?
Solved

Blocking iTunes downloads from a Linksys WRT54Gv2.2 router.

Posted on 2006-10-27
3
Medium Priority
?
847 Views
Last Modified: 2012-06-27
I am restricting access for some of our abusers.  I have their MAC addresses and know how to block the ports... just don't know which ports to block for iTunes.

Can anyone give me a heads up?

Thanks.

Jack.
0
Comment
Question by:JackWooten
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Expert Comment

by:ben_staples
ID: 17819169
As far as I was aware it just uses port 80 and 3689.
I'm not certain if 3689 is just for sharing or also for downloads but it might be worth a try.
0
 
LVL 18

Accepted Solution

by:
PowerIT earned 2000 total points
ID: 17819200
Port 3689 TCP
Port 5353 UDP
But also port 80 (http) and 443 (https). If you block those then they won't be able to surf.
Try if those first two are enough to block the downloads.
Radio streams is harder. They use very large upper ranges. Blocking those will probably block other stuff.

J.
0

Featured Post

Get 15 Days FREE Full-Featured Trial

Benefit from a mission critical IT monitoring with Monitis Premium or get it FREE for your entry level monitoring needs.
-Over 200,000 users
-More than 300,000 websites monitored
-Used in 197 countries
-Recommended by 98% of users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

A look at what happened in the Verizon cloud breach.
This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question