I’m having trouble with opening a port (3074). I’ve tried everything to my knowledge.
I’ve already forwarded port on my router so I know it gets to the comodo firewall as the log shows that this is blocked. If don’t forward this, it doesn’t come up in my comodo fw log.
My global rules are:
ALLOW ICMP IN FROM IP ANY TO IP ANY WHERE ICMP MESSAGE IS FRAGMENTATION NEEDED
ALLOW ICMP IN FROM IP ANY TO IP ANY WHERE ICMP MESSAGE IS TIME EXCEEDED
BLOCK AND LOG IP IN FROM IP ANY TO IP ANY WHERE PROTOCOL IS ANY
(In other words the rules above were created with the Stealth Port Wizard)
I’ve created an Application rule for this program with TCP and UDP IN/OUT ANY PORT
Also I created a Allow rule in the Global Rules to allow Destination Port 3074.
In my log is says:
SOURCE IP SOURCE PORT DEST. IP DEST. PORT
Windows Operating System Blocked xxx.xxx.xxx.xxx 41208 xxx.xxx.xxx.xxx 3074 TCP
Read the following tutorial I made. Substitute the port numbers and protocol for your situation.
To open the port TCP 1723 for example
First step is to determine the MAC or Physical address of you network connector. Go to Start → Run → cmd → enter → a black box will show up and enter the following → ipconfig /all (notice the space before /all) → enter → now look up the Physical address and write it down.
Notice that Physical address = MAC address
Firewall → Network Security policy → Global Rules → Add → fill in the following:
Action: Allow
Protocol: TCP
Direction: In
Description: Incoming Port
Source address: Any
Destination Address: Choose MAC address and fill in the found MAC/Physical address
Source Port: Any
Destination Port: 1723
Then push Apply → Now make sure that the new rule is somewhere above the basic block rule(s) as the bottom (the block rules have red icons); you can drag and drop the rules → Ok.
I done exactly as instructed and using Shields Up at GRC, it still shows that the port I’m trying to open is stealthed. I’ve even tried to use my local IP instead of the mac address with no difference.
Threre must also be a listening application. This application must have a matching application rule. For testing it is easiest to give the application the Trusted Application policy.