Cover-Photo

Application Control Lite

Application Control Lite lets administrators take back control of their networks from disruptive technologies like peer-to-peer applications or online games.

 

Signature-based layer 7 filtering makes it easy to improve productivity by blocking messaging, gaming and other apps that evade firewall rules.

 

Write custom signatures for any protocol, and conserve bandwidth by blocking applications like peer-to-peer that open multiple TCP ports.


Free App

This app is offered free of charge for unlimited use. Enjoy!


The Status tab shows all the basic information for the Application Control Lite app.


Adding Signatures is simple; just add the protocol, category, signature and your desired action.


The Reports tab provides default reports for Application Control Lite. This report shows the top blocked protocols. You can create any type of report for any application with the Reports app.


Status

The Status tab shows all the basic information for the Application Control Lite app.


Signatures

Adding Signatures is simple; just add the protocol, category, signature and your desired action.


Reports

The Reports tab provides default reports for Application Control Lite. This report shows the top blocked protocols. You can create any type of report for any application with the Reports app.


The product runs itself. I can rest assured all my networks are protected against all types of attacks. Joe Sloan, Admiral Farragut Academy
Untangle has everything I need to protect my retail and corporate networks. Robert Codey, Frette
Untangle’s support team is awesome. They helped us get up and running in no time. Chuck Young, Flow Companies

Features

  • Open source and free under the GNU General Public License (GPL).
  • Application Control Lite lets you select the protocol signatures to log or block.
  • Custom rules can be added for any unsupported protocols.
  • Time-based policies let you decide when and if these applications are permitted.
  • Reporting lets you see which protocols are active on your network and who is using them.