User Guide

BLOCKING ON PORT 80
CHAPTER 8: ACCESS POLICIES 163
Once you view the Access Policies: Applications: Policy_Name page, add user agent patterns
(also called signatures) to the Block Custom User Agents section of the page.
Figure 8-6 Entering Agent Patterns to Block
Note — You can click the Example User Agent Patterns link for a list of some example user
agent patterns.
Table 8-2 provides a list of common patterns.
Table 8-2Common Application Agent Patterns
Application Search in Setting HTTP header Signature
AOL Messenger Request headers User-Agent Gecko/
BearShare Response header Server Bearshare
BitTorrent Request headers User-Agent BitTorrent
eDonkey Request headers User-Agent e2dk
Gnutella Request headers User-Agent Gnutella
Gnucleus
Kazaa Request headers P2P-Agent Kazaa
Kazaaclient:
Kazaa Request headers User-Agent KazaClient
Kazaaclient:
Kazaa Request headers X-Kazaa-Network KaZaA
Morpheus Response header Server Morpheus
MSN Messenger Request headers User-Agent MSN Messenger
Enter agent patterns for the applications you want to block. Example Patterns