Created on 04-21-2008 12:00 AM
Description | Users are using Tor (The Onion Router) to get around firewall policies. This article describes how to prevent this. |
Components |
|
Steps or Commands | To block prevent the use of Tor on your network, create a custom IPS signature that will catch this traffic. To add a custom IPS signature
Associate the IPS signature to a protection profile and apply that protection profile to an outbound firewall policy. |