<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic port blocking in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36866#M6599</link>
    <description>K-8 school here trying to block students using VPNs: could be apps or websites, on either Chromebooks or phones.&amp;nbsp; Our content filter, iBoss, is not good in this area, only offering to block five ports.&amp;nbsp; I want to block lots more, hoping to catch not all but the majority of ports commonly used by VPNs.&amp;nbsp; I think ZD can do this in configure&amp;gt;access control.&amp;nbsp; But which section? L2? L3/4?&amp;nbsp; "Application Denial Policy"?&amp;nbsp; See two attached screenshots.&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_c5287280e4596ec52c58071c37e5eaaa_RackMultipart20181113122823vmz-495ab65f-5bde-4adf-817d-d9599282cbaf-20146621.jpeg1542140629"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/1378iCAF3B4BBB5759CCA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c3f4135b77e2478f8b15_c5287280e4596ec52c58071c37e5eaaa_RackMultipart20181113122823vmz-495ab65f-5bde-4adf-817d-d9599282cbaf-20146621.jpeg1542140629" alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_c5287280e4596ec52c58071c37e5eaaa_RackMultipart20181113122823vmz-495ab65f-5bde-4adf-817d-d9599282cbaf-20146621.jpeg1542140629" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_a36e5d642c32994e6b1925393bfd80d1_RackMultipart20181113234141xgz-a7c94ddf-480d-4bba-9370-aa086ee30f2c-1797307799.jpeg1542140640"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/1379i7C04B45C7895E144/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c3f4135b77e2478f8b15_a36e5d642c32994e6b1925393bfd80d1_RackMultipart20181113234141xgz-a7c94ddf-480d-4bba-9370-aa086ee30f2c-1797307799.jpeg1542140640" alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_a36e5d642c32994e6b1925393bfd80d1_RackMultipart20181113234141xgz-a7c94ddf-480d-4bba-9370-aa086ee30f2c-1797307799.jpeg1542140640" /&gt;&lt;/span&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
    <pubDate>Tue, 13 Nov 2018 20:28:28 GMT</pubDate>
    <dc:creator>brad_wilcox_ibp</dc:creator>
    <dc:date>2018-11-13T20:28:28Z</dc:date>
    <item>
      <title>port blocking</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36866#M6599</link>
      <description>K-8 school here trying to block students using VPNs: could be apps or websites, on either Chromebooks or phones.&amp;nbsp; Our content filter, iBoss, is not good in this area, only offering to block five ports.&amp;nbsp; I want to block lots more, hoping to catch not all but the majority of ports commonly used by VPNs.&amp;nbsp; I think ZD can do this in configure&amp;gt;access control.&amp;nbsp; But which section? L2? L3/4?&amp;nbsp; "Application Denial Policy"?&amp;nbsp; See two attached screenshots.&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_c5287280e4596ec52c58071c37e5eaaa_RackMultipart20181113122823vmz-495ab65f-5bde-4adf-817d-d9599282cbaf-20146621.jpeg1542140629"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/1378iCAF3B4BBB5759CCA/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c3f4135b77e2478f8b15_c5287280e4596ec52c58071c37e5eaaa_RackMultipart20181113122823vmz-495ab65f-5bde-4adf-817d-d9599282cbaf-20146621.jpeg1542140629" alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_c5287280e4596ec52c58071c37e5eaaa_RackMultipart20181113122823vmz-495ab65f-5bde-4adf-817d-d9599282cbaf-20146621.jpeg1542140629" /&gt;&lt;/span&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_a36e5d642c32994e6b1925393bfd80d1_RackMultipart20181113234141xgz-a7c94ddf-480d-4bba-9370-aa086ee30f2c-1797307799.jpeg1542140640"&gt;&lt;img src="https://community.ruckuswireless.com/t5/image/serverpage/image-id/1379i7C04B45C7895E144/image-size/large?v=v2&amp;amp;px=999" role="button" title="Image_ images_messages_5f91c3f4135b77e2478f8b15_a36e5d642c32994e6b1925393bfd80d1_RackMultipart20181113234141xgz-a7c94ddf-480d-4bba-9370-aa086ee30f2c-1797307799.jpeg1542140640" alt="Image_ images_messages_5f91c3f4135b77e2478f8b15_a36e5d642c32994e6b1925393bfd80d1_RackMultipart20181113234141xgz-a7c94ddf-480d-4bba-9370-aa086ee30f2c-1797307799.jpeg1542140640" /&gt;&lt;/span&gt;&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Tue, 13 Nov 2018 20:28:28 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36866#M6599</guid>
      <dc:creator>brad_wilcox_ibp</dc:creator>
      <dc:date>2018-11-13T20:28:28Z</dc:date>
    </item>
    <item>
      <title>Re: port blocking</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36867#M6600</link>
      <description>VPNs&amp;nbsp;work at the Layer 2 level.&amp;nbsp;</description>
      <pubDate>Tue, 13 Nov 2018 20:59:50 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36867#M6600</guid>
      <dc:creator>craig_burchfiel</dc:creator>
      <dc:date>2018-11-13T20:59:50Z</dc:date>
    </item>
    <item>
      <title>Re: port blocking</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36868#M6601</link>
      <description>Alas, no provision to deal with ports in L2 section.&amp;nbsp; Plus specifying MAC addresses won't be do-able.</description>
      <pubDate>Tue, 13 Nov 2018 21:14:34 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36868#M6601</guid>
      <dc:creator>brad_wilcox_ibp</dc:creator>
      <dc:date>2018-11-13T21:14:34Z</dc:date>
    </item>
    <item>
      <title>Re: port blocking</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36869#M6602</link>
      <description>Network protocol 115 will give you L2TP access control deny/allow possibilities. So use that in protocol number. Other comments in recent email.&lt;BR alt="" name="" rel="" target="" title="" type="" value="" /&gt;</description>
      <pubDate>Mon, 26 Nov 2018 23:52:52 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/port-blocking/m-p/36869#M6602</guid>
      <dc:creator>max_o_driscoll</dc:creator>
      <dc:date>2018-11-26T23:52:52Z</dc:date>
    </item>
  </channel>
</rss>

