Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    How can i block teamviewer ??? ver 2.0.1-RELEASE (i386)

    Scheduled Pinned Locked Moved Firewalling
    3 Posts 3 Posters 2.5k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • A Offline
      arrow
      last edited by

      I have a Pfsense 2.0.1-RELEASE (i386)  installed multiwan server, working perfectly but now i need to block teamviewer how you know i cannot install proxy because proxy does not work with multiwan 4 ISP's

      1 Reply Last reply Reply Quote 0
      • K Offline
        kyronax
        last edited by

        An older post but it may help: http://forum.pfsense.org/index.php/topic,22632.0.html

        Supermicro X7SPA-HF-D525 Intel Atom D525 ICH9R 6XSATA Dual GBLAN 1XPCI-E 2.0 Matrox G200EW
        Corsair CMSO2GX3M1A1333C9 2GB 1X2GB DDR3-1333 CL9-9-9-24 204PIN SODIMM Memory
        MINI-BOX M350 Universal MINI-ITX Case
        PICOPSU-80 with Power Kit Includes Pico PSU 80W DC-DC ATX PSU & AC-DC Switching Power Supp

        1 Reply Last reply Reply Quote 0
        • E Offline
          esnakk
          last edited by

          @arrow:

          I have a Pfsense 2.0.1-RELEASE (i386)  installed multiwan server, working perfectly but now i need to block teamviewer how you know i cannot install proxy because proxy does not work with multiwan 4 ISP's

          ..Also do not miss that when blocking a port, say for example port 25, there is nothing stopping your users from sending that traffic, for example smtp, over another port, or tunneling traffic etc. Ie if you want to make 100% sure that you are blocking all traffic for a protocol you have to inspect the packets and if the user uses encryption this is going to be extremely difficult or impossible to do unless risking to block "more than you wanted in the first place".

          A combination of different kinds of blocks and monitoring is probably the best if you really want to make sure all traffic of type X is not allowed in and/or to pass through.

          /E

          –
          Cheers,
          E

          1 Reply Last reply Reply Quote 0
          • First post
            Last post
          Copyright 2026 Rubicon Communications LLC (Netgate). All rights reserved.