Use ASA to stop streaming music and video done via locally installed applications?

Posted on 2011-03-23
Medium Priority
Last Modified: 2012-05-11

I have websense web filter setup in line with my Cisco ASA 5510's. I'm filtering perfectly all traffic that is done via ftp, http, and https in Internet Explorer. We are blocking all streaming media via Internet Explorer. So, if you go to youtube or pandora it is blocked via your web browser.  Our problem is that some people are using Windows Media Player, Beer and hot wings, and other apps that aren't embedded into Internet Explorer to stream music. How can I stop this via the ASA?

Here is how my web filter is setup and running. What can I do with my ASA or websense to stop activity from successfully happening outside of Internet Explorer. As I see it websense only filters what the ASA sends it. ASA will only send certain types of traffic to Websense and I'm already doing that for all the options i see (http,https,ftp,java, url).

url-server (inside) vendor websense host timeout 10 protocol TCP version 4 connections 100
filter url http allow proxy-block longurl-truncate
filter https 443 allow
filter activex 80
filter java 80
filter ftp 21 allow
Question by:First Last

Expert Comment

ID: 35201008
You might want to create an ACL (access list) to block the address of the website or filter the web address, to the music site, on the pc's. A great port blocking software is www.kerio.com 
LVL 33

Expert Comment

ID: 35201070
With the ASA, you have 2 options.    
1) block the far end IP addresses.   So on an inside interface, add an access list that will deny IP to the range of pandora ips, for example.   Then no traffic will get out to that range.  
2) If you know the specific ports, you can add a rule to the inside interface to block any site when using tcp port <# whatever>.  

Some other ideas, if you run your own DNS, you can add entries for youtube and pandora and such to go to  

Or you can implement a local workstation block.  

Another solution is to use a proxy server on the network, allowing only the proxy IP outbound access and controlling what ports it can use (i.e. 80 and 443 only).   Add rules on the asa to allow outbound for the proxy, but deny everyone else.    Then setup GPO to force IE to use your new proxy IP.


Author Comment

by:First Last
ID: 35201245
Actually I have no idea on what ports, programs, or sites they are using. I'm just now starting to look through the firewall logs based of their pc source ip address. I don't do the PC side of things here so i'm not sure what they have installed. Right now we just asked them not to do it, but it only lasts until we walk away.
LVL 79

Accepted Solution

lrmoore earned 2000 total points
ID: 35201694
You might have luck using regular expressions with advanced https inspection on the ASA
Here's an example to block audio streaming

Featured Post

IT Degree with Certifications Included

Aspire to become a network administrator, network security analyst, or computer and information systems manager? Make the most of your experience as an IT professional by earning your B.S. in Network Operations and Security.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

A question that many companies need to answer until May 25th of 2018... Is your company ready for GDPR?
OnPage has always empowered IT teams but also amplify alerting capabilities. In the following slides you will see 5 features of OnPage that act as important tools for any IT team to resolve incidents faster
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question