Basic Setup for Novice Questions

Michele,

What everyone needs to know is that CPF has 2 “layers”. The most important of which is the Network Monitor Rules; which are independent of the software/application access rules.

Here is an example… The default Network Rules created at install time are:

ID Permission Protocol Source Destination Criteria

0 Allow TCP/UDP Out Any Any
1 Allow ICMP Out Any Any Where icmp message is echo request
2 Allow ICMP In Any Any Where icmp message is fragmentation needed
3 Allow ICMP In Any Any Where icmp message is time exceeded
4 Allow IP Out Any Any Where IPPROTO is GRE
5 Block (+log) IP In/Out Any Any Where IPPROTO is ANY

Let’s consider the first rule (ID 0)… if this rule did not exist, and you went to load your web browser to browse you favorite web-site (no doubt the Comodo forums ;D)… you would be asked by CPF if the application could have TCP Out access on port 80 (HTTP) to request the web-page to be loaded… and you would of course tell the popup that the browser application can make TCP Out requests… what would happen if rule ID 0 did not exist?

The application rules are useless in CPF if the Network Rules do not allow the flow of traffic for the application to succeed. The end result would be that the browser would fail to load the page. That is power!

All of the default configurations are feedback from the users of these forums. People wanted:

  • to be secure off the the bat… Network Rules 0,4, & 5 were born
  • CPF was found to be so tight that some web-site failed to load… Network Rules 1,2, & 3 were born
  • People did not want to be hammered with so many popups during firewall training… The Alert Frequency Level was preset to Low, but is changeable… as well the user can choose to enable/disable the Show Alerts for applications certified (as SAFE) by Comodo

The default rules of CPF are meant to appease the masses while maintaining excellent protection; in no way can they be considered unsecure.

For Windows innate services, I’ve always liked following the information posted at TweakHound… (even his guide on installing WinXP "properly is a good read)

If you use torrents, my How To that you have read does cover opening the ports to allow them to work… and here is were we choose to punch holes in our defenses (opening ports) to allow applications we want/need to function. Our choice.

P2U and Monogod,

I’m propelled by your engaging masterly answers to my questions. The generosity and extraordinary thoughtfulness shown me in your every chosen word is heartfelt. 

Paul, your offer to work with me so that I might acquire a sound understanding of computer security is dear. I’m delighted as I imagine the luminous insights afforded me while escorted through this technological labyrinth.   

In Appreciation
I Remain,

Michele

2 Michele:
What version of AVAST do you have installed? Do you have a link where the problems you encountered with the combination AVAST/COMODO are discussed? I don’t use any anti-virus solutions at all, so I could just install AVAST and draw some conclusions…

Paul Wynant
Moscow, Russia

Paul

I think the topic below is the one Michele is referring to (its fairly long).

[url=https://forums.comodo.com/index.php?topic=3113]Anyone know what this is?[/url]

Thanks, kail! I’ll have a look into it myself…

Regards,

Paul Wynant
Moscow, Russia

P.S.: Might have to do with the order of install: I noticed that when I first installed Jetico and then AVAST, they didn’t cooperate. First installing AVAST and then Jetico worked…

Paul,

I've got Avast 4.7 Home. Here's a link:

https://forums.comodo.com/index.php/topic,3113.html

Please don’t spend your day off on this! :slight_smile:

Kail,

I've got it! Thank you!

Thanks, Michele!

As I said: Might have to do with the order of install: I noticed that when I first installed Jetico and then AVAST, they didn’t cooperate. First installing AVAST and then Jetico worked…

Paul Wynant
Moscow, Russia