CPF 220.127.116.118.x32 XPpro SP2, up-to-date, Intel P4
Have to mention from the beginning that I'm very happy with ALL CPF v.3 behavior so far.
Thank you again for another great product!
I have wished "a long time-ago"
and I still do, that my FW will warn me in the event of an attack attempt – port-scan, DDoS.... with an optional pop-up, color change, anything ...
I was running various FW tests out-there, GRC and similar, and none generated any logs.
Because I'm behind a PPPoE connection, I cannot use the check “and log” option in my last Network Global Rule:
"Block IP In Any Any...", otherwise the FW log becomes a traffic sniffer, logging all WAN activity.
Therefore, if something will eventually go wrong, I'll find out about it after it happened.
Another feature nice to see, probably already mentioned before, would be the possibility to import, in a sub-category of “Blocked Net Zones”, databases in Peerguardian or similar formats, from disk or URL's when running p2p's. No clue how performance/ behavior can be affected by a 200k+ list of addresses or ranges.
If FW rules, both application and network would automatically receive id's when created, it can be useful to see another column in logs, with the rule no. or id, generating that event. Can be handy for debugging and fine-tunning.
I need to choose between separate configurations only for FW, not for also D+, like in a previous Beta.