A firewall engineer has determined that, in an application developed by the company’s internal team, sessions often remain idle for hours before the client and server exchange any data. The application is also currently identified as unknown-tcp by the firewalls. It is determined that because of a high level of trust, the application does not require to be scanned for threats, but it needs to be properly identified in Traffic logs for reporting purposes.
Which solution will take the least time to implement and will ensure the App-ID engine is used to identify the application?
Reyad789
Highly Voted 10 months, 3 weeks agohcir
Highly Voted 10 months, 4 weeks agoThunnu
10 months, 3 weeks agoDjeep12345
10 months, 3 weeks agoDatITGuyTho1337
10 months, 3 weeks agoThunnu
10 months, 3 weeks agohcir
10 months, 3 weeks agoTeachTrooper
Most Recent 1 week, 2 days agoYohinar
3 months, 2 weeks agoBbb78
3 months, 3 weeks ago362c603
4 months, 1 week agoDatITGuyTho1337
4 months agoredgi0
5 months, 3 weeks ago0d2fdfa
8 months, 3 weeks agoPacketsDownRange99
10 months agoVenomX51
10 months agoJustWondering
10 months, 1 week agoDatITGuyTho1337
4 months agotonykolo
10 months, 1 week agorhinogkn24
10 months, 3 weeks agorhinogkn24
10 months, 3 weeks agok3rnelpanicpj
10 months, 3 weeks ago