I spent time searching the internet for a clear answer where npcap sniffs the traffic in the communication stack. Up to now I only found many different answers (including Ploget’s find). One says it sniffs the traffic between FW and NIC and the other says it sniffs between application and FW or another one says a combination of the previous two answers.
So till now it is not clear to me where npcap sniffs the stack.
In order to find the answers myself I tried to play with CIS FW Global Rules and setup some Global Rules to block a single IPv4 address for traffic coming in or going out for testing with ping.
Now, I found the following behavior which I don’t really get.
Note: In FW Application Rules ping is set to FW rule Allowed Application for the remainder of this test.
Outgoing Global Rule
In FW Global Rules added at the bottom of the list the following rule:
Action : Block
Protocol : IP
Direction : Out
Source address : Any Address
Destination address : IPv4 Single Address 172.217.020.078
IP details : Any
Executing ping 172.217.20.78 results in the same strange observation as reported earlier, outgoing blocked ping packets are shown in Wireshark. So no change here.
Incoming Global Rule
In FW Global Rules changed the above added Global Rule into:
Action : Block
Protocol : IP
Direction : In
Source address : IPv4 Single Address 172.217.020.078
Destination address : Any Address
IP details : Any
Now when executing ping 172.217.20.78 ping sends and receives(!) the ping packets. Also Wireshark shows both ping packets, request and reply.
It seems the incoming Global Rule isn’t blocking the incoming ping traffic from 172.217.020.078. Even swapping Source and Destination address in the incoming Global Rule didn’t change a thing, ping request packets go out and reply packets do come in.
I deleted the incoming Global Rule and created a new one and even moving it up or down the Global Rules list, I did this multiple times but to no avail.
Since this Global Rule for incoming traffic isn’t working I can’t continue finding out where npcap sniffs the traffic…
Please someone check if a Global Rule for blocking incoming traffic for an single ipv4 address as shown above is working or not?!
EDIT:
Deleting the incoming Global Rule and changing the FW Application Rule for ping from Allowed Application into Outgoing Only result in the same effect, ping still receives the incoming ping reply traffic!