Hi
I have just installed comodo firewall (and updated it) and every works very well.
But ( there’s always a but…) I do have one problem.
I have a netgear SC101 - this is a san device that works on DHCP and takes up 2 IPs.
It requires a driver to be installed onto each PC that accesses it as well as a background service to be running at all times.
I have allowed full access to the background service (in Application Monitor).
Both Ip’s Have been fixed (in the router) despite being DHCP and they have been fully allowed (in Network Monitor) and both rules appear above the “block” rules.
I have 3 problems… that appear in my logs.
1)Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fake or Malformed UDP Packet)
Direction: UDP Incoming Source: 192.168.1.4:20001
Destination: 192.168.1.2:1038
Reason: UDP packet length and the size on the wire(8226 bytes) do not match
2)Severity :High
Reporter :Network Monitor
Description: Blocked by Protocol Analysis (Fragmented IP Packet)
Direction: IP Incoming Source: 192.168.1.4
Destination: 192.168.1.2 Protocol : UDP
Reason: Fragmented IP packets are not allowed
3)Severity :High
Reporter :Network Monitor
Description: UDP Port Scan
Attacker: 192.168.1.4
Ports: 9483, 3339, 3595, 3851, 4107, 4363, 4619, 4875, 5131, 5387, 5643, 5899, 6155, 6411, 6667, 6923, 7179, 7435, 7691, 7947, 8203, 8459, 8715, 8971, 9227, 0, 0, 4, 0, 0, 0, 36864, 0,
The attacker has been temporarily blocked
For the time being I have disabled “do protocol analysis” and “block fragmented IP datagrams” in Security/Advanced/Advanced Attack Detection And Prevention/Miscellaneous
and then the Device works properly.
I have not found a solution to the 3rd problem - the port scan (nor do I know why the device makes a port scan) although despite blocking it’s IP, I never seem to lose access to the device (data transfer must be be thru the other IP).
As stated everything works so I am on the whole happy - but I would really like to re-enable the “do protocol analysis” and “block fragmented IP datagrams” as well exempt the device being blocked for port scanning.
Has anyone got any ideas on howto to do this?
Many thanks (for a great product - It’s a keeper )