A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
Reyad789
Highly Voted 1 year, 1 month agohcir
Highly Voted 1 year, 1 month agoThunnu
1 year, 1 month agoDjeep12345
1 year, 1 month agoDatITGuyTho1337
1 year, 1 month agoThunnu
1 year, 1 month agohcir
1 year, 1 month agoTeachTrooper
Most Recent 2 months, 3 weeks agoYohinar
6 months agoBbb78
6 months, 1 week ago362c603
6 months, 4 weeks agoDatITGuyTho1337
6 months, 2 weeks agoredgi0
8 months, 1 week ago0d2fdfa
11 months, 1 week agoPacketsDownRange99
1 year agoVenomX51
1 year agoJustWondering
1 year agoDatITGuyTho1337
6 months, 2 weeks agotonykolo
1 year agorhinogkn24
1 year, 1 month agorhinogkn24
1 year, 1 month agok3rnelpanicpj
1 year, 1 month ago