<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Matching p2p packets with NBAR? in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204543#M1063815</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;" ...action drop" do not work well. There is a workaround: use traffic marking and after dropp it  with route map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Apr 2004 16:40:33 GMT</pubDate>
    <dc:creator>sergej.gurenko</dc:creator>
    <dc:date>2004-04-08T16:40:33Z</dc:date>
    <item>
      <title>Matching p2p packets with NBAR?</title>
      <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204538#M1063796</link>
      <description>&lt;P&gt;I wonder whether there is any possibility for NBAR to match more than 16 ports for each type of protocol (for example fasttrack)? The problem is that for example imesh is using ports between 1024 and 7000 !!! I successfully managed to block p2p applications using string matching in iptables (linux), the thing is that I have no idea how to create access-list or class-map basing on strings in packets?&lt;/P&gt;&lt;P&gt;Anyone managed to shape todays p2p traffic using cisco routers?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for reply &lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 06:31:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204538#M1063796</guid>
      <dc:creator>lukaszwisniowski</dc:creator>
      <dc:date>2020-02-21T06:31:37Z</dc:date>
    </item>
    <item>
      <title>Re: Matching p2p packets with NBAR?</title>
      <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204539#M1063805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The only way out of the "max 16 port" predicament (?... &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt; )  that I know of is to use access lists. There is no limit on the number of entries in an access list. If the desired action is same irrespective of the port (which seems to be the case here) then this is the way out. For examples on the same, see the following docs: &lt;/P&gt;&lt;P&gt;1) &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fqos_c/fqcprt1/qcfnbar.htm#52645" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/software/ios122/122cgcr/fqos_c/fqcprt1/qcfnbar.htm#52645&lt;/A&gt;.&lt;/P&gt;&lt;P&gt;2) &lt;A class="jive-link-custom" href="http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121newft/121limit/121e/121e2/nbar2e.htm" target="_blank"&gt;http://www.cisco.com/univercd/cc/td/doc/product/software/ios121/121newft/121limit/121e/121e2/nbar2e.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 03 Feb 2003 19:36:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204539#M1063805</guid>
      <dc:creator>wdrootz</dc:creator>
      <dc:date>2003-02-03T19:36:00Z</dc:date>
    </item>
    <item>
      <title>Re: Matching p2p packets with NBAR?</title>
      <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204540#M1063810</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Has anyone had success using the kazaa2.pdlm? Does it encounter the same 16 port issue? I have used it, created a class map and set a policy to drop all packets. However, it only stops the packets for about a minute and then they get through (packet counters increase as shown below)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;test#sh ip nbar protocol-discovery protocol kazaa2&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; FastEthernet0/0&lt;/P&gt;&lt;P&gt;                            Input                    Output&lt;/P&gt;&lt;P&gt;   Protocol                 Packet Count             Packet Count&lt;/P&gt;&lt;P&gt;                            Byte Count               Byte Count&lt;/P&gt;&lt;P&gt;                            5 minute bit rate (bps)  5 minute bit rate (bps)&lt;/P&gt;&lt;P&gt;   ------------------------ ------------------------ ------------------------&lt;/P&gt;&lt;P&gt;   kazaa2                   409                      0&lt;/P&gt;&lt;P&gt;                            25050                    0&lt;/P&gt;&lt;P&gt;                            0                        0&lt;/P&gt;&lt;P&gt;   unknown                  294                      0&lt;/P&gt;&lt;P&gt;                            22011                    0&lt;/P&gt;&lt;P&gt;                            0                        0&lt;/P&gt;&lt;P&gt;   Total                    7571                     4352&lt;/P&gt;&lt;P&gt;                            947852                   4143655&lt;/P&gt;&lt;P&gt;                            14000                    53000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;------------------------------------------&lt;/P&gt;&lt;P&gt;This is the class map&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map match-any Kazaa&lt;/P&gt;&lt;P&gt;  description Kazaa&lt;/P&gt;&lt;P&gt;  match protocol kazaa2&lt;/P&gt;&lt;P&gt;  match protocol fasttrack&lt;/P&gt;&lt;P&gt;  match protocol http url "\.hash=*"&lt;/P&gt;&lt;P&gt;  match protocol napster&lt;/P&gt;&lt;P&gt;  match protocol gnutella&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;----------------&lt;/P&gt;&lt;P&gt;here is the policy to drop all packets&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;policy-map Test_Policy&lt;/P&gt;&lt;P&gt;  class Kazaa&lt;/P&gt;&lt;P&gt;   police cir 8000 bc 1000 be 1000&lt;/P&gt;&lt;P&gt;     conform-action drop&lt;/P&gt;&lt;P&gt;     exceed-action drop&lt;/P&gt;&lt;P&gt;     violate-action drop&lt;/P&gt;&lt;P&gt;----------------------------------------------------&lt;/P&gt;&lt;P&gt;These are applied using service-policy command but no luck as of yet....Any suggestions? (have tried both 12.2(8)T5 and 12.2(13)T1 code on 3640 router.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2003 03:08:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204540#M1063810</guid>
      <dc:creator>dldresser</dc:creator>
      <dc:date>2003-02-11T03:08:25Z</dc:date>
    </item>
    <item>
      <title>Re: Matching p2p packets with NBAR?</title>
      <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204541#M1063813</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;You can't define ports for kazaa2 NBAR so it probably means that it is working on all ports. I don't know why, but I can't access pdlms on cisco site using standard login. Is it somehow restricted?&lt;/P&gt;&lt;P&gt;I've heard that kazaa2 NBAR wasn't accurate to limit traffic but it is blocking transmitions without any problems . What I propose is to block kazaa2 on all ports except 1214 and put this port into proper class-map. Port 1214 is used only by kazaa and other p2p. Of course kazaa will be working much slower but finally you managed to controll it and didn't blocked it if you are not allowed.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 11 Feb 2003 08:46:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204541#M1063813</guid>
      <dc:creator>lukaszwisniowski</dc:creator>
      <dc:date>2003-02-11T08:46:29Z</dc:date>
    </item>
    <item>
      <title>Re: Matching p2p packets with NBAR?</title>
      <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204542#M1063814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I had the same problem using the "...action drop", but when I changed it to a true rate-limiting action (basically throttling the traffic to get ZERO bandwidth), it did the trick to Stop KaZaa.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 06 Aug 2003 20:41:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204542#M1063814</guid>
      <dc:creator>dboyko</dc:creator>
      <dc:date>2003-08-06T20:41:39Z</dc:date>
    </item>
    <item>
      <title>Re: Matching p2p packets with NBAR?</title>
      <link>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204543#M1063815</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;" ...action drop" do not work well. There is a workaround: use traffic marking and after dropp it  with route map&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Apr 2004 16:40:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/matching-p2p-packets-with-nbar/m-p/204543#M1063815</guid>
      <dc:creator>sergej.gurenko</dc:creator>
      <dc:date>2004-04-08T16:40:33Z</dc:date>
    </item>
  </channel>
</rss>

