Sure is.. all you need to do is to identify the servers and then block
them, and use a large bat on the abusing users to teach them to behave
according to the agreed policy of use (which I assume there is one..)
Taking a look what you get in access.log when the application is used is
a good measure to figure out what it is doing and on what it might be
blocked. Also using tools like log_mime_hdrs helps to some extent as
this shows the user agent used and other headers which may be
interesting for building access controls..
Regards
Henrik
ons 2003-02-12 klockan 11.51 skrev Tesla 13:
> If the connection is to port 443, I don't think so.
> Tesla
-- Henrik Nordstrom <hno@squid-cache.org> MARA Systems AB, SwedenReceived on Wed Feb 12 2003 - 07:12:50 MST
This archive was generated by hypermail pre-2.1.9 : Tue Dec 09 2003 - 17:13:20 MST