Skip to main content

Blocking Popular Resources

Blocking Remote Access Programs


TeamViewer can be blocked using the Application control module.  To do this, select the protocol of the same name in the rule for users or groups.
1. Blocking Popular Resources.png

Blocking Anonymizers

You can block anonymizers in Traffic rules in three ways:

  1. Anonymizers working over HTTP(S) can be blocked using the Content Filter module (Anonymizers category).

    2. Blocking Popular Resources.png

  2. To block VPN anonymizers using the PPTP protocol, as a rule, it is enough to block the GRE protocol in the Firewall rules.

    3. Blocking Popular Resources.png

  3. To prohibit circumvention of the content filter, we recommend creating a rule prohibiting direct requests to IP addresses in the Content Filter.

    4. Blocking Popular Resources.png

Blocking Opera Turbo, Opera VPN, friGate, Anonymox, Browsec

You can block data and some other plugins (anonymizers) and browser functions that are often used to bypass content filtering using the Intrusion Prevention module. To do this, in the tab Rules activate the Anonymizers rules group and a separate group of Opera VPN rules to block the service of the same name.

Attempts to bypass content filtering using this software will be recorded in the intrusion prevention system log, after which they will be blocked. An example of the output of information displayed in the intrusion prevention system log is presented below:

  • 07/20/2017-15:06:04.056815 [Drop] [**] [1:1001697:1] Opera VPN [**] [Classification: Opera VPN] [Priority: 2] {TCP} ->
  • 07/20/2017-15:09:20.531169 [Drop] [**] [1:1001675:0] Anonymox HTTP [**] [Classification: Anonymizers] [Priority: 2] {TCP} ->

Blocking TOR

Tor is a proxy server system that allows you to establish an anonymous network connection to bypass content filtering.

Tor is a specially developed software and proxy server environment designed to bypass various kinds of blocks, which is why it is currently not possible to completely block it.

To counter the use of the Tor network, as well as to log attempts to connect to it and use it, you need to do the following:

1. Enable the Intrusion Prevention system and activate the Blocking attacks category in it, which allows you to block connections to the input nodes of the Tor network.

2. Enable Application Control and add a Tor application prohibiting rules to a specific group or all users:
6. Blocking Popular Resources.png

Blocking Torrents

BitTorrent is a P2P protocol designed for file sharing over the Internet.

To significantly limit the possibility of using torrents, you need to perform the following settings:

1. Prohibit BitTorrent protocol using a rule in the Application Control module.
7. Blocking Popular Resources.png

2. Use the policy Prohibit all except what is allowed when configuring the firewall. Allow the necessary TCP and UDP ports to users by making the last rule prohibiting.

3. Prohibit torrent file directory sites using the Content Filter module by prohibiting the Torrent Trackers category. And prohibit downloading files with the extension .torrent.
8. Blocking Popular Resources.png

4. Enable the Intrusion Prevention system and activate the category Requests to compromised resources in it, which allows you to block the activity of P2P programs.