The easiest way to change the Global rules to allow tracert and also to provide a little more security, is to do the following:
Open CIS
Navigate to - Tasks\Firewall Tasks\Stealth Ports\Block Incoming Connections
This will change Global rules to allow the correct ICMP type for tracert, it will also add a final rule that blocks all unspecified connections. In future, if you have an application that specifically needs inbound connections, for example a p2p application, you’ll need to add an appropriate inbound rule above the final block rule.
In addition to the the changes to Global rules, depending on your settings, you mayl need an outbound application rule for tracert.exe. If you’re using ‘Safe’ mode tracert should work without intervention, if you’re using ‘Custom Policy’ mode, you should get an alert.
As far as ‘SPD.exe’ is concerned, the only rules you should need are those seen in the image. These are application rules.
Indeed, the reason tracert is not working is because the last rule blocks the appropriate return ICMP packets, by making the change I suggested above, you allow ICMP Type 11 Code 0 (Time Exceeded) If you want, you can simply add a Global rule that explicitly allows this ICMP Type. If you decide to do this, you may also wish to add another for Fragmentation Needed (Type 3 Code 4).
C:\Windows\System32>tracert linx.net
Tracing route to linx.net [195.66.232.53]
over a maximum of 30 hops:
1 * 442 ms 2 ms Ozzy [192.168.1.1]
2 * * * Request timed out.
3 2 ms 1 ms 1 ms hidden
4 2 ms 2 ms 1 ms 10.254.191.4
5 3 ms 3 ms 2 ms hidden
6 181 ms 181 ms 182 ms ge0-0.pr1.linx.net [195.66.225.254]
7 184 ms 183 ms 183 ms ivory.linx.net [195.66.232.53]
Trace complete.
Those rules appear to be correct for supporting tracert and fragmentation needed.
I have this rules for utorrent and cfosspeed
is it safe to add Allow IP out from Mac any to Mac any where protocol is any
In reality, you don’t need a Global rule to allow outbound connections, at least with your configuration.
I just wanted to ask one more question, if I disable Filter Loopback traffic, can I remove Loopback zone under "network zones" (pic 2)
Is there some specific reason you have for wanting to remove this zone? As fas a disabling loopback filtering, it’s really up to you. Basically, if you remove the check from this box, when using something like Custom Policy Mode, you won’t receive alerts from applications, such as your browser, for loopback connections. If you’re using Safe Mode, unless you’re using an application not on the safe list, you probably won’t see an alert.
[/quote]