.. _example_service_traffic-proxy_block_appid:
######
App Id
######
This scenario shows how to configure the traffic-proxy service
to block HTTPS traffic based on ``app-id`` detection. Different
match types (``connmark``, ``vrf-connmark``) and dictionary sources
(custom CLI and XML file) are used to classify and block detected
application flows.
.. image:: block-proxy.svg
:width: 800
***************
Block By App-Id
***************
Description
===========
This example demonstrates how to configure the
``service traffic-proxy`` to block HTTPS traffic
using ``app-id`` detection combined with
``connmark``. A custom CLI dictionary is configured
to detect the SNI ``webserver.com`` as ``app-id 1``.
The traffic selector matches any custom app-id and
the traffic policy sets ``connmark 1000`` on detected
flows, which triggers the traffic-proxy block rule.
The test first verifies that traffic is not blocked
without the app-detect policy, then enables it and
confirms that traffic is blocked and the proxy stats
reflect the blocked connection.
Scenario
========
.. include:: appid/blockbyapp-id
.. raw:: html
**************************
Block By App-Id Dictionary
**************************
Description
===========
This example demonstrates how to configure the
``service traffic-proxy`` to block HTTPS traffic
using ``app-id`` detection with an XML dictionary
file. The dictionary ``webserver_dict.xml`` is uploaded
to the DUT and contains application definitions with
``engine_id=128``. The traffic selector matches
``app-id engine 128`` and the traffic policy sets
``connmark 1000`` on detected flows, which triggers
the traffic-proxy block rule. The test first verifies
that traffic is not blocked without the app-detect
policy, then enables it and confirms that traffic is
blocked and the proxy stats reflect the blocked
connection.
Scenario
========
.. include:: appid/blockbyapp-iddictionary
.. raw:: html
**********************************
Block By APP-Id Using VRF-Connmark
**********************************
Description
===========
This example demonstrates how to configure the
``service traffic-proxy`` to block HTTPS traffic
using ``app-id`` detection combined with
``vrf-connmark``. A custom CLI dictionary is
configured to detect the SNI ``webserver.com`` as
``app-id 1``. The traffic selector matches any
custom app-id and the traffic policy sets
``vrf-connmark`` for VRF ``LAN`` on detected
flows, which triggers the traffic-proxy block rule.
The test first verifies that traffic is not blocked
without the app-detect policy, then enables it and
confirms that traffic is blocked and the proxy stats
reflect the blocked connection.
Scenario
========
.. include:: appid/blockbyapp-idusingvrf-connmark
.. raw:: html