1) Install the product, fire up a sniffer, launch the product, identify the subnets it talks to for their proxy servers. Block those by IP.
2) Block these IP Ranges (allocated to them by ARIN)
Ultrareach Internet Corp EVRY-229 (NET-67-15-183-0-1) 18.104.22.168 - 22.214.171.124
UltraReach Internet Corp. EVRY-231 (NET-67-15-151-64-1) 126.96.36.199 - 188.8.131.52
3) Put a null route to those networks in at your edge or inside network so the traffic goes nowhere.
You can get more ideas, but that is a good start. Basically, Ultrasurf uses an encrypted connection to a set of proxy servers in their IP space. If you cutoff access to their IP space, you are effectively neutering their product and making it useless.
Watch the packet capture... it must be doing a DNS query to resolve those IP addresses. Look into the DNS packet and block all IPs associated to that A-record, or put in an A-record for that DNS name on your DNS servers and send it to 127.0.0.1. This will blackhole the client.
The Pix, without deep packet inspection for URLs, won't be much help here.
You could enable the URL filtering with Websense and see if they block it, but that would be about as much as you could do.
Login to the FXOS chassis manager.
Direct your browser to https://hostname/, and log-in using the user-name and password.
Go to Help > About and check the current version:
Check the current version availa...
We have configured the outside and inside Interface with official ipv6 adresses, set a default route on outside Interface to our router, we also have definied a rule , which also gets hits, to permit tcp from inside Interface to any6.
In Syslog I also se...