How do I block streaming audio and video?

Posted on 2008-10-14
Medium Priority
Last Modified: 2012-05-05
I am running a small network of about 15 users through using a verizon wireless PCMCIA card in a linksys wrt54g3g-st router.  I am having a lot of trouble with the users streaming audio and video, and also downloading videos.  My router allows for port blocking and website restrictions.  I currently have a few sites blocked but I'm still having trouble.  Does anyone know which ports I need to block to stop all streaming audio and video?  Also is there anyway to block media downloads?  Any help will be greatly appreciated! Thanks to all in advance!  Also I am remotely managing the router through port 8080 and I'm using DynDns.org for DDNS.
Question by:kstrot1
LVL 17

Expert Comment

by:Andres Perales
ID: 22711968
I think you are pretty much doing everything you can with what you have, to truly block and stop what you want you will need a third party solution, that is made specifically for this...many sites use port 80 now for streaming their audio and video.
You will need a solution that will and can tell the difference in the media being pushed.

Expert Comment

ID: 22713214
I agree with the previous poster.  Or get a small Cisco router that can do NBAR and police it there.

Expert Comment

ID: 22713576
Agreed with peralesa.

While you can block a few default ports (tcp/udp 554 for rtsp and tcp/udp 1755 for mms), there is simply no guarantee that you can catch all. Most streaming protocols are able to use non-default ports, and a lot of streaming traffic is going over tcp port 80 (web) these days.

You need something that is able to look deeper than just port number in order to classify/recognize (and then block) streaming media.

Accepted Solution

dannyyo earned 2000 total points
ID: 22844026
You'll have to get content filtering service.  You'll need a soho firewall with content filtering to accomplish what you are looking for.  Sonicwall works well.  You might look into TZ150 with content filtering option.

Featured Post

Keep up with what's happening at Experts Exchange!

Sign up to receive Decoded, a new monthly digest with product updates, feature release info, continuing education opportunities, and more.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Quality of Service (QoS) options are nearly endless when it comes to networks today. This article is merely one example of how it can be handled in a hub-n-spoke design using a 3-tier configuration.
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …

621 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question