Troubleshoot Application Control

WatchGuard recommends you enable Application Control for policies that handle outbound traffic from your network. You do not need to enable Application Control on policies for Branch Office VPNs to trusted sites, or for traffic between trusted hosts on your internal network.

When you configure the Application Control action, be very specific about which applications you choose to block. If you block by category, you may unintentionally block applications that you need for your network.

Application Control and WebBlocker

If you configure an HTTP or HTTPS-proxy policy with both WebBlocker and Application Control enabled, both services will apply to each connection. If WebBlocker allows a site but Application Control denies it, the site will be denied.

Application Control may not correctly identify HTTPS applications unless you enable content inspection in the HTTPS-proxy action.

Common Application Control Problems

These are common types of problems you might encounter with Application Control, and the solutions that most often resolve these problems.

Application Control Log Messages

If a user cannot use an application, you can review the log messages in Traffic Monitor to troubleshoot. You can use the log messages to identify the policy and Application Control action that blocked the application.

For information about how to view log messages in Fireware Web UI, go to Traffic Monitor Web. For more information about how to view log messages in WatchGuard Cloud, go to Monitor Traffic on Fireboxes and FireClusters.

In a log message, you can view these details to troubleshoot:

  • Event Time: The time the user tried to use the application.
  • Action: The Deny or Allow action taken by the Firebox.
  • Source IP: The IP address of the source that tried to connect to the application.
  • Destination IP: The IP address of the application the user tried to connect to.
  • Application Name: The name of the application the user tried to connect to.
  • Firewall Policy: The name of the Firewall policy that handled the traffic.
  • Application Category Name: The category of the application the user tried to connect to.
  • Application Control Action: The name of the Application Control action that applied to the traffic.

Example:

2024-03-04 11:21:16 Deny 10.0.1.2 104.244.42.193 Twitter 52043443 Internal External Application identified 557128(Outgoing)proc_id="firewall"rc="101"msg_id="3000-0149"src_ip_nat="10.0.3.0"tcp_info="offset 5 A 3436610192 win 516"app_name="Twitter"app_cat_name="Social networks"app_id="10"app_cat_id="25"app_beh_name="Access"app_beh_id="6"action="App Control Test"geo_dst="USA"sig_vers="18.303"
2024-03-04 11:21:16 Deny 10.0.1.2 104.244.42.193 Twitter 52044443 Internal External Application identified 639128(Outgoing)proc_id="firewall"rc="101"msg_id="3000-0149"src_ip_nat="10.0.3.0"tcp_info="offset 5 A 3929390091 win 516"app_name="Twitter"app_cat_name="Social networks"app_id="10"app_cat_id="25"app_beh_name="Access"app_beh_id="6"action="App Control Test"geo_dst="USA"sig_vers="18.303"
2024-03-04 11:21:16 Deny 10.0.1.2 104.244.42.193 Twitter 52046443 Internal External Application identified 557128(Outgoing)proc_id="firewall"rc="101"msg_id="3000-0149"src_ip_nat="10.0.3.0"tcp_info="offset 5 A 2339242078 win 516"app_name="Twitter"app_cat_name="Social networks"app_id="10"app_cat_id="25"app_beh_name="Access"app_beh_id="6"action="App Control Test"geo_dst="USA"sig_vers="18.303"
2024-03-04 11:21:16 Deny 10.0.1.2 104.244.42.193 Twitter 52047443 Internal External Application identified 639128(Outgoing)proc_id="firewall"rc="101"msg_id="3000-0149"src_ip_nat="10.0.3.0"tcp_info="offset 5 A 4191371602 win 516"app_name="Twitter"app_cat_name="Social networks"app_id="10"app_cat_id="25"app_beh_name="Access"app_beh_id="6"action="App Control Test"geo_dst="USA"sig_vers="18.303"
2024-03-04 11:21:16 Deny 10.0.1.2 104.244.42.193 Twitter 52049443 Internal External Application identified 607128(Outgoing)proc_id="firewall"rc="101"msg_id="3000-0149"src_ip_nat="10.0.3.0"tcp_info="offset 5 A 2500534288 win 800"app_name="Twitter"app_cat_name="Social networks"app_id="10"app_cat_id="25"app_beh_name="Access"app_beh_id="6"action="App Control Test"geo_dst="USA"sig_vers="18.303"
2024-03-04 11:21:16 Deny 10.0.1.2 104.244.42.193 Twitter 52048443 Internal External Application identified 575128(Outgoing)proc_id="firewall"rc="101"msg_id="3000-0149"src_ip_nat="10.0.3.0"tcp_info="offset 5 A 2765614535 win 800"app_name="Twitter"app_cat_name="Social networks"app_id="10"app_cat_id="25"app_beh_name="Access"app_beh_id="6"action="App Control Test"geo_dst="USA"sig_vers="18.303"

In this example:

  • Event Time: 2024-03-04 11:21:1
  • Action: Deny
  • Source IP: 10.0.1.2
  • Destination IP: 104.244.42.193
  • Application Name: Twitter
  • Firewall Policy: Outgoing
  • Application Category Name: Social networks
  • Application Control Action: App Control Test

Related Topics

About Security Services Precedence (Total Security Suite)

Configure Application Control Actions

Get Information About Applications

Enable Application Control in a Policy

Monitor Application Control