Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

how to deny traffic

Posted on 2013-11-09
2
377 Views
Last Modified: 2013-11-13
hello for all
i have users in my network use many website to bypass proxy and use tor browser portal apps and this applaction use port 80 and 443
i have cisco router 2811
how i can block traffic for tor browser and how i block it by asa 5510
0
Comment
Question by:zizo1982
  • 2
2 Comments
 
LVL 37

Accepted Solution

by:
bbao earned 110 total points
ID: 39635596
> i have users in my network use many website to bypass proxy

so what are you aiming for? to make all users to access the internet via an internal proxy server you assigned?

Tor is designed to be very resilient and it encrypts and re-encrypts most of the connection traffic, and those users need to connect through a series of randomly selected node computers to reach the final destination.

it's really hard to find a feasible way to block it at the firewalls.
0
 
LVL 37

Expert Comment

by:bbao
ID: 39647149
why the grade is average? just because it says "it's really hard to find a feasible way to block it at the firewalls"?
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
PC won't boot from CD 20 106
Valere unit 6 74
APC 2200XL not coming back online after new batteries installed 57 139
COM Port 37 89
In the modern office, employees tend to move around the workplace a lot more freely. Conferences, collaborative groups, flexible seating and working from home require a new level of mobility. Technology has not only changed the behavior and the expe…
On Beyond Tools A conversation I recently had with the DevOps manager of a major online retailer really made me think about DevOps monitoring tools (https://www.onpage.com/devops-incident-management-tool/). The manager and I discussed how sever…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

808 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question