Notice: This website is an unofficial Microsoft Knowledge Base (hereinafter KB) archive and is intended to provide a reliable access to deleted content from Microsoft KB. All KB articles are owned by Microsoft Corporation. Read full disclaimer for more details.

How to Stop Napster Traffic from Passing Through ISA Server


View products that this article applies to.

This article was previously published under Q275237

↑ Back to the top


Summary

This article describes how to stop Napster traffic from passing through Internet Security and Acceleration (ISA) Server 2000.

↑ Back to the top


More information

There are several methods by which ISA Server can deny access to clients that are trying to access an Internet resource, such as Napster. Use any of the following methods to deny access to various services, such as Napster, which is the sample Internet resource in this article.

Method 1

Create a Site and Content rule or a Routing rule to deny access to a specific destination that the service needs for its initial logon process. To do this, create a destination set for the destination. For example, create a destination set that contains "napster.com" and use the destination set to create a Routing rule. Navigate to the Action tab, and then select the Redirect them to a Hosted site option, at which point you can specify an internal Internet access policy Web page.

Method 2

Create either of the following Site and Content rules:
A Site and Content rule that denies access to the destination set that contains napster.com.

-or-
A Site and Content rule that denies all content type of MP3. Refer to ISA Server Help about how to define content types.

Method 3

Use a protocol definition to deny access. Napster uses TCP port 8875 for the initial connection and the local file sharing service port is negotiated per connection. For other similar applications, you can use Network Monitor to determine the ports to be used by the initial connection. Be sure to find the ports that Napster is currently using at the time that you configure this because they may change.

After you obtain the latest information on ports for outbound connection, create a protocol definition. Protocol definitions should have settings that are similar to the following example:
Port number: 8875 (or another)
Protocol type: TCP
Direction : Outbound
Use the Protocol definition in the Protocol Rules dialog box, and create a rule that denies access to this protocol and applies to specific users, client sets, or all requests.

The third-party products that are discussed in this article are manufactured by companies that are independent of Microsoft. Microsoft makes no warranty, implied or otherwise, regarding the performance or reliability of these products.

↑ Back to the top


Keywords: KB275237, kb3rdparty, kbfirewall, kbinfo

↑ Back to the top

Article Info
Article ID : 275237
Revision : 2
Created on : 1/15/2006
Published on : 1/15/2006
Exists online : False
Views : 452