Solved

Block Internet Audio, either/or GPO or ports used.

Posted on 2007-03-20
3
515 Views
Last Modified: 2008-02-26
I am having issues with users listening to internet radio. Normally, this wouldn't be a problem, but, it's a bandwidth issue.  How would I go about blocking this in GPO and/or what ports are used.
Yahoo Launchcast and live365 are some internet radio stations that are listened to.  Being such a small company and having our internet (and routers).  
Just knowing with the ports used by these applications would save me a great deal of time and effort.

Thanks in advanced.
0
Comment
Question by:cknoderer
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 17

Accepted Solution

by:
RDAdams earned 500 total points
ID: 18758397
Many use port 8080 which is common for regular internet traffic.  You may be better off creating a black list of all sites you want to block.
0
 
LVL 25

Expert Comment

by:Cyclops3590
ID: 18758560
If you're going to try to block by port, good luck.  If you're going to try to block by IP, again good luck.
I don't mean to sound negative, but it'll dominate your day.

Here's what I am in the midst of putting in place at my company.  Grabbed a small box that is powerful enough to be a proxy.  Install LInux, Squid, and Dansguardian.  Configure Dansguardian to block the audio and video mime types.  Installed an Identd server (couldn't find anything better to work) so that each client authenticated with Squid and Dansguardian so that you can be more lax on the rules for some people.  However if you don't know Linux and don't want to then the only other thing I can think of is an ISA server.

Basically though to be effective at this type of blocking you have to do it with a proxy server to block by mime or have an IPS filtering your traffic (same concept though)
0
 
LVL 17

Expert Comment

by:RDAdams
ID: 18763832
Just a note you can get a ready made black list from some organizations.  I will check to see where you can get a list.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
mlppp with hsrp tracking? 2 29
General network\voice question.. 4 56
VLAN Questions 3 70
patch status tool - free 9 61
For many of us, the  holiday season kindles the natural urge to give back to our friends, family members and communities. While it's easy for friends to notice the impact of such deeds, understanding the contributions of businesses and enterprises i…
Unified and professional email signatures help maintain a consistent company brand image to the outside world. This article shows how to create an email signature in Exchange Server 2010 using a transport rule and how to overcome native limitations …
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

751 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question