How To Block HTTP Downloads or Uploads of Specific File Extensions Using App Rules
How To Block HTTP Downloads or Uploads of Specific File Extensions Using App Rules
com/support/knowledge-base/how-to-block-http-downloads-or-uploads-of-specific-file-extensions-using-app-rules/170503921808804/
The SonicWall can block downloads for any File Extension going over HTTP, FTP, and other unencrypted
Protocols. This is performed using the App Rules Feature as demonstrated below.
CAUTION: By default the SonicWall cannot block File Extensions over HTTPS or other Encrypted
Protocols. This is because the SonicWall cannot examine encrypted payloads, to get around this DPI-SSL is
required as a Feature on the SonicWall.
2. Click on Object | Match Objects | Match Objects3. and click on "Add4. ".
8. Add all File Extensions that you would like to block (".ZIP", ".RAR" and ".EXE" in this example).
1. Navigate to Policy | Rules and Policies | App Rules 2. and click on "Add3. ". Enter a Friendly Name
under "Policy Name4. ".
5. Set Policy Type to "HTTP Client, SMTP Client, FTP Client, or POP3 Client" 6. depending on which
Protocol you're attempting to block. Specify Source 7. or Destination Address8. if needed, Any will apply
to all traffic.
TIP: It's possible to block a wide range or Protocols depending on the Policy Type. Custom Policies are
Protocol neutral and block by Match Object.
1. Set "Match Object2. " to the one that you've already created.
TIP: Users/Groups provide a powerful way to exclude or include only specific Users in the App Rules
Policy. App Rules can make use of LDAP Groups or Local Groups.
TIP: It is possible to set additional fields, such as Schedule and Direction, to further specify when and
where a Policy should be applied.
CAUTION: Once again, App Rules cannot block HTTPS Content without DPI-SSL setup on the
SonicWall.
2. Click on MANAGE ,Navigate to Objects | Match Objects and click on "Add New Match Object".
4. Add all File Extensions that you would like to block (".ZIP", ".RAR" and ".EXE" in this example).
5. Navigate to Rules | App Rules and click on "Add New Policy". Enter a Friendly Name under "Policy
Name".
6. Set Policy Type to "HTTP Client, SMTP Client, FTP Client, or POP3 Client" depending on which
Protocol you're attempting to block. Specify Source or Destination Address if needed, Any will apply to all
traffic.
TIP: It's possible to block a wide range or Protocols depending on the Policy Type. Custom Policies are
Protocol neutral and block by Match Object.
TIP: Users/Groups provides a powerful way to exclude or include only specific Users in the App Rules
Policy. App Rules can make use of LDAP Groups or Local Groups.
TIP: It is possible to set additional fields, such as Schedule and Direction, to further specify when and
where a Policy should be applied.
CAUTION: Once again, App Rules cannot block HTTPS Content without DPI-SSL setup on the
SonicWall.
2. Navigate to Firewall | Match Objects and click on "Add New Match Object".
4. Add all File Extensions that you would like to block (".ZIP", ".RAR" and ".EXE" in this example).
5. Navigate to Firewall | App Rules and click on "Add New Policy". Enter a Friendly Name under "Policy Name
".
6. Set Policy Type to "HTTP Client, SMTP Client, FTP Client, or POP3 Client" depending on which Protocol
you're attempting to block. Specify Source or Destination Address if needed, Any will apply to all traffic.
TIP: It's possible to block a wide range or Protocols depending on the Policy Type. Custom Policies are
Protocol neutral and block by Match Object.
TIP: It is possible to set additional fields, such as Schedule and Direction, to further specify when and
where a Policy should be applied.
CAUTION: Once again, App Rules cannot block HTTPS Content without DPI-SSL setup on the
SonicWall.