Comodo Firewall Pro should block ping attempts
I ran GRC ShieldsUp and it failed test because Comodo Firewall PRo did not block ping attempts. Could you add it to Comodo?
Hi SpySentinel. Comodo does block pings. The default Network Rules certainly do. If you want to be sure a screenshot of your rules will do, particularly about ICMP echoes/replies.
I always fail ping at grc my adsl modem is set to allow incoming pings for isp testing.
If you haven’t changed the default rules then maybe it’s scanning your router instead of your computer.
SpySentinel
In my case if I untick “allow incoming ping” in the modem then comodo will pass the grc test. I’ve kepted it ticked lately because of some connection problems.
https://forums.comodo.com/index.php/topic,3911.0.html
Don’t have to worry about pings anyway. I also have a network rule to allow it to speed up my connection by a tad bit.
Me too.
Some of the tweak and torrent forums suggest it helps a tad with speed. Must be doing something right, been getting some good speeds lately.
Here are my settings for Comodo:
I. Permission Protocol Source Destination Criteria
0 Allow TCP/UDC [Any] [Any] WHERE SOURCE PORT IS…
1 Allow ICMP out [Any] [Any] WHERE ICMP MESSAGE IS…
2 Allow ICMP in [Any] [Any] WHERE ICMP MESSAGE IS…
3 Allow ICMP in [Any] [Any] WHERE ICMP MESSAGE IS…
4 Allow IP Out [Any] [Any] WHERE IPProto IS GRE
5 Block TCP/UDC [Any] [Any] WHERE SOURCE PORT IS…
What should I change or add?
Since you didn’t post the remaining parts of each rule entry, I can only assume these are the defaults? As long as you don’t have a NetMon rule to allow ICMP Echo Reply for Incoming connections this will work, which the default rules already do. Are you behind a router?
https://forums.comodo.com/index.php/topic,5040.0.html
I’ve attached a pic of a scan I just conducted at ShieldsUp to prove that it’s just the ICMP Echo Reply (incoming) that determines this. Here’s another related thread that shows why this doesn’t really matter (in the security sense) even if your system responded to pings:
https://forums.comodo.com/index.php/topic,3911.msg35529.html#msg35529
[attachment deleted by admin]
Here is the full entry:
I. Permission Protocol Source Destination Criteria
0 Allow TCP/UDC [Any] [Any] WHERE SOURCE PORT IS [Any] and Destination is [any
1 Allow ICMP out [Any] [Any] WHERE ICMP MESSAGE IS ECHO REQUEST
2 Allow ICMP in [Any] [Any] WHERE ICMP MESSAGE IS FRAGMENTATION IS NEEDED
3 Allow ICMP in [Any] [Any] WHERE ICMP MESSAGE IS TIME EXCEEDED
4 Allow IP Out [Any] [Any] WHERE IPProto IS GRE
5 Block TCP/UDC [Any] [Any] WHERE SOURCE PORT IS [any] and destination [any]
My mistake. I apologize, I should’ve recognized this earlier. Your final block rule #5 should be: Block <> IP <> In/Out <> Any <> Any
You need the protocol to be IP, which covers everything including TCP/UDP and ICMP and so on. Strange, this should be the defaults already.
The thing is, pings are not being blocked.
When I ran ShieldsUp i got this:
Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since “Ping” is among the oldest and most common methods used to locate systems prior to further exploitation.
(L) (B)
:BNC Thank you for your help!!!
Glad to help (:WIN). Always leave the last netmon rule as block all IP in and out. That’s what blocks everything else (i.e. unwanted connections) if the rules above it aren’t met.
This thread is now closed.