Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. If you'd prefer to explore, try our test area to get started. And see here for current known issues.

New Member

Peer to Peer Security Question

Does anyone know what the security ramifications of letting peer to peer applications operate on a network with a PIX firewall? The inside user can make multiple state full connections with software’s such as Kazaa, eDonkey, etc going out but is it possible for a hacker or regular outside p2p user to exploit the connections to come back into the user without high jacking a connection. An example would be an inside user that has a shared folder (with the p2p application active) for files they want to share; can someone from the outside do a search and see the inside users folder and be able to download those files without the inside user having to make a connection to the searcher? By the way can Instant Messaging and ICQ do this also?


Re: Peer to Peer Security Question

AIM needs tcp port 5190 open to receive files via transfer.

p2p is generally insecure. many of the programs come with spyware. a lot of the files shares are virus infected. some p2p apps work behind a firewall, but only for downloading files, not sharing (i.e. serving) them out