- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
We want to allow MS Teams from a top Firewall Rule
We want to allow MS Teams from a top Firewall Rule and to allow other applications I want to forward the request to other Firewall rules instead of denying immediately
- Labels:
-
FortiGate
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hello!
I am not sure how you would like to achieve that in a FortiGate.
Once the policy is matched, the application control will give the verdict : either allow(monitor) or deny. There is no configurable action to pass the scanning to another policy, because this has already been matched
- Toss a 'Like' to your fixxer, oh Valley of Plenty! and chose the solution, too00oo -
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Actually I am facing a lot disconnection sometimes on MS Teams and now think that I should allow only Teams without applying any AV, IPS or other Security Profile on Firewall Rule for MS Teams.
In short I don't want to apply any Security Profile against only MS Teams application
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Understood now. Check if this App Control profile helps as TOP policy.
You can also deny MSTeams in all previous policies, and use this as a bottom policy.
(deep inspection may be required)
App control profile
- Toss a 'Like' to your fixxer, oh Valley of Plenty! and chose the solution, too00oo -
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
I would also take a look at these three links as they mention Teams dropping calls behind a FortiGate.
https://community.fortinet.com/t5/FortiGate/Technical-Tip-Microsoft-Teams-calls-dropping/ta-p/230203
Then a general common issues link one of the other links provided, links to
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You can't use app control profiles to globally restrict access to applications.
You'll probably need to use ISDB instead of app control here...
But also it might be better if you can give us more details as to what exactly you are trying to accomplish?
Graham
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You can enable Internet Service in the Top Rule with all MS-TEAMS service.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
ISDB is the best approach as long as this identifies correctly all MS.teams IPs.
- Toss a 'Like' to your fixxer, oh Valley of Plenty! and chose the solution, too00oo -
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Is this solution enough for you or do you still need help?
