"344\" \/><figcaption class=\"wp-caption-text\">Figure 2.28: WebTerm1 speed test<\/figcaption><\/figure>\n<\/li>\n<li>We are going to allow only twitter Applications in WebTerm3. Other applications should be blocked. To do:\n<ol>\n<li>Add a new Policy from port2 to port3.<br \/>\n<figure id=\"attachment_74\" aria-describedby=\"caption-attachment-74\" style=\"width: 1162px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-70 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092.jpg\" alt=\"Add a new Policy from port2 to port3\" width=\"1162\" height=\"790\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092.jpg 1162w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092-300x204.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092-1024x696.jpg 1024w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092-768x522.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092-65x44.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092-225x153.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00092-350x238.jpg 350w\" sizes=\"auto, (max-width: 1162px) 100vw, 1162px\" \/><figcaption id=\"caption-attachment-74\" class=\"wp-caption-text\">Figure 2.29: Set Firewall Policy<\/figcaption><\/figure>\n<\/li>\n<li>Add and Application Control and Block all applications except Twitter. Then, assign the WebTerm3 profile to Application Control.<br \/>\n<figure id=\"attachment_1111\" aria-describedby=\"caption-attachment-1111\" style=\"width: 696px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1111 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1.png\" alt=\"\" width=\"696\" height=\"574\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1.png 696w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1-300x247.png 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1-65x54.png 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1-225x186.png 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113508-1-350x289.png 350w\" sizes=\"auto, (max-width: 696px) 100vw, 696px\" \/><figcaption id=\"caption-attachment-1111\" class=\"wp-caption-text\">Figure 2.30:<span style=\"background-color: #ffff00\"> WebTerm3 Application Control Settings<\/span><\/figcaption><\/figure>\n<figure id=\"attachment_74\" aria-describedby=\"caption-attachment-74\" style=\"width: 588px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-72 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094.jpg\" alt=\"Set Application Control\" width=\"588\" height=\"589\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094.jpg 588w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094-300x300.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094-150x150.jpg 150w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094-65x65.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094-225x225.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00094-350x351.jpg 350w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><figcaption id=\"caption-attachment-74\" class=\"wp-caption-text\">Figure 2.31: Set Application Control<\/figcaption><\/figure>\n<\/li>\n<li>Then, put the policy you have created above LocalToInternet Policy.<br \/>\n<figure id=\"attachment_74\" aria-describedby=\"caption-attachment-74\" style=\"width: 982px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-73 size-full\" src=\"https:\/\/pressbooks.bccampus.ca\/htalebi\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097.jpg\" alt=\"Priority of Policies\" width=\"982\" height=\"333\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097.jpg 982w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097-300x102.jpg 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097-768x260.jpg 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097-65x22.jpg 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097-225x76.jpg 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/06\/ScreenShot00097-350x119.jpg 350w\" sizes=\"auto, (max-width: 982px) 100vw, 982px\" \/><figcaption id=\"caption-attachment-74\" class=\"wp-caption-text\">Figure 2.32: Priority of policies<\/figcaption><\/figure>\n<\/li>\n<li><span style=\"background-color: #ffff00\">Verify in WebTerm1, you should be able to reach only twitter<\/span>.<br \/>\n<figure id=\"attachment_1112\" aria-describedby=\"caption-attachment-1112\" style=\"width: 732px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1112\" src=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836.png\" alt=\"\" width=\"732\" height=\"559\" srcset=\"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836.png 945w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836-300x229.png 300w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836-768x587.png 768w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836-65x50.png 65w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836-225x172.png 225w, https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-content\/uploads\/sites\/1702\/2022\/04\/Screenshot-2025-11-25-113836-350x267.png 350w\" sizes=\"auto, (max-width: 732px) 100vw, 732px\" \/><figcaption id=\"caption-attachment-1112\" class=\"wp-caption-text\">Figure 2.33: verify twitter.com or x.com is reachable.<\/figcaption><\/figure>\n<\/li>\n<\/ol>\n<\/li>\n<\/ol>\n","protected":false},"author":1562,"menu_order":10,"template":"","meta":{"pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-75","chapter","type-chapter","status-publish","hentry"],"part":39,"_links":{"self":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/75","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/users\/1562"}],"version-history":[{"count":25,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/75\/revisions"}],"predecessor-version":[{"id":1149,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/75\/revisions\/1149"}],"part":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/parts\/39"}],"metadata":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapters\/75\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/media?parent=75"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/pressbooks\/v2\/chapter-type?post=75"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/contributor?post=75"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/pressbooks.bccampus.ca\/fortigatefirewall\/wp-json\/wp\/v2\/license?post=75"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}