Hello guys, I'm a newbie in IT field.
I'm currently trying to setup policy on a FortiGate100E to block the use of Line PC client.
>>FortiOS v7.2.4 build1396(Feature)
Now I successfully block Line usage, but regarding the subject, I want to know if it's possiable to block file transmission on Line PC client without affecting text and voice messages.
I've tried to dissecting packets and setting app signatures, but can't made any progress.
Thanks for any reply and possible assistance.
Solved! Go to Solution.
Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi,
Blocking the file transfer feature in the Line PC client while retaining other functions can be challenging because it requires identifying and controlling specific aspects of Line's communication protocol. Line uses a variety of ports and protocols for different functionalities, and blocking file transfers while allowing text and voice messages might involve granular control.
Identify File Transfer Ports and Protocols:
Create Separate Firewall Policies:
Use Application Control:
It's important to note that the effectiveness of these measures may depend on the specific details of Line's protocol and how it handles different types of communication. Additionally, any configuration changes should be made with caution and should align with your organization's network usage policies.
Hi,
Blocking the file transfer feature in the Line PC client while retaining other functions can be challenging because it requires identifying and controlling specific aspects of Line's communication protocol. Line uses a variety of ports and protocols for different functionalities, and blocking file transfers while allowing text and voice messages might involve granular control.
Identify File Transfer Ports and Protocols:
Create Separate Firewall Policies:
Use Application Control:
It's important to note that the effectiveness of these measures may depend on the specific details of Line's protocol and how it handles different types of communication. Additionally, any configuration changes should be made with caution and should align with your organization's network usage policies.
Thank you very much for detailed explanation of my question, it has been very beneficial to me.
It seems I've oversimplified things, and I now evaluating other control measures to achieve the goals.
Anyway, thanks again!
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1517 | |
1013 | |
749 | |
443 | |
209 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.