Previous reports can be found starting from this link.
AMD Athlon™ XP 2500+ x86, Windows XP SP2 x32
Actively-running security and utility applications: CFP 184.108.40.2064, CMF 220.127.116.11
F+ custom policy mode, D+ train w/safe mode.
Advanced settings of F+ are default, except: alert frequency level set to “high”, option “This computer is an internet connection gateway…” is unchecked, options “Protect ARP cache” and “Block gratoitous ARP frames” are checked.
Advanced settings of D+ are default.
Predefined policy “Web Browser” has rule Allow Outgoing FTP-PASV Requests.
Exclude checkbox works as expected in this case.
P2P client eMule is configured to receive incoming TCP connections on port #27988.
two rules are created for eMule.exe:
3.0.18 behave in different way: with same rules incoming connection is not blocked anymore but firewall alert is shown that eMule.exe is trying to receive connection on port 27988 (custom policy mode). Though this connection should be allowed silently. Moreover, if one more rule is added at the end of the list for eMule.exe: block all unmatching, connection on port 27988 is blocked.
I think that is the correct behavior, as the checkbox means the FW will not apply the rule to the connections to that port, it does not tell what to do to these connections. The user may want an action other than allow or use more complex rules.