[c-nsp] Cisco nbar - How to detect media streamings

Eric Pylko eric at infinitenetworks.us
Sun Jun 25 20:58:39 EDT 2006



> -------- Original Message --------
> Subject: Re: [c-nsp] Cisco nbar - How to detect media streamings
> From: Matt Stevens <matt at elevate.org>
> Date: Fri, June 23, 2006 2:59 pm
> To: Velasquez Venegas Jaime Omar <jaime at ulima.edu.pe>
> Cc: cisco-nsp at puck.nether.net
>
> Most of the newer P2P PDLM files will detect the protocol on any port.
>
> They appear in the list as being bound to their well-known port(s), but
> will detect traffic matching the signature on any port.
> --
> matt
>

I was just trying to do something similar - block protocols with NBAR.
Cisco has a document on their website that goes something like this 
(my config which didn't work):

!
class-map match-any StreamingMedia
  match protocol cuseeme
  match protocol fasttrack
  match protocol gnutella
  match protocol kazaa2
  match protocol napster
  match protocol netshow
  match protocol rtp
  match protocol rtspplayer
  match protocol vdolive
  match protocol streamwork
!
!
policy-map mark-StreamingMedia
  class StreamingMedia
   set ip dscp 1

access-list 105 deny ip any any dscp 1
access-list 105 permit ip any any
!

The idea is that you apply the service policy inbound from the internet
(which I did). I then applied ACL 105 outbound towards my pix. The
result? People on the inside were not able to view web pages outside
their network. People outside could originate connections inbound
including connections to web servers in the DMZ. I was getting hits on
both lines of the ACL; a little less than 5% of the hits were the first
line.

Any ideas? Or do I need t open a TAC case?

-Eric

I haven't had time to look at it more; my initial guess is that I need a
class default to set dscp to 0.




More information about the cisco-nsp mailing list