I just have downloaded and installed CPF and before I write anything else: THANK YOU for this fine product
Now my view/concern: I am kind of a pro user (admin since years) and have used Sunbelt PF before. What I am missing is the exact approval of IP-Adress and Port. Yes, it IS possible to do so manually. But why not when I approve in learning mode?
Programs which connect to 127.0.0.1 (localhost) are approved for ALL IPs and PORTS AND wheter they use it or not, both TCP and UDP. Why is that? Why is there no simple method in learning mode to choose: Yes, let programm xy use THIS IP and THIS port over THIS protocol…nothing else?
Maybe I have overseen something or are simply looking in the wrong place?
I think what you’re after is in Security > Advanced > Miscellaneous > Configure > the 2 loopback check options and the Alert Frequency Level, which can be adjusted to High or Very High, thereby generating each attempted connection’s IP, protocol, and port.
Now even when I defined some rpgrams (like firefox) that they are allowed to use tct and udp from and to all hosts and all ports, it asks me again and again when i surf to new sites.
I would think firewall rules are worked form above to the end, so when a rule says “allow all for this one” it should not aks again?
Since most programs make a DNS call (UDP 53) I have wrote a rule in the network monitor that allows just that. But still all programs ask me.
I am mot a firewall specialist but still have managed several of them. All had ruleset which were worked from top to bottom (allowed is, what is defined). How can I achieve that here?
If you set the Alert Frequency above the default Low then even you’ll naturally receive more alerts from Application Monitor, regardless of what you did with Network Monitor. Yes the order is from top (highest priority) to bottom (lowest priority), but Application Monitor is checked by CFP first then Network Monitor.
Network Monitor is universal and has the final decision on how ports and such are defined, whereas Application Monitor is application-specific.