![]() Web file sharing > All Web file sharing.Stopping the bigger named websites goes a long way in stopping torrenting. ![]() This includes websites that torrents can be obtained from. Peer-to-peer (P2P) > All Peer-to-peer (P2P).While the specific rules to implement will be dependent on the environment, the general recommendation for blocking unwanted P2P traffic is to use the rules for: This example only blocks specific services/protocols, while still allowing some desired services: For specific devices via group policies.īelow is an example of three layer 7 rules configured to block all peer-to-peer traffic and assorted file sharing:.For all devices on the network using network-wide layer 7 rules.These rules make the job of a network administrator easier by giving a verbose description of what will be blocked. These rules can be created and applied: Cisco Meraki Access Points and Security Appliances have the capability of creating Layer 7 firewall rules.
0 Comments
Leave a Reply. |