it seems they have advanced in their technology in hiding from this filter rule. here in forums macgaiver posted configuration that could fight that “bastardo”
Not easily - deep packet inspection isn’t possible due to the encryption. Other means of tagging the packets will need to be devised and I think that’s easier said than done. I haven’t specifically looked at such traffic although if they’re anything like Skype traffic…
That seems like a nice idea - if one exceeds (for example) 300 connections - HE will have problems with other progs (messengers, browsers, send/recv emails…)
Btw, how to limit number of connections for pppoe user(s)??
your best bet is to just queue ports above 1024…and then just look for other legitmate ports that you customers use and open those one at a time or 3 at a time accordingly.
also another thing that most ppl dont think of when looking at a torch scan is that it can be Xbox Live or somekind of online gaming in which your customer is the host…
i.e. i did some tests and when i’m hosting a online game on my xbox 360 you will see a spread of ports and dst’s with consistant TX on each..some more than others
jo2jo i thing kolorasta want to block traffic on personal of establishment or somthing else were internet is not for games and p2p.
If kolorasta is provider on home users, he will not stop p2p becouse he will waste his clients