A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
Reyad789
Highly Voted 1 year, 3 months agohcir
Highly Voted 1 year, 3 months agoThunnu
1 year, 3 months agoDjeep12345
1 year, 3 months agoDatITGuyTho1337
1 year, 3 months agoThunnu
1 year, 2 months agohcir
1 year, 3 months agoTeachTrooper
Most Recent 4 months, 2 weeks agoYohinar
7 months, 4 weeks agoBbb78
8 months ago362c603
8 months, 3 weeks agoDatITGuyTho1337
8 months, 1 week agoredgi0
10 months ago0d2fdfa
1 year, 1 month agoPacketsDownRange99
1 year, 2 months agoVenomX51
1 year, 2 months agoJustWondering
1 year, 2 months agoDatITGuyTho1337
8 months, 1 week agotonykolo
1 year, 2 months agorhinogkn24
1 year, 2 months agorhinogkn24
1 year, 2 months agok3rnelpanicpj
1 year, 3 months ago