<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking P2P file sharing w/PIX 515 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378886#M554799</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you have to see the fixup protocol more like a proxy service (http. smtp..)that filters out some commands for certain protols and a control mechanism for other ones like h323, sip ... that controls that communication of that protols which ports are used in replys for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Definition in command reference v 6.3: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usage Guidelines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fixup protocol command performs the Adaptive Security Algorithm based on different port numbers other than the defaults.  This command is global and changes things for both inbound and outbound connections, and cannot be restricted to any static command statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable a service like http you need a static and an access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;YES all inbound connection without a specific access-list on the outside interfacse are by default blocked. But in case of P2P Applications if there is no limitation on an inside access-list the inside hosts can access anything on the Internet and even with an access-list that would just permit foe exmaple http ans https most of that P2P Applications  are still working as they use http as standard protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way ona PIX to block them is to block the destination IP and ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 16 Nov 2004 15:53:48 GMT</pubDate>
    <dc:creator>Patrick Iseli</dc:creator>
    <dc:date>2004-11-16T15:53:48Z</dc:date>
    <item>
      <title>Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378885#M554797</link>
      <description>&lt;P&gt;I found the link below about how to set up an ACL for blocking P2P file sharing.  My question is that I was under the impression that the PIX blocked all ports coming in by default and that the only ports allowed are 80 and those defined by the fixup protocol statements....if this is true do I really need to follow the below link info?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a00801e419a.shtml" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a00801e419a.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;See below....&lt;/P&gt;&lt;P&gt;:&lt;/P&gt;&lt;P&gt;PIX Version 6.3(3)&lt;/P&gt;&lt;P&gt;interface ethernet0 auto&lt;/P&gt;&lt;P&gt;interface ethernet1 10baset&lt;/P&gt;&lt;P&gt;interface ethernet2 auto&lt;/P&gt;&lt;P&gt;nameif ethernet0 outside security0&lt;/P&gt;&lt;P&gt;nameif ethernet1 inside security100&lt;/P&gt;&lt;P&gt;nameif ethernet2 dmz security4&lt;/P&gt;&lt;P&gt;enable password xxxx&lt;/P&gt;&lt;P&gt;passwd xxxxx&lt;/P&gt;&lt;P&gt;hostname pixCL&lt;/P&gt;&lt;P&gt;domain-name eisenmann.com&lt;/P&gt;&lt;P&gt;fixup protocol dns maximum-length 512&lt;/P&gt;&lt;P&gt;no fixup protocol ftp 21&lt;/P&gt;&lt;P&gt;fixup protocol ftp 20-21&lt;/P&gt;&lt;P&gt;fixup protocol h323 h225 1720&lt;/P&gt;&lt;P&gt;fixup protocol h323 ras 1718-1719&lt;/P&gt;&lt;P&gt;fixup protocol http 80&lt;/P&gt;&lt;P&gt;fixup protocol ils 389&lt;/P&gt;&lt;P&gt;fixup protocol rsh 514&lt;/P&gt;&lt;P&gt;fixup protocol rtsp 554&lt;/P&gt;&lt;P&gt;fixup protocol sip 5060&lt;/P&gt;&lt;P&gt;fixup protocol sip udp 5060&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 07:45:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378885#M554797</guid>
      <dc:creator>madlm</dc:creator>
      <dc:date>2020-02-21T07:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378886#M554799</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, you have to see the fixup protocol more like a proxy service (http. smtp..)that filters out some commands for certain protols and a control mechanism for other ones like h323, sip ... that controls that communication of that protols which ports are used in replys for example.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Definition in command reference v 6.3: &lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379" target="_blank"&gt;http://www.cisco.com/en/US/products/sw/secursw/ps2120/products_command_reference_chapter09186a00801727a8.html#wp1067379&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usage Guidelines&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The fixup protocol command performs the Adaptive Security Algorithm based on different port numbers other than the defaults.  This command is global and changes things for both inbound and outbound connections, and cannot be restricted to any static command statements. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To enable a service like http you need a static and an access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;YES all inbound connection without a specific access-list on the outside interfacse are by default blocked. But in case of P2P Applications if there is no limitation on an inside access-list the inside hosts can access anything on the Internet and even with an access-list that would just permit foe exmaple http ans https most of that P2P Applications  are still working as they use http as standard protocol.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The only way ona PIX to block them is to block the destination IP and ports. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2004 15:53:48 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378886#M554799</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2004-11-16T15:53:48Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378887#M554801</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;To add to patricks post, you can block the following :&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;depending on the P2P applications, you can configure extended access-lists and block the P2P communication. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for kaaza, block tcp &amp;amp; udp ports 1214 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;for gnutella, block tcp &amp;amp; udp ports 6346 / 6347 &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Refer to the following URL for more information of P2P blocking:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a00801e419a.shtml#edonkey" target="_blank"&gt;http://www.cisco.com/en/US/tech/tk583/tk372/technologies_tech_note09186a00801e419a.shtml#edonkey&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;All the best !!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2004 20:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378887#M554801</guid>
      <dc:creator>sachinraja</dc:creator>
      <dc:date>2004-11-16T20:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378888#M554803</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;By default the PIX will permit all outbound traffic through.  It will also permit all reply traffic to the outbound traffic through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The PIX will however block all incoming traffic unless you create an Access List to permit certain traffic through.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Once you create an Access List and apply it to an interface, then ANY traffic that you want to permit to pass through that interface MUST be permitted via an Access List statement.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Access Lists are parsed in a top down fashion.  Therefore, the firt Access List statement will take precedence over the next Access List statement.  Because of this, you must be absolutely certain that the Access List statements are in the proper order to permit or deny the traffic the way you think it should be.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Richard J. Bramble&lt;/P&gt;&lt;P&gt;&lt;A href="mailto:ribrambl@rmcare.com"&gt;ribrambl@rmcare.com&lt;/A&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 16 Nov 2004 23:47:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378888#M554803</guid>
      <dc:creator>rckymtn</dc:creator>
      <dc:date>2004-11-16T23:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378889#M554805</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Take a look at this web site:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://outpostfirewall.com/guide/rules/preset_rules/p2p.htm" target="_blank"&gt;http://outpostfirewall.com/guide/rules/preset_rules/p2p.htm&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-custom" href="http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.1dd67f13" target="_blank"&gt;http://forum.cisco.com/eforum/servlet/NetProf?page=netprof&amp;amp;CommCmd=MB%3Fcmd%3Ddisplay_location%26location%3D.1dd67f13&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So until now it looks like that right:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Blubster/Piolet Configuration&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any 128.121.20.0 255.255.255.240 eq www&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any 128.121.4.0 255.255.255.0 eq www&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#eDonkey&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 4662&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Kaaza&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any eq 1214&lt;/P&gt;&lt;P&gt;access-list outbound deny udp any any eq 1214&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;#Gnutella&lt;/P&gt;&lt;P&gt;access-list outbound deny tcp any any range 6346 6347&lt;/P&gt;&lt;P&gt;access-list outbound deny ucp any any range 6346 6347&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;access-list outbound permit ip any any&lt;/P&gt;&lt;P&gt;access-group outbound in interface inside&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please new ones !!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 01:51:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378889#M554805</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2004-11-18T01:51:01Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378890#M554807</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I wrote that "Blocking P2P file-sharing apps with the PIX" doco you reference, and believe me, blocking port 1214 will NOT block P2P apps like Kazaa.  They do initially try to get out on 1214 but if that is blocked then they'll try any port, including port 80.  You can't simply block Kazaa and the like with an access-list.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best thing to do, if you can't use NBAR in the way I've detailed in the document, but you have some sort of rate-limiting available, is to allow port 1214, but rate-limit it right down to virtually nothing.  If the initial 1214 connection succeeds then Kazaa and the like will use it, but because it's been rate-limited right down users will be unable to download anything, or it'll be so slow they'll eventually give up and try from home rather than work.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 04:45:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378890#M554807</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2004-11-18T04:45:37Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378891#M554808</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Glenn,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I heard on the PVT Security meeting that it will be possible to block auch applications as P2P and Chat.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;PIX OS 7.0 features:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Enterprise-class, advanced HTTP inspection services help protect from web-based attacks and other types of &amp;#147;port 80 misuse&amp;#148;&lt;/P&gt;&lt;P&gt;- Includes customizable policies for detecting and blocking tunneled&lt;/P&gt;&lt;P&gt;applications and attacks, including:&lt;/P&gt;&lt;P&gt;- Instant messaging applications (AIM, MSN Messenger, Yahoo)&lt;/P&gt;&lt;P&gt;- Peer-to-peer applications (KaZaA)&lt;/P&gt;&lt;P&gt;- Adds advanced TCP stream re-assembly and de-obfuscation engines for hidden attack detection&lt;/P&gt;&lt;P&gt;- Provides RFC compliance checking for protocol anomaly detection&lt;/P&gt;&lt;P&gt;- Supports HTTP command filtering for improved control and attack mitigation&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Will this be in the same way as NBAR ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;sincerely&lt;/P&gt;&lt;P&gt;Patrick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 14:50:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378891#M554808</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2004-11-18T14:50:50Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378892#M554809</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;What is the release date for 7.0 ?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 19:17:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378892#M554809</guid>
      <dc:creator>madlm</dc:creator>
      <dc:date>2004-11-18T19:17:44Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378893#M554812</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;First quarter of 2005 as I heard.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 19:57:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378893#M554812</guid>
      <dc:creator>Patrick Iseli</dc:creator>
      <dc:date>2004-11-18T19:57:43Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378894#M554814</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;PIX v7.0 code is in Phase 2 of the beta at the moment, open beta (open to anyone) is scheduled at this point dor early December, and then it should go into a proper release on CCO early next year.  That of course assumes that everything in the beta goes according to plan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;There is a more advanced inspection engine for numerous protocols in v7.0, the HTTP inspection engine will deifantely detect more things.  again though this assumes that the traffic is on TCP/80, but if Kazaa or the like connect on a different port then the inspection engine isn't going to see it. &lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 18 Nov 2004 22:35:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378894#M554814</guid>
      <dc:creator>gfullage</dc:creator>
      <dc:date>2004-11-18T22:35:26Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378895#M554816</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Does open beta mean a regular user who is not in Phase 2 can go into CCO and see 7.0 as one of the downloadable options?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2004 18:51:25 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378895#M554816</guid>
      <dc:creator>hugodrax</dc:creator>
      <dc:date>2004-11-24T18:51:25Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking P2P file sharing w/PIX 515</title>
      <link>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378896#M554819</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to configure using NBAR as detailed by your article but it doesnt seem to work. Imesh still manages to pass through unabated. Sometimes I can see some packets matches but thats it. I have checked out the PDLMs. The latest on Kazaa for e.g was in 2002. Similarly some of the others have not been updated. I am pasting the relevant portions of the config over here.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think rate-limiting seems to be the better idea, as i do see some matches in the show policy map interface command. &lt;/P&gt;&lt;P&gt;Technical Support: &lt;A class="jive-link-custom" href="http://www.cisco.com/techsupport" target="_blank"&gt;http://www.cisco.com/techsupport&lt;/A&gt;&lt;/P&gt;&lt;P&gt;Copyright (c) 1986-2004 by cisco Systems, Inc.&lt;/P&gt;&lt;P&gt;Compiled Sat 28-Aug-04 10:53 by cmong&lt;/P&gt;&lt;P&gt;Image text-base: 0x60008950, data-base: 0x60D0A000&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ROM: System Bootstrap, Version 11.1(20)AA2, EARLY DEPLOYMENT RELEASE SOFTWARE (f&lt;/P&gt;&lt;P&gt;c1)&lt;/P&gt;&lt;P&gt;ROM: 3600 Software (C3640-IO3-M), Version 12.2(15)T14, RELEASE SOFTWARE (fc4)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;XXX uptime is 1 week, 6 days, 5 hours, 0 minutes&lt;/P&gt;&lt;P&gt;System returned to ROM by reload&lt;/P&gt;&lt;P&gt;System image file is "slot0:c3640-io3-mz.122-15.T14.bin"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;cisco 3640 (R4700) processor (revision 0x00) with 123904K/7168K bytes of memory.&lt;/P&gt;&lt;P&gt;Processor board ID 26614988&lt;/P&gt;&lt;P&gt;R4700 CPU at 100Mhz, Implementation 33, Rev 1.0&lt;/P&gt;&lt;P&gt;Bridging software.&lt;/P&gt;&lt;P&gt;X.25 software, Version 3.0.0.&lt;/P&gt;&lt;P&gt;2 Ethernet/IEEE 802.3 interface(s)&lt;/P&gt;&lt;P&gt;3 Serial network interface(s)&lt;/P&gt;&lt;P&gt;DRAM configuration is 64 bits wide with parity disabled.&lt;/P&gt;&lt;P&gt;125K bytes of non-volatile configuration memory.&lt;/P&gt;&lt;P&gt;20480K bytes of pService-policy input: P2P&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;    Class-map: GNUTELLA (match-any)&lt;/P&gt;&lt;P&gt;      3720 packets, 231680 bytes&lt;/P&gt;&lt;P&gt;      5 minute offered rate 0 bps, drop rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol fasttrack file-transfer "*"&lt;/P&gt;&lt;P&gt;        0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;        5 minute rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol gnutella file-transfer "*"&lt;/P&gt;&lt;P&gt;        0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;        5 minute rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol napster non-std&lt;/P&gt;&lt;P&gt;        0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;        5 minute rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol kazaa2 file-transfer "*"&lt;/P&gt;&lt;P&gt;        148 packets, 9493 bytes&lt;/P&gt;&lt;P&gt;        5 minute rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol http url "\.hash=*"&lt;/P&gt;&lt;P&gt;        0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;        5 minute rate 0 bps&lt;/P&gt;&lt;P&gt;      Match: protocol http url "/.hash=*"&lt;/P&gt;&lt;P&gt;        0 packets, 0 bytes&lt;/P&gt;&lt;P&gt;        5 minute rate 0 bpsrocessor board PCMCIA Slot0 flash (Read/Write)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Configuration register is 0x2142 (will be 0x2102 at next reload)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Best Regards&lt;/P&gt;&lt;P&gt;Shahryar Khan&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Nov 2004 22:51:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/blocking-p2p-file-sharing-w-pix-515/m-p/378896#M554819</guid>
      <dc:creator>shahryar.k</dc:creator>
      <dc:date>2004-11-24T22:51:52Z</dc:date>
    </item>
  </channel>
</rss>

