Monthly Archives: June 2007

How to block msn file transfer?

MSN, also called as live messenger is widely used. Windows Live Messenger gives you brilliant ways to connect and share your photos (and other stuff). Contact lists, emoticons, instant access to your friends.

However, sending and receiving files using MSN will face some security risk. External users can send files that might contain viruses or malicious code to users on the internal network. In addition, a liability risk arises if employees use the file transfer feature to share copyrighted music, movie or software files in violation of the law.

How to block msn file transfer?

MSN transfers files using dynamic ports which are negotiated. So it is impossilbe to block msn file transfer ports.

WFilter provides a efficient way to block msn file transfer. By using WFilter, It is very easy for you to detect and block MSN file transfers.

A more detailed example can be found here:

Example of blocking msn

How to block P2P traffic using WFilter

A pure peer-to-peer network does not have the notion of clients or servers, but only equal peer nodes that simultaneously function as both “clients” and “servers” to the other nodes on the network. This model of network arrangement differs from the client-server model where communication is usually to and from a central server.

Some networks and channels such as Napster, OpenNAP and IRC server channels use a client-server structure for some tasks (e.g. searching) and a peer-to-peer structure for others. Networks such as Gnutella use a peer-to-peer structure for all purposes, and are sometimes referred to as true peer-to-peer networks, although Gnutella is greatly facilitated by directory servers that inform peers of the network addresses of other peers.

As you can see from above, a peer-to-peer network is complex and it is almost impossible for you to block p2p in the router or the gateway.

WFilter provides a efficient way to block p2p traffic by signature match. By using WFilter, It is very easy for you to detect and block p2p traffic and file downloading.

WFilter related features:

  • Detect p2p traffic in your network.
  • Implement a policy to block certain p2p traffic.
  • Support over 30 p2p protocols, cover most common p2p softwares.
  • Define a file extension list forbidden from being download.


How to block AIM using WFilter

AOL Instant Messenger (often referred to as “AIM”) is an instant messaging application that allows registered users to communicate in real time via text, voice, and video transmission over the Internet. It is maintained by AOL LLC. The official website is

AIM is widely used all over the world. However, employees are using AIM to chat privacy topics, send and receive files, which will decrease working productivity, waste time and raise security risk.

So it is important to block AIM in enterprise network.

How to block AIM in your network?

AIM messenger can connect in several ways. Default is TCP port 5190. However, if you block AIM port 5190 in your firewall. It will turn to use port 80, 443 instead. And also, AIM messenger can use a HTTP/SOCK4/SOCK5 proxy server to reach the server. Even the worth, AIM traffics through port 80 using HTTP protocol, if you allow your employees to browser website, the 80 port must be available. And AIM has official clients, and many unofficial clients like gaim, trillian are also popular.
So, is blocking AIM mission impossible?

Of course not, but professional internet filter tools are needed. To block aim traffic, it needs the blocking aim tool has the ability to pick up aim traffic from large amount of connections.

I recommend you use WFilter to block aim, block msn and block messenger.

WFilter related features:

  • Monitor AIM and ICQ messenger usage.
  • Record chat contents of AIM and ICQ.
  • Record files transfered by AIM/ICQ.
  • Implement a policy to block AIM/ICQ or certain AIM/ICQ accounts.
  • Block AIM file transfers, block icq file transfers.
  • Support offical messenger client and other third party clients like gaim, trillian.


WFilter other monitor features:

Chat Monitor, MSN Messenger Chat Monitor, Yahoo Chat Monitor and other instant messenger monitor, block MSN, block Yahoo, block AIM, and other instant messenger block, block p2p, block p2p traffic, filter internet, block internet, internet monitor, monitor employee internet activity…

Wireless network monitoring example

Wireless communication brings fundamental changes to data networking and telecommunications. Now days, more and more organizations and home users build up wireless networks. And in many situations, wired networks and wireless networks exist together. This topic demonstrates a solution to monitor wireless networks internet activities.

A typical network contains both wired and wireless networks:

To monitor both the wired network and the wireless network, we add a tplink port mirror switch TL-SL2210WEB here.

Port1 of it is connected to the router, port2 connected to WFilter and port3 connected to the wireless Access Point.

The port mirror configuration is as below:


By now, you can monitor all the wireless computers.


WFilter deployment using dlink2366


WFilter Deployment

—-Using Dlink2366

A company use a router connected to internet. A Dlink2366 as the central switch.

The network topology diagram:



In this issue, we only need to do port mirroring in the Dlink2366 to do monitoring.

Dlink 2366 port mirror configuration:

As in the diagram above, port 16 is connected with the router and port 1 is connected to the computer with WFilter installed on.

WFilter related features:

Chat Monitor, Monitor employees, internet monitor, msn chat monitor, aim monitor, yahoo monitor, block p2p, block msn, block aim, block yahoo, block messenger, filter internet.