[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: [FW1] Blocking Access
You can block Gnutella if you only permit proxy based services (security servers) and possibly inspect based services through your firewall. If you allow connections based only on a tcp port you have lost. If you dont have an internal dns server, then have a look at the sp2 release notes for setting up inspect based dns (not only looking at the ports). However it's possible to tunnell gnutella connections through an http tunnell or other allowed protocol. Lars -----Original Message----- From: [email protected] [mailto:[email protected]] Sent: 10. oktober 2000 18:26 To: [email protected] Cc: [email protected] Subject: RE: [FW1] Blocking Access You will never block Gnutella traffic. Dynamic ports and peer to peer communication. Look on phoneboy to block napster. Thomas Poole -----Original Message----- From: Doug Schmidt [mailto:[email protected]] Sent: Tuesday, October 10, 2000 11:23 AM To: '[email protected]' Subject: [FW1] Blocking Access Hi~ Upper management wants me to block all Napster and Gnutella traffic at the firewall. I have found how to block access for napster, but what about gnutella? Any help would be great. ~Doug ============================================================================ ==== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ============================================================================ ==== ============================================================================ ==== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ============================================================================ ==== ================================================================================ To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================================================
|