<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Blocking iOS Software Updates in Unleashed</title>
    <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20883#M1799</link>
    <description>It is worth noting that some rules require sometime to be applied.. my access list looks like this and iOS devices are not able to communicate with update server&lt;BR /&gt;


 
  
  &lt;P&gt;mesu.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;appldnld.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swscan.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swquery.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swdownload.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swcdn.apple.com&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 08 Aug 2017 12:13:41 GMT</pubDate>
    <dc:creator>hisham_matni</dc:creator>
    <dc:date>2017-08-08T12:13:41Z</dc:date>
    <item>
      <title>Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20878#M1794</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I m looking for a way to block software updates for all iOS devices connected through the Wi-Fi network.. &lt;BR /&gt;Can this be done using application denial policy?</description>
      <pubDate>Fri, 28 Jul 2017 12:27:01 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20878#M1794</guid>
      <dc:creator>hisham_matni</dc:creator>
      <dc:date>2017-07-28T12:27:01Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20879#M1795</link>
      <description>Not in a simple tickbox way.&lt;BR /&gt;&lt;BR /&gt;The iOS update packages must come from a range of webservers and if you could find those specific addresses and mask them into a deny policy and test...it might just work.&lt;BR /&gt;But almost certainly going to be unexpected gotchas such as other app updates being blocked.&lt;BR /&gt;&lt;BR /&gt;Haven't tried it so cannot give definitive.&lt;BR /&gt;&lt;BR /&gt;Ruckus will give you basic traffic throttling but not much more unless you can find some really creative way to achieve what you are asking.That's filter/firewall/traffic management stuff.&lt;BR /&gt;&lt;BR /&gt;=============&lt;BR /&gt;Just googled ios update servers...&lt;BR /&gt;&lt;P&gt;&lt;A href="http://support.apple.com/kb/ht1338" rel="nofollow" target="_blank" title="Link http//supportapplecom/kb/ht1338"&gt;Software Update&lt;/A&gt;&amp;nbsp;must communicate with Apple's update servers in order to download and install updates. Ask your network administrator to allow the following server addresses on your DNS and proxy servers.&lt;/P&gt;&lt;UL&gt;
&lt;LI&gt;swcdn.apple.com&lt;/LI&gt;
&lt;LI&gt;swdownload.apple.com&lt;/LI&gt;
&lt;LI&gt;swquery.apple.com&lt;/LI&gt;
&lt;LI&gt;swscan.apple.com&lt;/LI&gt;
&lt;/UL&gt;=============&lt;BR /&gt;&lt;BR /&gt;Hmm?&lt;BR /&gt;Maybe blocking swscan.apple.com might be enough.&lt;BR /&gt;&lt;BR /&gt;Test, test and test, then expect the unexpected!</description>
      <pubDate>Fri, 28 Jul 2017 15:37:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20879#M1795</guid>
      <dc:creator>max_o_driscoll</dc:creator>
      <dc:date>2017-07-28T15:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20880#M1796</link>
      <description>Thanks for the reply.&lt;BR /&gt;i tried adding those servers into an ACL and applied it on the WLAN.. but still iOS devices were able to check the update server.&lt;BR /&gt;&lt;BR /&gt;i tried &lt;BR /&gt;- mesu.apple.com&lt;BR /&gt;- appldnld.apple.com&lt;BR /&gt;&lt;BR /&gt;Also didnt work..</description>
      <pubDate>Fri, 04 Aug 2017 08:24:38 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20880#M1796</guid>
      <dc:creator>hisham_matni</dc:creator>
      <dc:date>2017-08-04T08:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20881#M1797</link>
      <description>might be worth blocking something specific first to check the denial rules gets applied&lt;BR /&gt;&lt;A href="http://www.bmw.com" rel="nofollow" target="_blank" title="Link http//wwwbmwcom"&gt;www.bmw.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;then see if you can access that site from an ipad.&lt;BR /&gt;Sometimes things don't always do what you expect.</description>
      <pubDate>Fri, 04 Aug 2017 12:26:19 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20881#M1797</guid>
      <dc:creator>max_o_driscoll</dc:creator>
      <dc:date>2017-08-04T12:26:19Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20882#M1798</link>
      <description>This is an apple list of ports used (quite long)&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://support.apple.com/en-gb/HT202944" rel="nofollow" target="_blank" title="Link https//supportapplecom/en-gb/HT202944"&gt;https://support.apple.com/en-gb/HT202944&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Might be able to find one that interrupts update communication but doesn't mess up anything else - it's a long shot.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Also, just in case you haven't seen this info...&lt;BR /&gt;&lt;BR /&gt;From the Zone Director online help guide:&lt;BR /&gt;=================&lt;BR /&gt;Configure&amp;nbsp;Application&amp;nbsp;Denial&amp;nbsp;Policies&lt;P&gt;This option allows the administrator to deny&amp;nbsp;application&amp;nbsp;access by blocking any HTTP host name or L4 port. Using&amp;nbsp;application&amp;nbsp;denial&amp;nbsp;policies, administrators can block specific&amp;nbsp;applications if they are seen to be consuming excessive network resources, or enforce network usage policies such as blocking social media sites.&lt;/P&gt;&lt;P&gt;The following usage guidelines need to be taken into consideration when defining&amp;nbsp;Application&amp;nbsp;Denial&amp;nbsp;Policies:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;P&gt;“&lt;A href="http://www.corporate.com" rel="nofollow" target="_blank" title="Link http//wwwcorporatecom"&gt;www.corporate.com&lt;/A&gt;” – This will block access to the host web server at the organization “corporate.com” i.e. the FQDN. It will not block access to any other hosts such as ftp, ntp, smtp, etc. at the organization “corporate.com”.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;“corporate.com” – this will block access to all hosts at the domain “corpo­rate.com” i.e. it will block access to &lt;A href="http://www.corporate.com" rel="nofollow" target="_blank"&gt;www.corporate.com&lt;/A&gt;, ftp.corporate.com, smtp.corporate.com, etc.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;“corporate” – This will block access to any FQDN containing the text “corporate” in any part of the FQDN. Care should be taken to use as long as possible string for matching to prevent inadvertently blocking sites that may contain a shorter string match i.e. if the rule is “net” then this will block access to any sites that have the text “net” in any part of the FQDN or “.net” as the FQDN suffix.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;*.corporate.com – This is an invalid rule. Wildcard “*” and other regular expres­sions cannot be used in any part of the FQDN.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;“&lt;A href="http://www.corporate.com/games" rel="nofollow" target="_blank"&gt;www.corporate.com/games&lt;/A&gt;” - This is an invalid rule. The filter cannot parse and block access on text after the FQDN, i.e., in this example it cannot filter the micro-site “/games”.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;Notes:&lt;UL&gt;&lt;LI&gt;&lt;P&gt;Many global organizations have both a “.com” suffix and country specific suffix such as “.co.uk”, “.fr”, “.au”.etc. To block access to, for example, the host web server in all regional specific web sites for an organization, a rule like “&lt;A href="http://www.corpo­rate" rel="nofollow" target="_blank" title="Link http//wwwcorporate"&gt;www.corpo­rate&lt;/A&gt;” could be used.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Many global organizations use distributed content delivery networks such as Akamai. In such cases creating a rule such as “&lt;A href="http://www.corporate.com" rel="nofollow" target="_blank"&gt;www.corporate.com&lt;/A&gt;” may not prevent access to the entire site. Further investigation of the content network behavior may need to be undertaken to fully prevent access.&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;When using Port based rules:&lt;P&gt;There is no distinction between the TCP and UDP protocols, so care should be taken if wishing to block a specific&amp;nbsp;application&amp;nbsp;port as that will apply to both IP protocols and may inadvertently block another&amp;nbsp;application&amp;nbsp;using the other protocol.&lt;/P&gt;&lt;P&gt;To create an&amp;nbsp;Application&amp;nbsp;Denial&amp;nbsp;Policy:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Go to&amp;nbsp;Configure &amp;gt; Access Control.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Expand the&amp;nbsp;Application&amp;nbsp;Recognition and Filtering&amp;nbsp;section.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In&amp;nbsp;Application&amp;nbsp;Denial&amp;nbsp;Policy, click&amp;nbsp;Create New&amp;nbsp;to create a new&amp;nbsp;policy.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Enter a&amp;nbsp;Name&amp;nbsp;and optionally a&amp;nbsp;Description&amp;nbsp;for the&amp;nbsp;policy.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In&amp;nbsp;Rules, click&amp;nbsp;Create New&amp;nbsp;to create a new rule for this&amp;nbsp;policy.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In&amp;nbsp;Application, Select&amp;nbsp;HTTP Domain Name&amp;nbsp;or&amp;nbsp;Port.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;In&amp;nbsp;Description, enter the domain name or port number for the&amp;nbsp;application&amp;nbsp;you want to block.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Click&amp;nbsp;Save&amp;nbsp;to save the rule, and click&amp;nbsp;OK&amp;nbsp;to save the&amp;nbsp;policy.&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;A name="IX_Applying_an_Application" rel="nofollow" target="_blank"&gt;&lt;/A&gt;Applying an&amp;nbsp;Application&amp;nbsp;Denial&amp;nbsp;Policy&amp;nbsp;to a WLAN&lt;P&gt;Once an&amp;nbsp;Application&amp;nbsp;Denial&amp;nbsp;Policy&amp;nbsp;is created, use the following procedure to apply it to one or more WLANs:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;&lt;P&gt;Go to&amp;nbsp;Configure &amp;gt; WLANs, and click&amp;nbsp;Edit&amp;nbsp;next to the WLAN you want to configure.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Expand the&amp;nbsp;Advanced Options&amp;nbsp;section, and locate the&amp;nbsp;Application&amp;nbsp;Visibility&amp;nbsp;section.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Ensure that the&amp;nbsp;Enable&amp;nbsp;check box is enabled.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Select the&amp;nbsp;policy&amp;nbsp;you created from the&amp;nbsp;Apply&amp;nbsp;Policy&amp;nbsp;Group&amp;nbsp;list.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P&gt;Click&amp;nbsp;OK&amp;nbsp;to save your changes.&lt;BR /&gt;&lt;BR /&gt;=========================================&lt;/P&gt;&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 04 Aug 2017 12:26:35 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20882#M1798</guid>
      <dc:creator>max_o_driscoll</dc:creator>
      <dc:date>2017-08-04T12:26:35Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20883#M1799</link>
      <description>It is worth noting that some rules require sometime to be applied.. my access list looks like this and iOS devices are not able to communicate with update server&lt;BR /&gt;


 
  
  &lt;P&gt;mesu.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;appldnld.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swscan.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swquery.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swdownload.apple.com&lt;/P&gt;
  
 
 
  
  &lt;P&gt;swcdn.apple.com&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 08 Aug 2017 12:13:41 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20883#M1799</guid>
      <dc:creator>hisham_matni</dc:creator>
      <dc:date>2017-08-08T12:13:41Z</dc:date>
    </item>
    <item>
      <title>Re: Blocking iOS Software Updates</title>
      <link>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20884#M1800</link>
      <description>Great, think that counts as a result.</description>
      <pubDate>Tue, 08 Aug 2017 15:07:06 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/Unleashed/Blocking-iOS-Software-Updates/m-p/20884#M1800</guid>
      <dc:creator>max_o_driscoll</dc:creator>
      <dc:date>2017-08-08T15:07:06Z</dc:date>
    </item>
  </channel>
</rss>

