Nominating a forum post submits a request to create a new Knowledge Article based on the forum post topic. Please ensure your nomination includes a solution within the reply.
Hi @Aml_Nabil ,
You can create a firewall policy to deny all traffic to destination port UDP 443 coming from the subnets where those iPhones connect from. That solution anyway would block traffic to port UDP 443 for all devices on that specific subnets, including iPhones.
Best regards,
I block QUIC port that make all iPhone devices can not use their application because when they use this applications they took QUIC ,
how I stop iPhone devices from taking the QUIC port ?
Hi @Aml_Nabil ,
My understanding is that you want to force the iPhones to avoid using the destination port UDP 443. If you block the traffic on destination port UDP 443, the application cannot use that port, so you achieve your goal.
If the application is not able to function properly without using port UDP 443, that is an application problem I guess.
Best regards,
I cant control that from application ,right ?
If I have understood correctly what you are trying to achieve, you cannot control that through application control UTM. What is the name of that iPhone application?
YouTube and safari and what application
Hi Aml_Nabil,
Good day!
To block QUIC using the firewall policy by creating a custom firewall service for UDP ports 80 and 443, then configuring a firewall policy with the custom service and setting the action to "Deny."
Please have this KB for reference: https://community.fortinet.com/t5/FortiGate/Technical-Tip-How-to-block-disable-QUIC/ta-p/191273
Regards,
thanks for you
Select Forum Responses to become Knowledge Articles!
Select the “Nominate to Knowledge Base” button to recommend a forum post to become a knowledge article.
User | Count |
---|---|
1705 | |
1093 | |
752 | |
446 | |
230 |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2024 Fortinet, Inc. All Rights Reserved.