Maybe this will help. This is for the CISCO PIX firewall, but the ports and ip's should work on other firewalls.
Heath Calhoun Hi Gang, For those of you unfamiliar with Outbound/Apply, I have converted the outbound statments to an access-list. Be certain that the last statement in this list is a "permit ip any any". Bind this list to any interface you want to block these ports. Please note that many of the deny statements became unnecessary once the outbound was converted. ie: if you permit access to only port 80, you don't need an explicit deny for the other ports. I have translated these without the benefit of a PIX at my disposal, so please don't judge me too harshly if there are mistakes. As Brian cautioned previously, please TEST before applying to a production PIX. Enjoy, Dave Yahoo Ports: Access-list 101 deny any tcp any any eq 5000 Access-list 101 deny any tcp any any eq 5001 Access-list 101 deny any tcp any any eq 5050 Access-list 101 deny any tcp any any eq 5100 Access-list 101 deny any udp any any eq 5050 Access-list 101 deny any udp any any eq 5100 AOL Ports (also one ICQ): Access-list 101 deny any tcp any any range 5190 5193 Access-list 101 deny any udp any any range 5190 5193 Gnutella (non-transforming): Access-list 101 deny any tcp any any eq 6346 Access-list 101 deny any tcp any any eq 6347 Access-list 101 deny any udp any any eq 6346 Access-list 101 deny any udp any any eq 6347 IRC: Access-list 101 deny any tcp any any range 6665 6669 Access-list 101 deny any udp any any range 6665 6669 ICQ: Access-list 101 deny any udp any any eq 4000 MSN: Access-list 101 deny any tcp any any eq 1863 iChat: Access-list 101 deny any tcp any any eq 4020 Access-list 101 deny any udp any any eq 4020 e-share-chat: Access-list 101 deny any tcp any any eq 5760 Misc Chat ports: Access-list 101 deny any tcp any any range 9992 9998 Access-list 101 deny any udp any any range 9992 9998 Quake Gaming: Access-list 101 deny any tcp any any eq 26000 Access-list 101 deny any udp any any eq 26000 MSN Gaming: Access-list 101 deny any tcp any any range 28800 29000 Access-list 101 deny any udp any any range 28800 29000 Doom Gaming: Access-list 101 deny any tcp any any eq 666 Access-list 101 deny any udp any any eq 666 AOL Servers: Access-list 101 permit any tcp any 205.188.0.0 255.255.0.0 eq www Access-list 101 permit any tcp any 64.12.0.0 255.255.0.0 eq www Yahoo Servers: Access-list 101 permit any tcp any host 216.136.225.12 eq www Access-list 101 permit any tcp any host 216.136.175.143 eq www Access-list 101 permit any tcp any host 216.136.175.144 eq www Access-list 101 permit any tcp any host 216.136.175.145 eq www Access-list 101 permit any tcp any host 216.136.226.209 eq www Access-list 101 permit any tcp any host 216.136.226.210 eq www Access-list 101 permit any tcp any host 216.136.227.166 eq www Access-list 101 permit any tcp any host 216.136.227.167 eq www Access-list 101 deny any tcp any host 216.136.225.83 Access-list 101 deny any tcp any host 216.136.225.48 ICQ Servers: Access-list 101 permit any tcp any 64.12.162.0 255.255.254.0 eq www MSN Servers: Access-list 101 permit any tcp any 64.4.13.129 255.255.255.128 eq www >From: "brford" <[EMAIL PROTECTED]> >Reply-To: [EMAIL PROTECTED] >To: [EMAIL PROTECTED] >Subject: [PIX_Firewall] Blocking Chat & Gaming Apps >Date: Mon, 25 Feb 2002 14:01:31 -0000 >MIME-Version: 1.0 > >List, > >I found this post on another list. As always you should attempt to >verify before actually implementing it yourself. Also note that the >author was using an older PIX OS and wrote this using "outbound" >commands. It should be updated to ACLs. > >Liberty for All, > >Brian > >QUOTE > >Hi All. As with many comapanies, our IT department was asked if it >would be possible to block all chatting ports. Apparently a good >deal of the employees were spending a little too much time talking >with friends rather than working. The other senior admin and myself >came up with the list of ports and servers that had to be blocked, >and came up with quite list! > >What makes it difficult in some cases is that the chat services can >use just about any port as an alternative to their defaults if >they're not available. The way around this was to block login and >authentication abilities on the parent servers. The following is a >list of the "outbound deny" commands used to make it all work: > >Yahoo Ports: >outbound 20 deny 0.0.0.0 0.0.0.0 5000 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 5001 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 5050 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 5100 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 5050 udp >outbound 20 deny 0.0.0.0 0.0.0.0 5100 udp > >AOL Ports (also one ICQ): >outbound 20 deny 0.0.0.0 0.0.0.0 5190-5193 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 5190-5193 udp > >Gnutella (non-transforming): >outbound 20 deny 0.0.0.0 0.0.0.0 6346 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 6347 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 6346 udp >outbound 20 deny 0.0.0.0 0.0.0.0 6347 udp > >IRC: >outbound 20 deny 0.0.0.0 0.0.0.0 6665-6669 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 6665-6669 udp > >ICQ: >outbound 20 deny 0.0.0.0 0.0.0.0 4000 udp > >MSN: >outbound 20 deny 0.0.0.0 0.0.0.0 1863 tcp > >iChat: >outbound 20 deny 0.0.0.0 0.0.0.0 4020 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 4020 udp > >e-share-chat: >outbound 20 deny 0.0.0.0 0.0.0.0 5760 tcp > >Misc Chat ports: >outbound 20 deny 0.0.0.0 0.0.0.0 9992-9998 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 9992-9997 udp > >Quake Gaming: >outbound 20 deny 0.0.0.0 0.0.0.0 26000 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 26000 udp > >MSN Gaming: >outbound 20 deny 0.0.0.0 0.0.0.0 28800-29000 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 28800-29000 udp > >Doom Gaming: >outbound 20 deny 0.0.0.0 0.0.0.0 666 tcp >outbound 20 deny 0.0.0.0 0.0.0.0 666 udp > >AOL Servers: >outbound 20 deny 205.188.0.0 255.255.0.0 0 tcp >outbound 20 deny 64.12.0.0 255.255.0.0 0 tcp >outbound 20 permit 64.12.0.0 255.255.0.0 80 tcp >outbound 20 permit 205.188.0.0 255.255.0.0 80 tcp > >Yahoo Servers: >outbound 20 deny 216.136.175.143 255.255.255.255 0 tcp >outbound 20 deny 216.136.175.144 255.255.255.255 0 tcp >outbound 20 deny 216.136.175.145 255.255.255.255 0 tcp >outbound 20 deny 216.136.225.83 255.255.255.255 0 tcp >outbound 20 deny 216.136.225.48 255.255.255.255 0 tcp >outbound 20 deny 216.136.226.209 255.255.255.255 0 tcp >outbound 20 deny 216.136.226.210 255.255.255.255 0 tcp >outbound 20 deny 216.136.227.166 255.255.255.255 0 tcp >outbound 20 deny 216.136.227.167 255.255.255.255 0 tcp >outbound 20 permit 216.136.225.12 255.255.255.255 80 tcp >outbound 20 permit 216.136.175.143 255.255.255.255 80 tcp >outbound 20 permit 216.136.175.144 255.255.255.255 80 tcp >outbound 20 permit 216.136.175.145 255.255.255.255 80 tcp >outbound 20 permit 216.136.225.12 255.255.255.255 80 tcp >outbound 20 permit 216.136.226.209 255.255.255.255 80 tcp >outbound 20 permit 216.136.226.210 255.255.255.255 80 tcp >outbound 20 permit 216.136.227.166 255.255.255.255 80 tcp >outbound 20 permit 216.136.227.167 255.255.255.255 80 tcp > >ICQ Servers: >outbound 20 deny 64.12.162.0 255.255.254.0 0 tcp >outbound 20 permit 64.12.162.0 255.255.254.0 80 tcp > >MSN Servers: >outbound 20 deny 64.4.13.129 255.255.255.128 0 tcp >outbound 20 permit 64.4.13.129 255.255.255.128 80 tcp > >Now, when applying these to your firewall, make sure the number >following outbound equals that of your outbound apply statement. >Once added, these pretty much kill all chatting, some common gaming >ports, and most of the file sharing software. Because of port >transforming, it's not 100% effective for file transfer software, but >so far, it seems chatting has been completely eliminated. I hope you >find this a time-saver! :) > >UNQUOTE > > _________________________________________________________________ Chat with friends online, try MSN Messenger: http://messenger.msn.com ------------------------ Yahoo! Groups Sponsor ---------------------~--> Tiny Wireless Camera under $80! Order Now! FREE VCR Commander! Click Here - Only 1 Day Left! http://us.click.yahoo.com/nuyOHD/7.PDAA/yigFAA/kgFolB/TM ---------------------------------------------------------------------~-> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] Your use of Yahoo! Groups is subject to http://docs.yahoo.com/info/terms/ -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Monday, March 11, 2002 1:25 PM To: [EMAIL PROTECTED] Subject: IM Programs Hello all. After watching this list for a few weeks and following one thread regarding Instant Messengers, I have this to say. I HATE INSTANT MESSENGERS. It is virtually impossible to block them with a firewall. Here is my experience with each thus far. AOL Instant Messenger - Ok, I have been able to block this one with pretty solid results. I had to pretty much block 1 class C's worth of addresses in the 64 region of AOL's address range, but have not heard any complaints thus far. The program is pretty damn smart about getting around rules in your firewall. It will try and use FTP, TELNET, HTTP, FINGER, NETBIOS over IP, APPLETALK over IP, 1080 (SOCKS), 1024, Lotus Notes (TCP 1352) and a few others. I pretty much locked the subnet down but AIM was somehow getting through. I finally figured out that my CheckPoint firewall was allowing DNS traffic outbound in my rule base above rule 1. I had to go to the Properties section and disable the implicit access to DNS (TCP/UDP 53). Once I did that, it killed AIM altogether. Yahoo Instant Messenger - Ok, this program sucks in that they spread out their Authentication servers across multiple machines and subnets. The shotgun aproach to locking down a full subnet backfired when people started to complain about not being able to access Yahoo! web mail or Yahoo Finance. I still have more work to do on this one. MSN - Eegad. This is probably the most difficult to block. From my investigation, if port 1864 is blocked (MSN's Auth port), it will use HTTP and access one of the main MSN pages. So, I have a choice; kill off access to MSN outright or allow MSN to run if people manage to install it. :( ICQ - I have not even played with this one yet, but as I remember, it will also auto-hack to get around firewalls. PROPOSAL: =========== I'd like to compile as complete a list as possible of ALL IP addresses of the hosts that the IM clients will attempt to connect to. Its a lot of work on the firewall, but its the only way I can see to stop the IM traffic and still allow web traffic to remain as unaffected as possible. If you want to mail me your IPs, I'll compile a list and post them on my web site. Thanks, Craig Brauckmiller ---------------------------------------------------------------------------- ---------------------------------------------------------------------------- ------------------------------------- PRIVACY & CONFIDENTIALITY NOTICE The information contained in this e-mail is intended for the named recipients only. It may contain privileged and confidential information, and if you are not the addressee or the person responsible for delivering this to the addressee, you may not copy, distribute or take action in reliance on it. If you have received this e-mail in error, please notify us immediately by returning the original message to the sender by e-mail.