port-misuse Command
In an office environment, it is common practice to restrict Internet activities to work-related
content. With the popularity of P2P programs and instant messaging services, this can be
hard to manage. The Security Appliance, through the http-map command, can limit or even
block the use of these programs and services through the use of the port-misuse command.
The port-misuse command can restrict instant messaging, P2P programs, and unauthorized
tunneling to and from the network:
port-misuse {im | p2p | tunneling} action | allow | deny | drop | reset | [log]
New worms and viruses come in many forms, usually through an e-mail message. Many of
these messages are compressed to avoid antivirus programs. Once uncompressed, these
messages are free to attack a system or network. You can restrict the use of compressed files
that pass through the Security Appliance, from e-mail or other means, by using the transferencoding
command in http-map configuration mode:
transfer-encoding {chunked | compress | deflate | gzip | identity | default} action | allow
| drop | reset | [log]