Some modern wireless routers include protocol blocking that allows you to block web-torrents with the click of a radio button. The block torrents option is usually found in the Firewall configuration of your wi-fi router. If you have multiple wi-fi routers that are connected via cable to a central firewall, then you would need to access your Firewall control panel to apply torrent restrictions. On older routers you may need to manually configure protocol restrictions to block torrents. Torrents typically use TCP and UDP connection protocols on ports 6881 through 6889. Some varieties of torrent software can use up to port 6999, but blocking the 6880 ports should be enough to stop the majority of your torrent traffic, without running the risk of blocking ports that are being used by other programs.
The instructions listed below are protocol instructions and are not specific to any particular router. You'll have to refer to the owner's manual of your device for exact instructions on how to access your router's Firewall Control Panel, or how to apply these conditions. If you are on a university campus and have an IT Specialist available they should be able to interpret these instructions quite readily.
Step 1:
Open your Firewall Control Panel
Step 2:
Create Rule > Access Restrictions > User Defined > Protocols > TCP > Port Range: 6881-6889 > Select inbound and outbound traffic > Apply
Step 3:
Create Rule > Access Restrictions > User Defined > Protocols > UDP > Port Range: 6881-6889 > Select inbound and outbound traffic > Apply
Step 4:
Read any messages that appear on your router control panel, as many routers will require you to reboot after applying the changes to the Firewall settings
Testing to make sure the rules were applied
To check your ports are closed to TCP protocols type:
nmap -p 6881-6889 <local ip of your wi-fi router>
To check your ports are closed to UDP protocols type:
nmap -sU -p 6881-6889 <local ip of your wi-fi router>
For example, if the local ip of your wi-fi router is 192.168.2.1, then the first command you enter would be:
nmap -p 6881-6889 192.168.2.1
If the changes applied successfully, then nmap will produce reports which show all of those ports are closed to both TCP and UDP protocols.