Solved

Block Internet Audio, either/or GPO or ports used.

Posted on 2007-03-20
3
490 Views
Last Modified: 2008-02-26
I am having issues with users listening to internet radio. Normally, this wouldn't be a problem, but, it's a bandwidth issue.  How would I go about blocking this in GPO and/or what ports are used.
Yahoo Launchcast and live365 are some internet radio stations that are listened to.  Being such a small company and having our internet (and routers).  
Just knowing with the ports used by these applications would save me a great deal of time and effort.

Thanks in advanced.
0
Comment
Question by:cknoderer
  • 2
3 Comments
 
LVL 17

Accepted Solution

by:
RDAdams earned 500 total points
ID: 18758397
Many use port 8080 which is common for regular internet traffic.  You may be better off creating a black list of all sites you want to block.
0
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 18758560
If you're going to try to block by port, good luck.  If you're going to try to block by IP, again good luck.
I don't mean to sound negative, but it'll dominate your day.

Here's what I am in the midst of putting in place at my company.  Grabbed a small box that is powerful enough to be a proxy.  Install LInux, Squid, and Dansguardian.  Configure Dansguardian to block the audio and video mime types.  Installed an Identd server (couldn't find anything better to work) so that each client authenticated with Squid and Dansguardian so that you can be more lax on the rules for some people.  However if you don't know Linux and don't want to then the only other thing I can think of is an ISA server.

Basically though to be effective at this type of blocking you have to do it with a proxy server to block by mime or have an IPS filtering your traffic (same concept though)
0
 
LVL 17

Expert Comment

by:RDAdams
ID: 18763832
Just a note you can get a ready made black list from some organizations.  I will check to see where you can get a list.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

This is an article about my experiences with remote access to my clients (so that I may serve them) and eventually to my home office system via Radmin Remote Control. I have been using remote access for over 10 years and have been improving my metho…
PRTG Network Monitor lets you monitor your bandwidth usage, so you know who is using up your bandwidth, and what they're using it for.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now