Skip to main content
Print

Web Apps

Overview

This section provides a high-level overview of the WebApps feature and its purpose within the zWAN platform.

Document Scope

This document describes the functionality, detection mechanisms, workflows, UI behavior, limitations, and future enhancements related to the WebApps feature in zWAN. It outlines what WebApps are, how they operate within the system, how administrators can configure them, and how they integrate with other components such as the FlowClassifier, NetBalancer, QoS, and Firewall modules.

Introduction

The zWAN WebApps feature is primarily designed to model internal business or intranet applications that consist of multiple domains, IPs, and service endpoints. Instead of managing each component separately, administrators can bundle them into a single application profile for easier control and policy enforcement.These application profiles can then be used for traffic classification, prioritization, categorization, security policies, and routing decisions.

WebApps serve as a configurable abstraction layer enabling:

  • Simplified application recognition
  • Streamlined user-defined policies
  • Improved clarity for network administrators

Core Functionalities of WebApps

A WebApp is created to achieve the following:

  1. Group related domains under one logical application.
  2. Steer, classify, or block all domains/IPs tied to the application using a single selector.
  3. Allow user-defined naming of applications.
  4. Associate known IP addresses with the application.
  5. Associate IP/port/protocol combinations with the application.
  6. Provide domain categories related to the application.
  7. Classify applications as trusted or SaaS.
  8. Bypass IPS/IDS inspection for the application.
  9. Bypass DNS classification or filtering.
    • When enabled, domains configured under a WebApp bypass DNS-based classification and filtering.
    • To avoid policy conflicts, domains with bypassDNS enabled are validated against globally blocked categories.
    • If a domain belongs to a blocked category:
      • WebApp creation or update is restricted.
      • Category configuration is also restricted if it conflicts with existing WebApps.
    • This ensures consistent enforcement across WebApp configuration and global category policies.
  10. Bypass SSL inspection.
  11. Enable custom business application grouping for granular traffic steering.

Detection Workflow and Deep Dive

Once a WebApp is configured, zWAN uses several subsystems in combination to identify flows associated with that WebApp.

Detection Mechanisms

  1. nDPI-based detection:
    • Enabled using user-provided IPs, domains, and metadata.
    • Identifies application traffic directly from flow characteristics.
  2. DNS-based discovery:
    • Learns IP addresses for configured FQDNs.
    • Matches subsequent flows against discovered IPs.
  3. IP/Port/Protocol matching:
    • Uses ipsets managed by zWAN.
    • Enables deterministic classification of application-bound traffic.
  4. TLS SNI-based identification:
    • Matches configured FQDNs through xt_tls inspection.

Policy Enforcement After Detection

Once a flow is identified as belonging to a WebApp, zWAN applies global policies such as:

  • SaaS application marking
  • SSL inspection bypass
  • IPS/IDS bypass
  • DNS filter bypass

Additionally, Flow Classifier–based policies in Firewall/NetBalancer/QoS modules can be applied to WebApps. This results in rules or packet marking specific to the detected application.

Functionalities Provided by WebApps in zWAN

  1. Create WebApp with:
    • FQDN list (e.g., internal/intranet applications like a self-hosted GitLab or Redmine)
    • IP/Port/Protocol list
    • Categories
    • Global bypass policies

      Note:
      If bypassDNS is enabled and a domain belongs to a blocked category, the system will prevent saving the configuration and display an appropriate error message.

  2. Edit WebApp to update any of the above attributes.
  3. Delete WebApp can be deleted one at a time.
  4. List WebApps, with search and sort capabilities.
  5. Use WebApps in NetBalancer/Firewall/QoS FlowClassifier modules to apply traffic steering, prioritization, and security policies based on business applications.

UI Functionalities

Create WebApp

To create a new WebApp, navigate to the Apps section in the UI and select the Web App tab. Click the ADD WEB APP button. Provide known information such as domain names, IP addresses, ports, and any relevant metadata. Select the appropriate global policies before saving the configuration.

Webapps
Webapps
Webapps

  • While selecting a global policy, during web app creation, domains that belong to a blocked category cannot be bypassed through DNS filtering. This is especially relevant for large applications such as Facebook, Instagram, etc.
  • These applications do not rely on a single domain. Instead, they use multiple CDNs, subdomains, and related services, all of which may fall under the same category. Therefore, bypassing just one domain is not sufficient, as many dependent domains are still subject to filtering.

To handle such cases effectively:

  • Multiple domains and subdomains would need to be bypassed.
  • These domains are often dynamically resolved and categorized under the same blocked category.
  • Managing them individually becomes impractical.

As a result:

  • If a category is marked as blocked, domains within that category cannot be selectively bypassed for DNS filtering.
  • This ensures consistency in enforcement and avoids partial or ineffective bypass configurations for large-scale web applications.

Conversely:

  • If domains under a web app are configured to bypass DNS filtering in the global policy, the corresponding category cannot be blocked while DNS bypass is enabled.

Edit WebApp

An existing WebApp can be modified by clicking the edit (pen) icon. You may change, add, or delete configuration parameters. Click Update to save the changes.

Webapps

Delete WebApp

Each WebApp can be deleted individually using the trash icon.

Webapps

List WebApps

Displays all created WebApps along with their associated configuration details.

Webapps

Import WebApps

When managing multiple WebApps across several CPEs, configurations can be imported from a file to avoid repetitive manual data entry. Click the IMPORT WEB APPS button to upload a WebApp configuration file.

Next Release:
Bulk import support will be removed. Import will be restricted to one WebApp at a time to prevent UI timeouts.
Webapps

Flow Classification

Webapp section is added under flow classification UI of Firewall Rules/NetBalancer/QoS pages to create granular rules instead of using global policies.
Webapps

Analytics and Reporting

WebApps will enable unified analytics by aggregating traffic across all associated domains, IPs, ports, and protocols into a single application entity. This will provide:

  • Consolidated reporting for each application.
  • Visibility into traffic volume, flow counts, bandwidth usage, and security events mapped to the WebApp.
  • Insights into domain-level activity while still presenting a unified application-level summary.
  • Improved troubleshooting and performance monitoring by correlating all related flows under one logical application.

Future Enhancements

  • Automatic WebApp detection through periodic packet capture (pcap) and machine‑learning–based flow analysis.
  • Auto-learning WebApp definitions for unknown or emerging applications.

Limitations

  • DNS-based identification works only if DNS traffic is routed via the zWAN CPE.
  • Shared web hosting may cause incorrect WebApp identification using DNS-derived IPs.
  • TLS-based detection applies only to HTTPS traffic.
  • Bypassing SSL and Traffic Steering depends on first packet detection.
    • nDPI detection is limited to what the nDPI library supports.
  • Due to the above, certain WebApps may not always be accurately identified.
  • DNS Caching and Policy Enforcement Delay
    • Previously resolved IP addresses for a domain or URL may continue to be used until the DNS cache expires or is refreshed.
    • As a result, a domain or URL may remain accessible for a short period after a blocking policy is applied, or may remain blocked after being allowed.
    • The updated policy will take effect only after the relevant cache entries are cleared or expire.

Summary

The WebApps feature enhances visibility and control over internal or intranet application traffic in zWAN. By integrating multiple detection mechanisms and providing administrator-driven application grouping, WebApps simplify complex network classification tasks. They form a foundation for richer enterprise traffic management, prioritization, and security capabilities while reducing the operational overhead associated with domain-by-domain configuration.

Table of Contents