I have a copy of Windows 10 with a lot of blocked IPs IN the firewall, not just the host file.
I would like to export all of the current block rules for these IPs from the Windows firewall and just import them in to Comodo Firewall and not have to do every single thing a la cart.
note - this is NOT a range so this is not a range option
Can someone explain if this is possible, and how to best accomplish this task in order to replace the WF with the CF?
The only way to import anything is CIS own settings which is a .cfgx file which really it is in xml format. You can take a look by going int the CIS install directory and changing the file extension of any of the default configurations from .cfgx to .xml and open it in a web browser. Then look for the firewall section to see how the rules are saved.
Thx, on the same page and I had looked at it this way. I see at the bottom of the firewall section where this should be located.
I’m unable to add any addresses in the firewall and have them articulated in the xml file, they appear to be only in the db.
What I would like to do is add a list via copy\paste or powershell etc to block all the known MSFT spying addresses in Windows 10, but using CFW instead of the Windows FW.
Maybe possible to do by edit of a new cfg file.
Best advice is to enter a few blocks first before making the new config file - use these new blocks for examples for adding in the rest of the blocks; in the XML formatting. Use notepad for the editing. Follow the xml format correctly for the new entries when adding in the blocks.
Do not add unwanted spaces or re-adjust lines spacing, or the xml will be corrupted and then useless.
After it is finished, then import the edited cfg into Comodo.
If made correctly, it should work.
Also the UID= seems to be required for each entry, not as a group of entries.
I am guessing the UID number is randomly created when a IP is added manualy, so maybe pick one UID for the first entry and change it sequentially for newer entry.
TBH this is not the easiest format - my old favorite firewall (another vendor) back in the day was simpler to edit with mass entries.
Maybe first create category, set it up, then enter in one IP and one IP range.
Save cfg.
Use entered for examples.
Then edit. Changing UID for each entry.
Hope that works.
About creating a new “category” - this is essentially creating a new block rule and selecting the OUT property, adding an IP range, then finding said range in the cfg and adding on to it?
I’m just a tad unsure about where to actually create the new “BLOCK THESE ■■■■■■ IP” rule.
I think I’m stuck at the same place as the last time, in that no matter WHAT I create, anywhere - it will not show up in the figgen xml, no nein nyet nada.
Therefore there’s not anything to find in the xml in order to edit or to add to.
Sorry this is still a dead end to me. I cam make a new " NETWORK ZONES > BLOCKED ZONES and give it a single IP but then I still can’t find it in a new cgf, I’m telling you the cfgs are not being modified since 6-6-2018.
Sorry to trouble you for something more but the instructions still are a bit cryptic.
Steps . . . screenshots . . . magic . . . voodoo . . . ■■■■ man I’ll take whatever you can provide but at this juncture I’m still at a dead end like the last time.
Open Network Zones.
Use Add button.
Create a new Zone using New Network zone.
Call it whatever - perhaps Windows 10 IP.
Under this new zone, there is provision for a new entry; add in the ips using the new window and the corresponding selection for IP and range in the drop down.put in a few enties for this new category.
Do the Okay button to save it.
Now open the Blocked Zone tab.
Use the Add button.
Select Network Zone and now select the newly made Zone.
Do the okay button.
Should be good now.
There are better info on this in the help .