<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cisco ZBF: How completely to block torrents (solved!) in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551262#M237118</link>
    <description>&lt;P&gt;It is necessary to setup ZBF to forbid UDP of the traffics which contents of a packet corresponds to RegEx expression, for example Mikrotik Rules (see rule No.2):&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;/ip firewall filter&lt;/SPAN&gt;&lt;BR style="margin: 0px; padding: 0px; color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;add action=drop chain=forward disabled=no p2p=all-p2p&lt;/SPAN&gt;&lt;BR style="margin: 0px; padding: 0px; color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;add action=drop chain=forward comment="torrent dht out magnet" content=d1:ad2:ad20 disabled=no dst-port=1025-65535 packet-size=95-190 protocol=udp&lt;/SPAN&gt;&lt;BR style="margin: 0px; padding: 0px; color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;add action=drop chain=forward comment=info_hash content=info_hash disabled=no dst-port=2170,80 protocol=tcp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Rules 1 and 3 are created in Cisco ZBF. But how to create the rule No.2?&lt;/P&gt;</description>
    <pubDate>Tue, 12 Mar 2019 04:23:35 GMT</pubDate>
    <dc:creator>Anton Pestov</dc:creator>
    <dc:date>2019-03-12T04:23:35Z</dc:date>
    <item>
      <title>Cisco ZBF: How completely to block torrents (solved!)</title>
      <link>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551262#M237118</link>
      <description>&lt;P&gt;It is necessary to setup ZBF to forbid UDP of the traffics which contents of a packet corresponds to RegEx expression, for example Mikrotik Rules (see rule No.2):&lt;/P&gt;
&lt;P&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;/ip firewall filter&lt;/SPAN&gt;&lt;BR style="margin: 0px; padding: 0px; color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;add action=drop chain=forward disabled=no p2p=all-p2p&lt;/SPAN&gt;&lt;BR style="margin: 0px; padding: 0px; color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;add action=drop chain=forward comment="torrent dht out magnet" content=d1:ad2:ad20 disabled=no dst-port=1025-65535 packet-size=95-190 protocol=udp&lt;/SPAN&gt;&lt;BR style="margin: 0px; padding: 0px; color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;" /&gt;&lt;SPAN style="color: #323d4f; font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; line-height: 18.200000762939453px; background-color: #ececec;"&gt;add action=drop chain=forward comment=info_hash content=info_hash disabled=no dst-port=2170,80 protocol=tcp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Rules 1 and 3 are created in Cisco ZBF. But how to create the rule No.2?&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 04:23:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551262#M237118</guid>
      <dc:creator>Anton Pestov</dc:creator>
      <dc:date>2019-03-12T04:23:35Z</dc:date>
    </item>
    <item>
      <title>Hi,Are you trying to block</title>
      <link>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551263#M237119</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;Are you trying to block P2P traffic? If so please have a look at this link&amp;nbsp;http://yadhutony.blogspot.in/2012/11/how-to-block-p2p-traffic-on-cisco-router.html&lt;/P&gt;&lt;P&gt;Best Regards,&lt;/P&gt;&lt;P&gt;Yadhu&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 04:28:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551263#M237119</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2014-07-03T04:28:07Z</dc:date>
    </item>
    <item>
      <title>Hi, YadhuYour post describes</title>
      <link>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551264#M237124</link>
      <description>&lt;P&gt;Hi, Yadhu&lt;/P&gt;&lt;P&gt;Your post describes generally config rule No. 1:&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: rgb(50, 61, 79); font-family: 'Lucida Grande', 'Trebuchet MS', Helvetica, Arial, sans-serif; font-size: 13px; background-color: rgb(236, 236, 236);"&gt;add action=drop chain=forward disabled=no p2p=all-p2p&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I already have this configuration.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 03 Jul 2014 06:45:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551264#M237124</guid>
      <dc:creator>Anton Pestov</dc:creator>
      <dc:date>2014-07-03T06:45:14Z</dc:date>
    </item>
    <item>
      <title>Solution - using ZBF + FPM:</title>
      <link>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551265#M237125</link>
      <description>&lt;P&gt;Solution - using ZBF + FPM:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Attempt to block torrents was successful, but not completely:&lt;/P&gt;
&lt;P&gt;1 . Downloading of the *.torrent files (content-type: "application/x-bittorrent") - is blocked&lt;/P&gt;
&lt;P&gt;2 . The traffic with requests to list SEEDs of a tracker (... info_hash =... ) - is blocked&lt;/P&gt;
&lt;P&gt;3 . The DHT traffic - is blocked.&lt;/P&gt;
&lt;P&gt;PEX (the advanced DHT version) &amp;nbsp;- doesn't blocked.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Suddenly to whom it is useful, similar to the rules Mikrotik, Cisco ZBF config + FPM:&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;parameter-map type regex REGEX-TORRENT-ANNOUNCE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;pattern .*[Ii][Nn][Ff][Oo]_[Hh][Aa][Ss][Hh]=.*&lt;BR /&gt;parameter-map type regex REGEX-TORRENT-PROHIBIT-DOWNLOAD&lt;BR /&gt;&amp;nbsp;pattern .*application\/x-bittorrent.*|.*\.torrent.*&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map type inspect match-all CLASS-INSPECT-HTTP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;match protocol http&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map type inspect match-any CLASS-INSPECT&lt;BR /&gt;&amp;nbsp;match protocol ftp&lt;BR /&gt;&amp;nbsp;match protocol ftps&lt;BR /&gt;&amp;nbsp;match protocol tftp&lt;BR /&gt;&amp;nbsp;match protocol smtp&lt;BR /&gt;&amp;nbsp;match protocol pop3&lt;BR /&gt;&amp;nbsp;match protocol dns&lt;BR /&gt;&amp;nbsp;match protocol https&lt;BR /&gt;&amp;nbsp;match protocol http&lt;BR /&gt;&amp;nbsp;match protocol sip&lt;BR /&gt;&amp;nbsp;match protocol tcp&lt;BR /&gt;&amp;nbsp;match protocol udp&lt;BR /&gt;&amp;nbsp;match protocol icmp&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;!&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;сlass-map type inspect match-any CLASS-INSPECT-ANY-P2P&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;match protocol gnutella signature&lt;BR /&gt;&amp;nbsp;match protocol kazaa2 signature&lt;BR /&gt;&amp;nbsp;match protocol fasttrack signature&lt;BR /&gt;&amp;nbsp;match protocol bittorrent signature&lt;BR /&gt;class-map type inspect match-all CLASS-INSPECT-P2P&lt;BR /&gt;&amp;nbsp;match class-map CLASS-INSPECT-ANY-P2P&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map type inspect http match-all CLASS-HTTP-TORRENT-PROHIBIT-DOWNLOAD&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;match &amp;nbsp;response header content-type regex REGEX-TORRENT-PROHIBIT-DOWNLOAD&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;сlass-map type inspect http match-all CLASS-HTTP-TORRENT-ANNOUNCE&lt;BR /&gt;&amp;nbsp;match &amp;nbsp;request method get&lt;BR /&gt;&amp;nbsp;match &amp;nbsp;request arg regex REGEX-TORRENT-ANNOUNCE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map type inspect http match-any CLASS-HTTP-PORT-MISUSE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;match &amp;nbsp;request port-misuse p2p&lt;BR /&gt;&amp;nbsp;match &amp;nbsp;req-resp protocol-violation&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map type access-control match-all CLASS-ACCESS-TORRENT-DHT-OUTGOING&lt;BR /&gt;&amp;nbsp;match field UDP length range 95 190&lt;BR /&gt;&amp;nbsp;match start UDP payload-start offset 0 size 190 string "d1:ad2:id20:"&lt;BR /&gt;&amp;nbsp;match field UDP dest-port range 1025 65535&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;class-map type stack match-all CLASS-STACK-IP-UDP&lt;BR /&gt;&amp;nbsp;description *** Stack: [IP [UDP ... ]] ***&lt;BR /&gt;&amp;nbsp;match field IP protocol eq 0x11 next UDP&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;policy-map type inspect http POLICY-HTTP&lt;BR /&gt;&amp;nbsp;class type inspect http CLASS-HTTP-TORRENT-ANNOUNCE&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;&amp;nbsp;class type inspect http CLASS-HTTP-PORT-MISUSE&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;&amp;nbsp;class type inspect http CLASS-HTTP-TORRENT-PROHIBIT-DOWNLOAD&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;&amp;nbsp; log&lt;BR /&gt;policy-map type inspect INSIDE-&amp;gt;INTERNET&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-INSPECT-P2P&lt;BR /&gt;&amp;nbsp; drop&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-INSPECT-HTTP&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp; service-policy http POLICY-HTTP&lt;BR /&gt;&amp;nbsp;class type inspect CLASS-INSPECT&lt;BR /&gt;&amp;nbsp; inspect&lt;BR /&gt;&amp;nbsp;class class-default&lt;BR /&gt;&amp;nbsp; drop&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;policy-map type access-control POLICY-FILTER&lt;BR /&gt;&amp;nbsp;class CLASS-ACCESS-TORRENT-DHT-OUTGOING&lt;BR /&gt;&amp;nbsp; &amp;nbsp;log&lt;BR /&gt;&amp;nbsp; &amp;nbsp;drop all&lt;BR /&gt;policy-map type access-control POLICY-STACK&lt;BR /&gt;&amp;nbsp;class CLASS-STACK-IP-UDP&lt;BR /&gt;&amp;nbsp; service-policy POLICY-FILTER&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;interface GigabitEthernet0/0&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;zone-member security INSIDE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;interface GigabitEthernet0/1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;zone-member security OUTSIDE&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;&amp;nbsp;service-policy type access-control output&amp;nbsp;POLICY-STACK&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;!&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;&lt;SPAN style="font-family: 'courier new', courier, monospace;"&gt;zone-pair security INSIDE-&amp;gt;INTERNET source INSIDE destination INTERNET&lt;BR /&gt;&amp;nbsp;service-policy type inspect INSIDE-&amp;gt;INTERNET&lt;/SPAN&gt;&lt;/P&gt;
&lt;P style="color: #777777; font-size: 14px;"&gt;!&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 14:36:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551265#M237125</guid>
      <dc:creator>Anton Pestov</dc:creator>
      <dc:date>2015-12-08T14:36:33Z</dc:date>
    </item>
    <item>
      <title>for completely block torrents</title>
      <link>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551266#M237128</link>
      <description>&lt;P&gt;for completely block torrents see...&lt;/P&gt;
&lt;P&gt;&lt;A href="http://netconfigure.net/index.php/ru/forum/12-konfiguratsiya-setevogo-oborudovaniya/174-cisco-zbf-fpm-vs-mikrotik-firewall-kak-zablokirovat-p2p-torrent-torrents-trekery-dht-pex" title="ZBF + FPM"&gt;http://netconfigure.net/index.php/ru/forum/12-konfiguratsiya-setevogo-oborudovaniya/174-cisco-zbf-fpm-vs-mikrotik-firewall-kak-zablokirovat-p2p-torrent-torrents-trekery-dht-pex&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2015 14:36:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/cisco-zbf-how-completely-to-block-torrents-solved/m-p/2551266#M237128</guid>
      <dc:creator>Anton Pestov</dc:creator>
      <dc:date>2015-12-08T14:36:34Z</dc:date>
    </item>
  </channel>
</rss>

