"Trevor Corness, CCNA" wrote:
>
> The list went through this several times already.
>
> Blocking ports 4444, 5555, 6666, 7777 is useless.. since Beta6, Napster has
> been able to work on ANY port, INCLUDING 80.. so to kill Napster, you would
> have to kill all access to http/tcp80.. NOT good. Blocking the IPs is the
> best and most thorough solution at this time.
The closest "block" would be to negate my access list below, but this
list is what we have used to at least get an idea of the level of
Napster use. My comments thrown in:
Extended IP access list ingress-filter (well, a piece of it)
! real-time streaming protocol
permit tcp any eq 554 any (1313 matches)
! default Scour port if I recall correctly
permit tcp any eq 1863 any (1591 matches)
! to signon to the Napster service defaults to port 8875; usually
! just one or a few packets to establish a signon and get an index
! server
permit tcp any eq 8875 any log-input (222 matches)
! Index servers typically on 8888/7777/6666/5555/4444
permit tcp any eq 8888 any (10200 matches)
permit tcp any eq 7777 any (6719 matches)
permit tcp any eq 6666 any (4 matches)
! Default Gnutella port
permit tcp any eq 6346 any
permit tcp any any eq 6346
! More Napster index ports
permit tcp any eq 5555 any
permit tcp any eq 4444 any (7 matches)
! Typical range of Napster file transfers
permit tcp any range 6680 6699 any (4800 matches)
permit tcp any any range 6680 6699
Now that fall semester is back in full swing, we had a big increase
in file sharing traffic, so we are playing with 'traffic-shape group'
command to try and limit their bandwidth. I'd be interested in the
configs if anyone else is doing this (or similar) to throttle traffic.
Jeff Kell <[EMAIL PROTECTED]>
**NOTE: New CCNA/CCDA List has been formed. For more information go to
http://www.groupstudy.com/list/Associates.html
_________________________________
UPDATED Posting Guidelines: http://www.groupstudy.com/list/guide.html
FAQ, list archives, and subscription info: http://www.groupstudy.com
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]