Special Considerations for Application Detection
SFTP
In order to detect SFTP traffic, the same rule must also detect SSH.
Squid
The system positively identifies Squid server traffic when either:
-
the system detects a connection from a host on your monitored network to a Squid server where proxy authentication is enabled, or
-
the system detects a connection from a Squid proxy server on your monitored network to a target system (that is, the destination server where the client is requesting information or another resource).
However, the system cannot identify Squid service traffic if:
-
a host on your monitored network connects to a Squid server where proxy authentication is disabled, or
-
the Squid proxy server is configured to strip Via: header fields from its HTTP responses
SSL Application Detection
The system provides application detectors that can use session information from a Secure Socket Layers (SSL) session to identify the application protocol, client application, or web application in the session.
When the system detects an encrypted connection, it marks that
connection as either a generic HTTPS connection or as a more specific secure
protocol, such as SMTPS, when applicable. When the system detects an SSL
session, it adds
SSL client
to the
Client field in connection events for the session.
If it identifies a web application for the session, the system generates
discovery events for the traffic.
For SSL application traffic, managed devices can also detect the
common name from the server certificate and match that against a client or web
application from an SSL host pattern. When the system identifies a specific
client, it replaces
SSL client
with the name of the client.
Because the SSL application traffic is encrypted, the system can use only information in the certificate for identification, not application data within the encrypted stream. For this reason, SSL host patterns can sometimes only identify the company that authored the application, so SSL applications produced by the same company may have the same identification.
In some instances, such as when an HTTPS session is launched from within an HTTP session, managed devices detect the server name from the client certificate in a client-side packet.
To enable SSL application identification, you must create access
control rules that monitor responder traffic. Those rules must have either an
application condition for the SSL application or URL conditions using the URL
from the SSL certificate. For network discovery, the responder IP address does
not have to be in the networks to monitor in the network discovery policy; the
access control policy configuration determines whether the traffic is
identified. To identify detections for SSL applications, you can filter by the
SSL protocol
tag, in the application detectors list or
when adding application conditions in access control rules.
Referred Web Applications
Web servers sometimes refer traffic to other websites, which are often advertisement servers. To help you better understand the context for referred traffic occurring on your network, the system lists the web application that referred the traffic in the Web Application field in events for the referred session. The VDB contains a list of known referred sites. When the system detects traffic from one of those sites, the referring site is stored with the event for that traffic. For example, if an advertisement accessed via Facebook is actually hosted on Advertising.com, the detected Advertising.com traffic is associated with the Facebook web application. The system can also detect referring URLs in HTTP traffic, such as when a website provides a simple link to another site; in this case, the referring URL appears in the HTTP Referrer event field.
In events, if a referring application exists, it is listed as the web application for the traffic, while the URL is that for the referred site. In the example above, the web application for the connection event for that traffic would be Facebook, but the URL would be Advertising.com. A referred application may appear as the web application if no referring web application is detected, if the host refers to itself, or if there is a chain of referrals. In the dashboard, connection and byte counts for web applications include sessions where the web application is associated with traffic referred by that application.
Note that if you create a rule to act specifically on referred traffic, you should add a condition for the referred application, rather than the referring application. To block Advertising.com traffic referred from Facebook, for example, add an application condition to your access control rule for the Advertising.com application.