Block Internet Audio, either/or GPO or ports used.

Posted on 2007-03-20
Medium Priority
Last Modified: 2008-02-26
I am having issues with users listening to internet radio. Normally, this wouldn't be a problem, but, it's a bandwidth issue.  How would I go about blocking this in GPO and/or what ports are used.
Yahoo Launchcast and live365 are some internet radio stations that are listened to.  Being such a small company and having our internet (and routers).  
Just knowing with the ports used by these applications would save me a great deal of time and effort.

Thanks in advanced.
Question by:cknoderer
  • 2
LVL 17

Accepted Solution

RDAdams earned 1000 total points
ID: 18758397
Many use port 8080 which is common for regular internet traffic.  You may be better off creating a black list of all sites you want to block.
LVL 25

Expert Comment

ID: 18758560
If you're going to try to block by port, good luck.  If you're going to try to block by IP, again good luck.
I don't mean to sound negative, but it'll dominate your day.

Here's what I am in the midst of putting in place at my company.  Grabbed a small box that is powerful enough to be a proxy.  Install LInux, Squid, and Dansguardian.  Configure Dansguardian to block the audio and video mime types.  Installed an Identd server (couldn't find anything better to work) so that each client authenticated with Squid and Dansguardian so that you can be more lax on the rules for some people.  However if you don't know Linux and don't want to then the only other thing I can think of is an ISA server.

Basically though to be effective at this type of blocking you have to do it with a proxy server to block by mime or have an IPS filtering your traffic (same concept though)
LVL 17

Expert Comment

ID: 18763832
Just a note you can get a ready made black list from some organizations.  I will check to see where you can get a list.

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
An Outlook data file aka PST is prone to corruption due to various reasons. A corrupt PST file is always inaccessible. Also, you may lose all your crucial mailbox content at any time. So to fix this corruption and protect the mailbox content from be…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

587 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question