This discussion has been locked.
You can no longer post new replies to this discussion. If you have a question you can start a new discussion

Micro app discovery breaks firewall rules

I've been told that in order for application filter rules to work, Micro app discovery has to be enabled. Unfortunately, when it is enabled other things break.

I have created IP groups from all LAN hosts. I want some of them to be immune to any firewall processing so I created a rule on top:

 

 

to allow any traffic from these groups. But when micro app discovery is enabled, the rule is not followed, and secure traffic is simplify blocked. For instance my Amazon Echo devices go offline and my heat pump can't report status to the cloud.

Can someone help? The way it is now makes app policy useless.



This thread was automatically locked due to age.
Parents
  • Im in same position. Brand new firewall for a client and nothing but issues from day one. Have created a basic firewall rule with no Web/Malware Content scanning, Web Policy, Application Control, SSL inspection or traffic filter and yet every time the launch a browser they get this SSL cert error despite not even using Cloudflare dns.

     

    Now being told to disable microapp-discovery but what will that break in the future if we wish have App Control and why is it on by default?? Customer is about to kick it out the network.

Reply
  • Im in same position. Brand new firewall for a client and nothing but issues from day one. Have created a basic firewall rule with no Web/Malware Content scanning, Web Policy, Application Control, SSL inspection or traffic filter and yet every time the launch a browser they get this SSL cert error despite not even using Cloudflare dns.

     

    Now being told to disable microapp-discovery but what will that break in the future if we wish have App Control and why is it on by default?? Customer is about to kick it out the network.

Children