Overriding Application Visibility Settings

Deep packet inspection (DPI) is an advanced packet analysis technique, which analyzes packet and packet content headers to determine the nature of network traffic. When DPI is enabled, packets of all flows are subjected to DPI to get accurate results. DPI identifies applications (such as, Netflix, Twitter, Facebook, etc.) and extracts metadata (such as, host name, server name, TCP-RTT, etc.) for further use by the WiNG firewall.

To configure a profile‘s application visibility settings and overrides:

  1. Select Configuration > Devices from the web UI.
    The Device Configuration screen displays a list of managed devices or peer controllers, service platforms, or access points.
  2. Select Profile Overrides > Security.
  3. Select Application Visibility.
    Note

    Note

    A blue override icon (to the left of a parameter) defines the parameter as having an override applied. To remove an override go to the Basic Configuration section of the device and click Clear Overrides. This removes all overrides from the device.
  4. Refer the following Application Visibility and Control Settings:
    Enable dpi

    Enable this setting to provide deep-packet inspection. When enabled, network flows are inspected at a granular level to identify applications (such as, Netflix, Twitter, Facebook, etc.) and extract metadata (such as, host name, server name, TCP-RTT, etc.) for further use by the WiNG firewall.

    Enable Applications Logging Select this option to enable event logging for DPI application recognition. This setting is disabled by default.
    Applications Logging Level If enabling DPI application recognition event logging, set the logging level. Severity levels include Emergency, Alert, Critical, Errors, Warning, Notice, Info, and Debug. The default logging level is Notification.
    Enable Voice/Video Metadata

    Select this option to enable the metadata extraction from voice and video classified flows. The default setting is disabled.

    Enable HTTP Metadata Select this option to enable extraction of metadata from HTTP application data flows. The default setting is disabled.
    Enable SSL Metadata Select this option to enable extraction of metadata from SSL application data flows. The default setting is disabled.
    Enable TCP RTT Select this option to enable extraction of RTT information from TCP flows. The default setting is disabled.
  5. Review the Custom Applications for DPI field to select the custom applications available for this device profile.
    For information on creating custom applications and their categories, see “Application.”
  6. If you are enabling TCP-RTT metadata collection, use the App Groups for TCP RTT field to specify the application groups for which TCP-RTT metadata collection is to be enabled.
    Select the Application Groups from the drop-down menu and use the green, down arrow to move the selection to the box below. You can add a maximum of eight groups to the list.

    If the desired application group is not available, select the Create icon to define a new application group configuration or select the Edit icon to modify an existing application group. For information on creating custom application groups, see “Application.”

  7. Click OK to save the changes or overrides.
    Click Reset to revert to the last saved configuration.