• Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login
Netgate Discussion Forum
  • Categories
  • Recent
  • Tags
  • Popular
  • Users
  • Search
  • Register
  • Login

Is it possible to block Teamviewer and Logmein ?

Firewalling
6
9
4.6k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • R
    rezzmk
    last edited by Jun 17, 2017, 3:26 PM

    Hello, I have been trying to figure out a way to block out Teamviewer and Logmein networks, but I can't seem to find a way. I have searched on the forums and I haven't found a compreensive solution yet.

    Thanks in advance, this is for a school assignment and I am still quite new on firewalling.

    1 Reply Last reply Reply Quote 0
    • J
      johnpoz LAYER 8 Global Moderator
      last edited by Jun 17, 2017, 4:17 PM

      What exactly are you trying to stop.. So you want to stop users from using teamviewer to connect to stuff outbound, or stop users from accessing their machines remotely with teamviewer installed?

      Teamviewer and logmein, etc. are actually designed to work through your typical soho router/firewall without the users having to do anything - client behind your firewall makes a connection to the servers, the other user then connects to these servers and goes through that tunnel to get to the remote machine.  They will work outbound on 80/443 etc.. your typical web ports.

      To block them the best thing would be to block all the networks of teamviewer/other such service.  You would need to find all the netblocks the teamviewer servers are on for example.

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

      1 Reply Last reply Reply Quote 0
      • R
        rezzmk
        last edited by Jun 17, 2017, 4:46 PM

        @johnpoz:

        What exactly are you trying to stop.. So you want to stop users from using teamviewer to connect to stuff outbound, or stop users from accessing their machines remotely with teamviewer installed?

        Teamviewer and logmein, etc. are actually designed to work through your typical soho router/firewall without the users having to do anything - client behind your firewall makes a connection to the servers, the other user then connects to these servers and goes through that tunnel to get to the remote machine.  They will work outbound on 80/443 etc.. your typical web ports.

        To block them the best thing would be to block all the networks of teamviewer/other such service.  You would need to find all the netblocks the teamviewer servers are on for example.

        I am trying to block it both ways, will a DNS resolver domain override work? also if I were to block it by IP, how could I get a list of all the IP's (sorry if its a dumb question) used by these services.

        Thanks a lot for the answer in advance.

        1 Reply Last reply Reply Quote 0
        • J
          johnpoz LAYER 8 Global Moderator
          last edited by Jun 18, 2017, 11:19 AM

          If you know the domains, then sure you could block it by stoping the dns query.  But I think as last ditch it goes for IP directly.  The tool is really designed to circumvent firewalls.  If not it would run on port X and be done with it.  You would just block port X and there you go..  But if port X doesn't work then it tries 80 and 443..

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.7.2, 24.11

          1 Reply Last reply Reply Quote 0
          • A
            awebster
            last edited by Jun 19, 2017, 7:24 PM

            You can google teamviewer subnets and logmein subnets, it will give you the address ranges.  Create Alias objects for these network objects, and create a block rule using the aliases.
            That should take care of the problem.

            –A.

            1 Reply Last reply Reply Quote 0
            • J
              JacktheSmack
              last edited by Jun 20, 2017, 3:06 AM

              Don't forget Chrome Remote Desktop if you're trying to block people from using VNC services.

              1 Reply Last reply Reply Quote 0
              • J
                johnpoz LAYER 8 Global Moderator
                last edited by Jun 20, 2017, 10:23 AM

                Also doesn't stop them from using it via a proxy ;)

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • G
                  gerby123
                  last edited by Jun 23, 2017, 3:43 PM

                  You could install Snort and write a custom rule using OpenAppID to drop identified traffic I think.

                  1 Reply Last reply Reply Quote 0
                  • J
                    justblackcoffee
                    last edited by Jun 23, 2017, 9:39 PM

                    @gerby123:

                    You could install Snort and write a custom rule using OpenAppID to drop identified traffic I think.

                    app-detect.rules might already have it

                    # alert udp $HOME_NET any -> $EXTERNAL_NET any (msg:"APP-DETECT Teamviewer remote connection attempt"; flow:to_client; content:"|00 00 00 00 00 00 00 00|"; depth:8; content:"|00 17 24 47 50 00|"; within:6; distance:2; replace:"|00 00 00 00 00 00|"; metadata:service teamview; reference:url,en.wikipedia.org/wiki/TeamViewer; classtype:policy-violation; sid:24098; rev:2;)
                    # alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"APP-DETECT Teamviewer remote connection attempt"; flow:to_server,established; content:"|11 30 39|"; depth:3; replace:"|00 00 00|"; metadata:service teamview; reference:url,en.wikipedia.org/wiki/TeamViewer; classtype:policy-violation; sid:24097; rev:1;)
                    # alert tcp $HOME_NET any -> $EXTERNAL_NET any (msg:"APP-DETECT Teamviewer remote connection attempt"; flow:to_client,established; content:"|11 30 39|"; depth:3; replace:"|00 00 00|"; metadata:service teamview; reference:url,en.wikipedia.org/wiki/TeamViewer; classtype:policy-violation; sid:24096; rev:1;)
                    
                    1 Reply Last reply Reply Quote 0
                    9 out of 9
                    • First post
                      9/9
                      Last post
                    Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.