From: McClure, Allen (Allen.McClure@Tricon-Yum.Com)
Date: Wed Sep 25 2002 - 17:56:00 GMT-3
You may wish to look into NBAR. We're thinking about using it for the
peer-to-peer junk.
Allen McClure
MCSE, CCNP, CCDP
YUM! Brands, Inc.
Sr. Network Analyst
NEW E-Mail - mailto:allen.mcclure@yum.com
972-338-7494
-----Original Message-----
From: Carlos G Mendioroz [mailto:tron@huapi.ba.ar]
Sent: Wednesday, September 25, 2002 3:32 PM
To: Groupstudy ccielab list
Subject: OT: dealing with fastrack (Kazaa et.al.)
Hi,
after a long time of chasing local servers on different ports and using
CAR to make it a pain to use those pesty peer to peer programs, I'm
trying to automatize the thing.
Basically I want to find who has fasttrack (snort or the like triggering
on port 1214 activity) and make a list, then dynamically build an ACL to
CAR all traffic from/to those stations into a small pipe. End result
would be "if you use it, your network access rate will be poor".
Question: has anybody got a way to program ACLs from a unix box (via a
script)
in a secure way ? Is there a way to use SNMP to do this ?
Advise on any solution to the fastrack net hogging problem is
appreciated.
Note: My network policy does not allow me to kill port 1214 :-(
TIA
-- Carlos G Mendioroz <tron@huapi.ba.ar> LW7 EQI ArgentinaThis communication is confidential and may be legally privileged. If you are not the intended recipient, (i) please do not read or disclose to others, (ii) please notify the sender by reply mail, and (iii) please delete this communication from your system. Failure to follow this process may be unlawful. Thank you for your cooperation.
This archive was generated by hypermail 2.1.4 : Mon Oct 07 2002 - 07:44:03 GMT-3