At the ShieldsUp! Test I got this results (none of my ports were open, by the way).
Ping Reply: RECEIVED (FAILED) — Your system REPLIED to our Ping (ICMP Echo) requests, making it visible on the Internet. Most personal firewalls can be configured to block, drop, and ignore such ping requests in order to better hide systems from hackers. This is highly recommended since "Ping" is among the oldest and most common methods used to locate systems prior to further exploitation.
I’ve tried adding a rule do discard all ICMP packets… (Block), but that didn’t work. How can I make sure I pass that test and block the ping reply?
This is a flash demo on how to set up the basic rules to allow “normal” internet and LAN usage under CPF. There are quite a few differences between it and your ruleset.
Have you defined a zone for your LAN? Have you added it as a trusted zone?
P.S. Demo created using wink! and doesn’t work under FF or Opera. Use IE or IE-based browser to view it.
Ive followed the tutorial, but my PC still responds to ICMP pings…
EDIT: In the Windows Firewall config, even though I have turned it off, Echo response is ticked enabled. I can’t disable it. It say’s that it is auto enabled because port 445 is enabled. Help?
In the forum fro the latest beta (2.3.0.20), egemen has posted a couple of screen shots of the rules for this version. Try replicating these rules in your version, particularly the zone and fragmentedICMP rules.
Yeah, I do, good point.
Ah well, since I don’t have any open ports and am behind a router, it’s not really a security risk, and It’s nothing to do with Comodo. Thanks for the replies, anyway