Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 1371
  • Last Modified:

How to block IM,P2P applications, Google earth,multimedia contents from PIX 525 ver 7.0(6)

Hi Experts

I am really worried about the bandwidht usage by p2p applications, I need to block all P2P applications, messengers, youtube, metacafe, proxy softwares from my pix 525 ver 7.06. I need the way to block them, either by access-list or by any other available means. We don't have websense or blue coat to block these things, I know i cannot achieve 100 % but to certain extent i want block these applications, also is there any way to block certain web sites. Please let me know .

1 Solution
Well if your clients are pointed to an internal dns server you can just setup dns records that point those domains to a bogus IP address.  For the major messaging apps you would set up bogus dns record for:

messenger.hotmail.com -> msn messenger
login.oscar.aol.com -> aol messenger
msg.edit.yahoo.com -> yahoo messenger

Then just create bogus dns entries for any websites you want to block.

This is what we do at our clients that have no other means of blocking
This examples from Cisco using advanced http inspect features:

The following example shows how to identify HTTP traffic, define an HTTP map, define a policy, and apply the policy to the outside interface:

hostname(config)# class-map http-port
hostname(config-cmap)# match port tcp eq 80
hostname(config-cmap)# exit
hostname(config)# http-map inbound_http
hostname(config-http-map)# content-length min 100 max 2000 action reset log
hostname(config-http-map)# content-type-verification match-req-rsp reset log
hostname(config-http-map)# max-header-length request bytes 100 action log reset
hostname(config-http-map)# max-uri-length 100 action reset log
hostname(config-http-map)# exit
hostname(config)# policy-map inbound_policy
hostname(config-pmap)# class http-port
hostname(config-pmap-c)# inspect http inbound_http
hostname(config-pmap-c)# exit
hostname(config-pmap)# exit
hostname(config)# service-policy inbound_policy interface outside

This example causes the security appliance to reset the connection and create a syslog entry when it detects any traffic that contain the following:

•Messages less than 100 bytes or exceeding 2000 bytes
•Unsupported content types <== you can define what types are supported
•HTTP headers exceeding 100 bytes
•URIs exceeding 100 bytes

Reference on content types: http://www.cisco.com/univercd/cc/td/doc/product/multisec/asa_sw/v_70/cref_txt/c.htm#wp1969931

I use IPCOP with a block outgoing traffic addin as our main router.
By default the add in blocks everything.
You then have to open up the holes you want like port 80, 21, 25, 110, 1723, etc.
It will run on any old machine you may have laying around. even a 486.
You can even limit access by ip or mac.
I've been able to block all P2P application.
MSN is a tough one to block because it defaults to port 80 which you need for web browsing.
It works great for me.
Are you still working on this? Can you close out this question before the cleanup crew gets around to it?

For what it's worth, we successfully block YouTube flash videos with this policy-map (inspect type) for our clients that need it:

regex _videoflash "video/flv"

policy-map type inspect http http-no-flash
  match response header content-type regex _videoflash
   drop-connection log

policy-map global_policy
 class inspection_default
  inspect http http-no-flash

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now