Block Ping (ICMP ECHO) Requests

How can I configure Comodo to block, drop and ignore ping (ICMP Echo) requests?

G’day, In Network Monitor, click the ADD button. In the NEtwork Control Rule window, set the following parameters;

Action : BLOCK
Protocol : ICMP
Direction : IN
Source IP : ANY
Destination IP : ANY
ICMP Details : Message = ICMP Echo Request

Click OK and move the newly created rule ABOVE the catch all BLOCK rule (usually locted at the bottom of the list).

Hope this helps,
Ewen :slight_smile:

Seems to leak here when I test it against “Shields Up” scanner. Test it yourself, drop your routers firewall and set your Comodo up as you describe and run “Shields Up” against it, it will fail to block the interrogation as below:

“Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet.”

I’d like to hear your results.

It isn’t sufficient to just disable your routers firewall. To make Shields Up test a personal firewall running behind a router, you have to port forward all the ports you want tested to a particular IP inside your LAN.

Turning the routers firewall off doesn’t mean it won’t respond to Shields Up, just that it won’t filter packts.

Ewen :slight_smile:

Indeed, I would like to learn how to block/drop/ignore ping requests in order to better hide my system from hackers.
Quoting “Shields Up”: “… Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since “Ping” is among the oldest and most common methods used to locate systems prior to further exploitation…”
I was not able to find any help to do the ping request blocking in my Comodo Firewall Pro v.


so sorry, I already found help right here :slight_smile: thanks a lot panic!
will go try Shields-up again now …

Hi Panic,

I still can’t block the ping from GRC (I made the rule as you suggested).
Any help would be appreciated.


Are you behind a router? If so, the router is what is responding to the ping request from ShieldsUp, not your PC.

Ewen :slight_smile:

Hello Panic,

Yes, I am behind a router. So here is what I did:

  1. I connected the computer directly to the DSL MODEM, thus bypassing the router.
  2. Went over to GRC’s ShieldsUP, and it was still able to PING my system :frowning:
  3. Read over your recommendation for “Port Forwarding”, and I must say that I have never done that (i.e., it requires more research on my part)

Two questions:

  1. Exactly what are the implications of forwarding all those ports (aside from not getting PING’d)?

  2. It seems as if it’s too much of a hassle to re-map all those ports to accomplish this simple task. Is there an easier, more elegant way of accomplishing this?



It is possible that your modem is responding to the the ping request. To test if your your modem or your PC is responding, do the following;

  1. clear your firewall logs (this is just to make it easier to identify the ping response when and if it occurs)
  2. change the “ping blocking” rule to “Allow and Log”
  3. move it to the top of your rules list
  4. connect to the internet and retest at ShieldsUp
  5. after testing (assuming ShieldsUp reports your system responded), check the firewall logs and see if it recorded a ping response
  6. if there was no entry in the logs but ShieldsUp reported a response, it can only be your modem responding
  7. if there was an entry, change the “Allow and Log” rule back to “Block” and retest

Let us know how this goes.

Ewen :slight_smile:

Ewen, your guess was right.

There was no entry relating to ICMP in the Comodo logs, yet the GRC site issued its “FAILED” status once again after I rerun the test. The culprit is clearly the DSL MODEM itself, and I’m back to square one.

  1. By the way, have you had any luck with masking the PINGs after forwarding your ports?

  2. Is the effort worth it?

Thanks again.

I can’t seem to get this to work right,I don’t know which application path to choose,and I can’t find the rule to move the new rule above.

Finally ! :BNC :BNC :BNC

Jen & all,

Looks like the latest Comodo Firewall (version 3) has a Stealth Ports Wizard that does this job with just one click!

Simply open the Comodo firewall, click on the Firewall button (up on top), and then click on the Stealth Ports Wizard.

I chose the last entry: “Block all incoming connections - stealth my ports to everyone”.
When I went to GRC’s website and tried its ShieldsUp, all my ports were stealthed!



It took you over a year to figure this out? Wow.

You should understand that not everyone has the luxury to spend their time reading detailed “CHANGE LOGS” for every piece of software that they have running on their system everytime the software vendor release a new version!

I had almost completely given up on the idea of stealthing the ICMP port for ping requests thinking that it was an issue with the router. It’s very nice that Comodo FW is taking care of this issue for me as it means less tweaking of the hardware on my side!


I’m a newbie on computers so I’ve read all this with interest. Here’s my problem.

Every time I open the Stealth Ports Wizard, it shows the first option selected (the one which says hide my computer from everyone except the following trusted networks etc). So I click on ‘Stealth all Ports’ instead. At first it seems to work - I hear a ping, get the little message box saying ‘Your firewall has been confiurgured’ etc. So I click ‘Finish’. But if I re-open the Wizard I find the first option ‘ticked’ as before.

Sorry to be stupid, but why is this happening? I have one home PC not connected to any intranets or any other computers and a broadband modem. Why won’t it accept ‘Stealth All Ports’?

It’s probably something simple, please can anyone suggest something?


Hey polarcub,

That is just where the radio button starts out for that wizard.
It is not showing you the status of your settings.
After you have run the wizard once you don’t need to go back in the wizard,
unless you want to change the settings.


Bad Frogger, thank you so much! I didn’t know that. What a relief! (:WAV)