You can use the new NBAR Qos tools to identify kazaa and then police it.
NBAR is in 12.2,  and is used to classify/identify dynamic protocols.   Once
in a class, you can create a policy map .
Something like this
class-map match-any mykazza
!  fastrack = kazza, morpheus etc.
    match protocol fasttrack file-transfer "*"
end
! police to 8kbs
policy-map squash-kazza
    class my-kazza
          police 8000
end
int e0/0
   service-policy input squash-kazza

see
http://www.cisco.com/en/US/partner/products/sw/iosswrel/ps5012/products_feat
ure_guide09186a0080134add.html

(if that link doesn't work, try just searching CCO for NBAR

""Barbu Alexandru""  wrote in message
news:[EMAIL PROTECTED]
> Hi there!
>      I was wondering whether there are people up there
> who played a bit with kazaa and come up with a
> firewall solution for linux.. Someone asked me to help
> them and they want to implement this firewall on a
> linux box. Blocking the 1214 port doesn't seem to work
> at all. I also have to stop all messenger services
> (MSNMessenger, Yahoo Messenger and so on).
>      Any ideeas?
>
> Thanks a lot,
> Alexandru Barbu
>
>
> __________________________________________________
> Yahoo! Plus
> For a better Internet experience
> http://www.yahoo.co.uk/btoffer




Message Posted at:
http://www.groupstudy.com/form/read.php?f=7&i=67348&t=67025
--------------------------------------------------
FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html
Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]

Reply via email to