- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Blocking TikTok
HI Guys,
I created a Layer 3 outbound rule to block TikTok. I created 2 policy object groups namely TikTok [collection of TikTok IP addresses] and TikTok Domain [collection of TikTok domains] and call it on the L3 rule destination but despite that I am still seeing usage of TikTok, as if it was not blocked but I am seeing that it has 26 hits though. iPolicy Objects
Outbound Rule
Hosts contributing to rule
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
According to the screenshot, it is being denied in the rule you created. Have you done any validation to make sure they are still able to access it?
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Yep they are still able to access it.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Certain apps like YouTube and TikTok are very difficult to block these days. You might want to try and fully block UDP port 443 (QUIC) if your main priority on the network is to block the TikTok but please check for collateral damage.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Take a look at this.
https://community.meraki.com/t5/Security-SD-WAN/Blocking-TIKTOK-in-2024/m-p/221020
Please, if this post was useful, leave your kudos and mark it as solved.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
TikTok is recognized by NBAR.
Can you set a L7 DENY rule using TikTok?
After making the policy change, verify it lists TikTok
Safari can't connect now so it appears that L7 (stateless) blocking works, or it did for me anyway.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You might continue to see Tiktok sessions that remain active sessions.
Firewall rules do not work on active sessions.
You'd need to wait like 10 minutes for the firewall to clear active session.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
From your screenshots It seems that the DENY rule is being triggered, which aligns with the objective of blocking TikTok traffic.
Please see the very helpful KB on Layer 3 and 7 Firewall Processing Order.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Hi workmen,
Please, provide more detail info:
- When exactly the TikTok is still working - while using the browser or while using the Mobile app? (most likely a QUIC protocol is in use)
- Have you taken packet capture on the MX Primary WAN interface?
- When you filter for the client IP address, do you see a QUIC protocol in use while reaching to the TikTok Public IP address(es)?
STEP 1 - QUIC (Quick UDP Internet Connections) is a new encrypted transport layer protocol, designed to improve the performance and security of web applications by replacing TCP and TLS, and is built on top of UDP, offering features like faster connection establishment and reduced latency.
NOTE: It is not generally possible to block these features using firewall rules, because they work over TCP or UDP 443, which are shared with other web traffic (TLS and QUIC)
Option 1 - To prevent this, client devices can Disable QUIC at a browser level,
- Google Chrome - In the browser address bar, type chrome://flags. Disable the Experimental QUIC protocol option.
- Microsoft Edge - In the browser address bar, type edge://flags/. Disable the Experimental QUIC protocol option.
- Mozilla Firefox - In the browser address bar, type about:config. Disable the network.http.http3.enable option.
- Opera - In the browser address bar, type opera://flags/#enable-quic. From the Experimental QUIC protocol drop-down list, select Disabled.
OR
Option 2 - Firewall rules to block UDP 80 and UDP 443 should be configured to prevent end-user devices from being able to circumvent Content Filtering rules.
STEP 2 - Clear the locally cached DNS record - Correcting this behavior depends on the device's OS:
- For Windows: open up a command prompt and run ipconfig /flushdns
- For MacOS: open a terminal and run sudo dscacheutil -flushcache
- For iOS: reboot the device
- For Android: Open the Chrome browser, navigate to the URL chrome://net-internals/#dns, choose the "DNS" option, and then click "Clear host cache"
For example, more details about WatchGuard Firewall and the explanation about QUIC Protocol and how it can be blocked - https://www.watchguard.com/help/docs/help-center/en-US/Content/en-US/Endpoint-Security/manage-settin...
If you have more questions, please don't hesitate to contact us.
If my answer solved your problem, click "accept as solution" so that others can benefit from it.
