<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking outbound VPN traffic in To Be Moved</title>
    <link>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7159#M361</link>
    <description>cant see any reason why this wouldn't work using application denial policy.</description>
    <pubDate>Fri, 06 May 2016 06:46:49 GMT</pubDate>
    <dc:creator>robert_lowe_722</dc:creator>
    <dc:date>2016-05-06T06:46:49Z</dc:date>
    <item>
      <title>Blocking outbound VPN traffic</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7158#M360</link>
      <description>We are a school with some pretty smart students! A few are trying out using a VPN to bypass our firewall content filtering system. I'd like to block that connection attempt at the access point. My thinking is to deny traffic using an Application Port policy tied to 1723. Has anyone done so successfully?&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Thanks...</description>
      <pubDate>Tue, 03 May 2016 16:20:45 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7158#M360</guid>
      <dc:creator>sheldon_lefkowi</dc:creator>
      <dc:date>2016-05-03T16:20:45Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outbound VPN traffic</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7159#M361</link>
      <description>cant see any reason why this wouldn't work using application denial policy.</description>
      <pubDate>Fri, 06 May 2016 06:46:49 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7159#M361</guid>
      <dc:creator>robert_lowe_722</dc:creator>
      <dc:date>2016-05-06T06:46:49Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking outbound VPN traffic</title>
      <link>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7160#M362</link>
      <description>If your students are truly sophisticated, you may need a more advanced deep packet inspection firewall, or a traffic shaper that's capable of throttling down long-lasting connections to oblivion....&lt;BR /&gt;&lt;BR /&gt;Modern VPN technology often is based off SSL VPN which looks almost identical to HTTPS traffic and can even be operated on port 443.</description>
      <pubDate>Sun, 08 May 2016 06:10:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/To-Be-Moved/Blocking-outbound-VPN-traffic/m-p/7160#M362</guid>
      <dc:creator>john_d</dc:creator>
      <dc:date>2016-05-08T06:10:06Z</dc:date>
    </item>
  </channel>
</rss>

