Does anyone know of an up to date list of ports used by various trojans and file sharing apps. I want to shut all these upstream ports to prevent abuse. Or should I just shut down all ports above 1024?
Food for thought...I looked at it the other way and asked what traffic should I allow out. I don't know if this would work in your organization but I blocked all except the obvious (http, https, dns, ntp) and then monitored the logs carefully to see what outbound traffic was blocked.
I think this approach is easier than trying to block trojans one by one.
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...