Created on 04-21-2008 12:00 AM
|Description||Users are using Tor (The Onion Router) to get around firewall policies. This article describes how to prevent this.|
|Steps or Commands|
To block prevent the use of Tor on your network, create a custom IPS signature that will catch this traffic.
To add a custom IPS signature
Associate the IPS signature to a protection profile and apply that protection profile to an outbound firewall policy.