<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Block P2P traffic in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052301#M396238</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yadhu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We definetly tried it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 08 Nov 2012 21:36:31 GMT</pubDate>
    <dc:creator>Julio Carvajal</dc:creator>
    <dc:date>2012-11-08T21:36:31Z</dc:date>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052289#M396220</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have tried the below configuration to block the P2P traffic.But still the users can download using utorrent client. How do I effectively block all the P2P traffic. Please help.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Class Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-any ALL-P2P-PROTOCOLS&lt;BR /&gt;match protocol edonkey signature&lt;BR /&gt;match protocol gnutella signature&lt;BR /&gt;match protocol kazaa2 signature&lt;BR /&gt;match protocol fasttrack signature&lt;BR /&gt;match protocol bittorrent signature&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;class-map type inspect match-all P2P-PROTOCOL&lt;BR /&gt;match class-map ALL-P2P-PROTOCOLS&lt;BR /&gt;match access-group name INTERNET-ACL&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;class-map type inspect http match-any HTTP-PORT-MISUSE&lt;BR /&gt;match&amp;nbsp; request port-misuse im&lt;BR /&gt;match&amp;nbsp; request port-misuse p2p&lt;BR /&gt;match&amp;nbsp; request port-misuse tunneling&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt;Policy Map&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="text-decoration: underline;"&gt; &lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;policy-map type inspect http HTTP-PORT-MISUSE-POLICY&lt;BR /&gt;class type inspect http HTTP-PORT-MISUSE&lt;BR /&gt;&amp;nbsp; reset&lt;BR /&gt;&amp;nbsp; log&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;policy-map type inspect IN-TO-OUT-POLICY&lt;BR /&gt;class type inspect P2P-PROTOCOL&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;class class-default&lt;BR /&gt;&amp;nbsp; drop log&lt;BR /&gt;class type inspect HTTP-ACCESS&lt;BR /&gt;&amp;nbsp; inspect&lt;/P&gt;&lt;P&gt;&amp;nbsp; service-policy http HTTP-PORT-MISUSE-POLICY&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also I am attaching the logs and 'show policy-map type inspect zone-pair IN-TO-OUT' output. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help me out.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 00:18:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052289#M396220</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2019-03-12T00:18:02Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052290#M396223</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you share the ACL INTERNET-ACL&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 02 Nov 2012 17:25:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052290#M396223</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-02T17:25:43Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052291#M396224</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please see the ACL INTERNET-ACL &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip access-list extended INTERNET-ACL&lt;/P&gt;&lt;P&gt; permit ip host 172.17.0.81 any&lt;/P&gt;&lt;P&gt; permit ip host 172.17.0.82 any&lt;/P&gt;&lt;P&gt; permit ip host 172.17.0.83 any&lt;/P&gt;&lt;P&gt; permit ip host 172.17.0.84 any&lt;/P&gt;&lt;P&gt; permit ip host 172.17.0.111 any&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 216.239.32.0 0.0.31.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 64.233.160.0 0.0.31.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 66.249.64.0 0.0.31.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 72.14.192.0 0.0.63.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 209.85.128.0 0.0.127.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 66.102.0.0 0.0.15.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 74.125.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 64.18.0.0 0.0.15.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 207.126.144.0 0.0.15.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.53 173.194.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 216.239.32.0 0.0.31.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 64.233.160.0 0.0.31.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 66.249.64.0 0.0.31.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 72.14.192.0 0.0.63.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 209.85.128.0 0.0.127.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 66.102.0.0 0.0.15.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 74.125.0.0 0.0.255.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 64.18.0.0 0.0.15.255&lt;/P&gt;&lt;P&gt; permit ip host 172.17.1.103 207.126.144.0 0.0.15.255&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 03:27:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052291#M396224</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-11-03T03:27:16Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052292#M396225</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope you are doing great &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;What happens if you take out the ACL from the class-map, Does it make a difference?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 04:25:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052292#M396225</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-03T04:25:01Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052293#M396226</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I removed 'INTERNET-ACL' from&amp;nbsp; 'class-map type inspect match-all P2P-PROTOCOL' but still P2P traffic is allowed. Could you please tell me what I am doing wrong?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 05:19:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052293#M396226</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-11-03T05:19:52Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052294#M396227</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yadhu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Actually the configuration looks good but block bittorrent traffic and P2P connections now days is not as simple.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There are several ways this connections can try to bypass our security policies but I think we can add more stuff to our configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please read the following document and add follow the configuration they have applied,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/white_paper_c27_543585.html"&gt;http://www.cisco.com/en/US/prod/collateral/vpndevc/ps5708/ps5710/ps1018/white_paper_c27_543585.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know if there is something you do not understand on that config,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 05:39:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052294#M396227</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-03T05:39:17Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052295#M396228</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your reply and link. The configuration seems to be very refined. Let me try it out and inform you of the outcome. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yadhu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 03 Nov 2012 06:04:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052295#M396228</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-11-03T06:04:51Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052296#M396229</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is an update from my side. I followed the link and modified the configuration. Unfortunately the result is negative. But I found that more packets are being dropped because of the tight policies. Anyway thank you so much for your help and support. Please let me know if there is any better method available so that we can block the entire traffic that kills our bandwidth. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Tony &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 10:51:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052296#M396229</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-11-05T10:51:43Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052297#M396230</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Tony,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Okay. I have seen on the last couple of days that because of how this protocols are being tunneled or jumping from one port to another, etc. Its pretty difficult to blok it with ZBFW.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So instead of doing that I would like to check if we can block it with NBAR, can we give it a try ??? If yes, here is how&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;class-map match-any p2p&lt;BR /&gt;match protocol edonkey&lt;BR /&gt;match protocol fasttrack&lt;BR /&gt;match protocol gnutella&lt;BR /&gt;match protocol kazaa2&lt;BR /&gt;match protocol winmx&lt;BR /&gt;match protocol skype&lt;BR /&gt;match protocol cuseeme&lt;BR /&gt;match protocol novadigm&lt;BR /&gt;match protocol ssh&lt;BR /&gt;match protocol irc&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;policy-map P2P-DROP&lt;BR /&gt;class p2p&lt;BR /&gt;drop&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="color: #444444; font-family: verdana, sans-serif; font-size: 12px; line-height: 21px; background-color: #ffffff;"&gt;Apply the policy to the user-facing (incoming) interface.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;int xxxxx&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;You can verify the status by doing:&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sh policy-map int xxx&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;sh ip nbar protocol-discovery&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Let me know the result,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remembe to rate all of the helpful posts&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;service-policy input P2P-DROP&lt;/STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG style="font-family: Lora, serif; font-size: 16px; line-height: 25px;"&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 05 Nov 2012 17:42:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052297#M396230</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-05T17:42:16Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052298#M396231</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your reply. Yeah, NBAR feature is more stronger than ZBFW ! More packets are being dropped after I configure NBAR on my router. But still it is not completely blocked. Please see the 'sh policy-map interface gi0/0 input' output :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ISR#sh policy-map interface gi0/0 input&lt;BR /&gt; GigabitEthernet0/0&lt;/P&gt;&lt;P&gt;&amp;nbsp; Service-policy input: P2P-DROP&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: P2P (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 108893 packets, 11349383 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute offered rate 5000 bps, drop rate 5000 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol edonkey&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 328 packets, 250522 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol fasttrack&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 98 packets, 6066 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol gnutella&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol winmx&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol cuseeme&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2 packets, 290 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol kazaa2&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol irc&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 0 packets, 0 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: protocol bittorrent&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 108298 packets, 11050790 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute rate 5000 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; drop&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Class-map: class-default (match-any)&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3329777 packets, 1295326162 bytes&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5 minute offered rate 209000 bps, drop rate 0 bps&lt;BR /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Match: any&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Tony&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 11:23:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052298#M396231</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-11-06T11:23:19Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052299#M396232</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yadhu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then I will suggest you to use an aplication to block this as the ZBFW or NBAR had&amp;nbsp; been able to block this,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;At least the ZBFW let you know how is using P2P application so you can go and talk to them &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt; but based on the last cases I have seen p2p applications have not been succesfully block ( 100 %&amp;nbsp; talking)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 06 Nov 2012 19:11:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052299#M396232</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-06T19:11:52Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052300#M396235</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Hello Julio,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyway that was a nice experiment with P2P traffic &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_macro_emoticon" src="https://community.cisco.com/4.5.4/images/tiny_mce3/plugins/jiveemoticons/images/spacer.gif"&gt;&lt;/SPAN&gt;&amp;nbsp; Feel it is better to use an application like Symantec Endpoint Protection.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yadhu&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 09:29:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052300#M396235</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-11-08T09:29:52Z</dc:date>
    </item>
    <item>
      <title>Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052301#M396238</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yadhu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Exactly,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We definetly tried it &lt;SPAN __jive_emoticon_name="grin" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/grin.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Remember to rate all of the helpful posts &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 08 Nov 2012 21:36:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052301#M396238</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-11-08T21:36:31Z</dc:date>
    </item>
    <item>
      <title>Re: Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052302#M396240</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I just summarized the discussion and published it on &lt;A href="http://yadhutony.blogspot.in/2012/11/how-to-block-p2p-traffic-on-cisco-router.html" rel="nofollow"&gt;http://yadhutony.blogspot.in/2012/11/how-to-block-p2p-traffic-on-cisco-router.html&lt;/A&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It gives me the best result !&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks Julio for your support.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, &lt;BR /&gt;Tony &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://yadhutony.blogspot.com" rel="nofollow"&gt;http://yadhutony.blogspot.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Dec 2012 12:18:30 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052302#M396240</guid>
      <dc:creator>Yadhu Tony</dc:creator>
      <dc:date>2012-12-15T12:18:30Z</dc:date>
    </item>
    <item>
      <title>Re: Block P2P traffic</title>
      <link>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052303#M396243</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hello Yadhu,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Good job with the document, really clear &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Yes, I would say an external dedicated server or device will be need it to block this traffic ( maybe with a deeper application inspection)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Julio&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 15 Dec 2012 17:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/block-p2p-traffic/m-p/2052303#M396243</guid>
      <dc:creator>Julio Carvajal</dc:creator>
      <dc:date>2012-12-15T17:52:55Z</dc:date>
    </item>
  </channel>
</rss>

