- Access exclusive content
- Connect with peers
- Share your expertise
- Find support resources
12-13-2022 09:56 AM
Hello Livecommunity. We are in a bind. We have numerous students on our school networks that are bypassing security profile rules with VPNs. So frustrating. I do have rulesets that look for annnomizers and proxies. I also have explicit rules that look for categories such as Facebook, Snapchat, etc... Not sure what to do. I worry that the more rules I setup in the firewall, the more work it has to do and gets sluggish? Am I right? I did see something about disabling 'QUIC" which I can but want this firewall to be optimized and working very well.
Any suggestions (even mean ones) appreciated.
Best,
Jean-Claude
12-13-2022 10:06 AM
Firewall don't see into QUIC traffic so it is best practice to block it.
Block URL category proxy-avoidance-and-anonymizers
In addition create application filter for subcategory "encrypted-tunnel" (Objects > Application Filters) and block it for students.
Place this block rule after you have permitted outgoing SSL application.
12-13-2022 10:13 AM
Thanks @Radio_Rattameister, will try tonight.
11-21-2023 01:23 PM
I hope you found a solution to the problem.
11-22-2023 08:49 AM
Hi,
so if the users are applying VPN's why dont you create a rule for lets say 'zone class B' that is not allow to do traffic the traffic that you saw?
do the rule based on layer 4 tcp/udp port number
Click Accept as Solution to acknowledge that the answer to your question has been provided.
The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!
These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!
The LIVEcommunity thanks you for your participation!