Sure you can, so you mean you want to block any application on that port outgoing? Btw. Important: what firewall settings have you set?
Anyway I believe the best way is to … add both an “application and global rule” and also on both menus two rules no not miss any proxy:
For both application rules choose File-Group: All Applications (2nd entry)
Guilty for all 4 rules: "Blocked, choose protocol you want to block (if you want anything choose IP), Outgoing, leave any at source/remote address
For each of the 2 Rules in app.- as well as global rules have: 1 that has set source port as 80, remote port any / and 1 other way source port any, remote port 80
Finally make sure these 4 rules are set on top of the list in app/global rules.
Normally the global rule wouldn’t be necessary as the application rules are consulted first when it comes to outgoing connections, yet it may helps if you create new rules.
What’s important to know: Comodo Firewall applies the first rule that matches that packet type so you have to take care this rule is always on top. If you install a new application or a popup for an old one appears and your remember the action you choose, take a look into firewall rules and make sure these 2 app-rules are on top. If you are using a silent configuration you have to frequently check manually (that’s why i asked on firewall settings)
When it comes to outgoing connections from your pc you don’t need any “specific IP”, you just have the one! Or are there other pcs connected directly to your pc (i don’t mean any router) that share their own wan-connection? If there is any weird network setup we need to know how it is configured. Or asking another way - should there be any possibility on your pc where connection via port 80 is allowed?
Further you didn’t wrote your “firewall settings” (just the menu named like that, you won’t give any privacy details by that.)
That’s true. It’s just that i asked twice on the specific network setup or now once on the possibility where port 80 should be allowed and yet didn#t get any answer. Further on they details we got till now i don’t expect the OP to be any user with knowledge in advanced networking.
To make an example: On the given rules it would possible to simply change “any source/remote address” to the actual IP address. The problem is: what if he uses any tool that uses local proxys (either internally or as check and pass through) - would cover some but not all cases. What if he has a dynamic ip? What if … (you can continue this nearly endless).