You can use the new NBAR Qos tools to identify kazaa and then police it. NBAR is in 12.2, and is used to classify/identify dynamic protocols. Once in a class, you can create a policy map . Something like this class-map match-any mykazza ! fastrack = kazza, morpheus etc. match protocol fasttrack file-transfer "*" end ! police to 8kbs policy-map squash-kazza class my-kazza police 8000 end int e0/0 service-policy input squash-kazza
see http://www.cisco.com/en/US/partner/products/sw/iosswrel/ps5012/products_feat ure_guide09186a0080134add.html (if that link doesn't work, try just searching CCO for NBAR ""Barbu Alexandru"" wrote in message news:[EMAIL PROTECTED] > Hi there! > I was wondering whether there are people up there > who played a bit with kazaa and come up with a > firewall solution for linux.. Someone asked me to help > them and they want to implement this firewall on a > linux box. Blocking the 1214 port doesn't seem to work > at all. I also have to stop all messenger services > (MSNMessenger, Yahoo Messenger and so on). > Any ideeas? > > Thanks a lot, > Alexandru Barbu > > > __________________________________________________ > Yahoo! Plus > For a better Internet experience > http://www.yahoo.co.uk/btoffer Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=67348&t=67025 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]