Comodo blocking request to/from my modem

I noticed that Comodo is blocking requests from my modem to my PC and from my PC to my modem. Here is the log.

Date/Time :2007-03-17 14:00:45
Severity :Medium
Reporter :Network Monitor
Description:Outbound Policy Violation (Access Denied, ICMP = PORT UNREACHABLE)
Protocol:ICMP
OutgoingSource: 192.168.1.96
Destination: 192.168.1.254
Message: PORT UNREACHABLE
Reason: Network Control Rule ID = 5

Date/Time :2007-03-17 13:50:39
Severity :Medium
Reporter :Network Monitor
Description:Inbound Policy Violation (Access Denied, ICMP = ECHO REQUEST)
Protocol:ICMP
IncomingSource: 192.168.1.254
Destination: 192.168.1.96
Message: ECHO REQUEST
Reason: Network Control Rule ID = 5

It seems the built-in rule #5 is causing this. Is this something I should make an adjustment for or do these requests really not matter? Thanks.

Anyone?

Don’t worry about them.
Here is a couple of threads to peruse that might help.
https://forums.comodo.com/index.php/topic,3911.msg35529.html#msg35529
https://forums.comodo.com/index.php/topic,7175.0/topicseen.html
https://forums.comodo.com/index.php/topic,7313.0.html

:slight_smile:

Ok. I checked those threads. They talk about ping requests not being blocked. I also went to shield-up and failed the test because my ping wasn’t blocked. How can I fix this and will the fix also stop the alerts I posted about. Thanks.

Counter that by creating a NetMon rule:
Permission: Allow
Protocol: ICMP
Direction: Out
Source IP: 192.168.1.96
Destination IP: 192.168.1.254
ICMP Details: Icmp Port Unreachable

Counter that by creating a NetMon rule:
Permission: Allow
Protocol: ICMP
Direction: In
Source IP: 192.168.1.254
Destination IP: 192.168.1.96
ICMP Details: Icmp Echo Request

Once created, move those rules above the last blocking all IP in & out rule. Ordering matters. First one has the highest precedence, last one has the lowest.

Is your modem also a router? It’s possible that that Shields-Up scanned your router instead of your computer. Default rules should already protect from pings unless you created an allowed ICMP Echo Reply for incoming connections rule.

I don’t know if the modem is also a router but it I can log into it. I didn’t see anything about echo or ping in the config of the modem. In Comodo, I have a rule which was there by default. It is…ALLOW ICMP OUT from IP (ANY) to IP (ANY) where ICMP is ECHO REQUEST.

That’s an outgoing rule; only an incoming echo request can yield such “failure” at Shields Up!. Let’s have a look at your netmon rule screenshot.

Click on my screenshot in this post.

Here is a screenshot of my rules.

[attachment deleted by admin]

  1. Are you still receiving alerts in the log about the port unreachables or is that part resolved?
  2. I don’t know why Shields Up! is failing you with pings because you don’t have any allowed incoming ICMP Echo Request rules except rule 6, but that’s just specific to your router and PC. :THNK

After adding rule 5 and 6, this fixed the first problem, thanks. But now I am getting an ICMP incoming alert from my “OUTSIDE IP” to my PC. It is a port unreachable alert. I am also still failing the Shields Up ping test. Thanks again for your help.

CFP default netmon rules blocks ICMP port unreachables. Unless you do p2p or you don’t mind it, a lot of users prefer them to be blocked. In case you want to allow it:
Permission: Allow
Protocol: ICMP
Direction: In
Source IP: Any
Destination IP: Any (or your trusted network)
ICMP Details: Icmp Port Unreachable

Perhaps someone else (:NRD) enough might know why your PC is still accepting pings.

Check the router settings.

You’ve got a Network rule in CFP now to allow the ping between computer and router; if your router is configured to allow pings thru it, then it’s going to forward those on to your computer, which won’t know the difference between a ping from the router and one from the outside. Thus, it would be allowed there as well, and the test would be failed.

LM

The router may automatically pass them thru. Personally, I’d not create rules to allow them; serves no purpose, IMO.

After all, they were blocked to begin with; if everything worked fine then, why add rules to allow the ICMP traffic. I’m not saying it’s a vulnerability, but why allow it if it’s not needed?

If you don’t want the log entries, just change the rules to Block instead of Allow, and don’t log.

But that’s just me. At any rate, that’s the only scenario that I see, whereby the GRC test would fail; the router has to be allowing the ping, and you’ve got rules to allow it in the FW to the router.

LM

So you would not have added rules # 5 and #6 from my screenshot? Even before I created those rules, the GRC test failed. I have a westell dsl modem. If you know where I can turn the ping off there that will be great.

Hi, I have a westell model#6100 dsl modem/router and fail the grc test too because of the ping.
I know of no way to turn the ping response off on it.

No, I wouldn’t add those rules. I see no purpose in it. It’s not going to improve performance in your situation (it might if it’s related to p2p usage, but not for casual day-to-day use), so… As I said before, though, that’s just me. I try not to Allow any traffic that I don’t absolutely need.

What model Westell modem do you have? Maybe we can find something…

LM

The modem interface states it is a C90-610030-06.

Thanks for that. Looks like you both are with BellSouth (based on IP registration), and they use the 6100 heavily (if not exclusively). Here’s a DSL Report link to info on several Westell models, including the 6100. 3.14 Westell 2100/2200/6100 Info AT&T Southeast Forum FAQ | DSLReports, ISP Information

Please go through there with a fine-toothed comb; I browsed thru and didn’t see anything about ICMP traffic. There may not be any controls over it; the interface is less detailed than a router, for sure. It actually looks very similar to my modem at home, as far as configurable options.

See what you can find in there. If you can’t find anything, I’d call the ISP and ask them about it.

LM