Solved

Blocking Streaming Media

Posted on 2004-08-09
7
971 Views
Last Modified: 2010-04-09
I have a network of about 30 users and a lot are starting to use Media players to stream Music, sports, etc. We have blown our data useage buy a long shot for the past 2 months and I want to put a stop to it.

Can anyone tell me how to block both Windows Media and Real Player Streams.

If it helps, I have a Netscreen 25 Firewall.

Thanks

Andrew
0
Comment
Question by:andrewharris
7 Comments
 
LVL 15

Expert Comment

by:Yan_west
ID: 11758696
You have to block all outgoing traffic to port 1755
Real Media: Port 554

Actually, I would block all port by default, only opening the needed one... 80 for Http, etc.. deny everything first, and open up as needed, this is the better approach.
0
 
LVL 15

Accepted Solution

by:
Yan_west earned 500 total points
ID: 11758736
Oh, and btw, people will  still be able to stream through port 80.. and you need it. Check in for firewall appliance if you can block  Mimes types.. (audio, etc..)

if you cannot, see if somewhere in your firewall config, you can block file extensions.. then you will be able to block all type of audio/video file (*.ram, *.wmv, *.wma, etc..)
0
 
LVL 4

Author Comment

by:andrewharris
ID: 11759288
Hmmm. As I thought...Port 80...The $%^&*( :-)

Gonna leave it open for a while longer to see if there is any other ideas (I doubt it, but just in case).

Andrew
0
PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

 
LVL 36

Expert Comment

by:grblades
ID: 11765882
Hi andrewharris,
Does the netscreen support redirecting or validating URL's against a proxy server or blacklist There are various protocols for this such as WCCP.

If it does then you could setup a simple proxy server and configure it to allow/deny particular file types. You could also add on a blacklist to deny sites which only provide video files etc...

Even if it does not provide this functionality you could configure every browser to use the proxy and then only allow the proxy to access the web.
0
 
LVL 4

Author Comment

by:andrewharris
ID: 11768155
grblades,

Not as far as I know. Thanks anyway

Andrew
0
 
LVL 1

Expert Comment

by:amkessler
ID: 11772336
Sonicwall has a Feature called IPS (intrusion Protection Services) that does that and more. It will do reporting and bocking of ay predefind or custom service.  


I know you have a Netscreen, but if you are considering a trade up,  I think Sonicwall has a tradeup program still in effect, I know they did for a while in the spring.  The cost of a 25 user sonicwall Tz 170 with the necessary bells and whistles should be no more that $1700.  The newist firmware even does external wireless AP's and guest services.  A very good thing to look at.
0
 
LVL 4

Author Comment

by:andrewharris
ID: 11829943
OK,

Well no one seems interested. Thanks all.

Andrew
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Exchange OWA - failed logins and brute force monitor 7 307
firewall rule terminology 3 45
Sonicwall NSA failover & LB 4 57
TMG 2010 Deployment 3 97
Wikipedia defines 'Script Kiddies' in this informal way: "In hacker culture, a script kiddie, occasionally script bunny, skiddie, script kitty, script-running juvenile (SRJ), or similar, is a derogatory term used to describe those who use scripts or…
This article offers some helpful and general tips for safe browsing and online shopping. It offers simple and manageable procedures that help to ensure the safety of one's personal information and the security of any devices.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…

792 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question