by Pascal » Dec 24 04 12:23 pm
Okay. More on this. Bearshare uses port 6346 by default. That's blocked on your setup. However, talking to the guys in our QA Lab, they've indicated that you can change the ports Bearshare uses. So, all bets are basically off on blocking on specific port. If somebody was going to run Bearshare on a network where an administrator wanted to stop them, then trying another port until an open one is found seems reasonably intuitive Your configuration has it's default action as "Allow" so once they go above port 6800, they'll have access.
When you look at the NAT entry as the users on laptops are connecting out, you should be able to see what port number they are using to validate if that's the case or not.
As you have a large number of specified allow entries configured - maybe you could make the default "Deny". That should discourage people from using it as they'd have to work much harder to find an open port. (Still possible if they use one of the ones you have expressly opened for other applications).
User education maybe?
One possible alternative could be to use a product that can analyse traffic and issue warnings / reports on it. (NetPatrol is one example) I'm reasonably sure by crafting a good rule-set you will be able to detect a P2P application (Specifically their connect strings) and with integrated firewall control then block that computer (For a given amount of time). If not blocking them, you have the option of receiving an administrative alert - which will give you the chance to find the user and instruct them to not use Bearshare.