I have looked up the forum but no answer I have found.
Situation:
I have first computer connected to the internet and second connected to the first. In the first computer I enable the option to use internet from other computers in the network.
It works well with Windows Firewall.
But then comes Comodo Firewall and this configuration doesn’t work
There is a check in the checkbox for ICS Server.
If you have a machine facing the Internet, and is also serving as a firewall for other machines, the set up is not quite so straightforward. There is a Comodo wiki topic that covers a lot of the details.
First, is to make sure that the Windows Firewall is turned off, and so is not causing some conflict with Comodo Firewall. Click Start → Control Panel → Security Center. If Windows Firewall is running, the Security Center should show that, in which case, turn it off.
Second, is to confirm the Comodo Firewall settings, in detail. To do that, you’ll need to run the Config Reporting Script. Download the script to your desktop, and just click the desktop icon to run the script. This will produce a text file report that you can post here. Run this script on the machine that is the ICS host.
=========================================================================================
System Information
General Information
User K Member of {Administrators, }
Logged on machine C1 at 15.12.2008 19:23:23
Microsoft(R) Windows(R) XP Professional x64 Edition 5.2.3790 SP 2.0
Codepage: windows-1251
Free Physical Memory: 2898MB
Data Execution Prevention Settings
MS Windows DEP Policy: OptOut
Hardware DEP available
DEP enabled for 32Bit Appplications
DEP enabled for Drivers
=========================================================================================
CIS/CFP Installation Information
Installation Mode: Firewall
Installation Path: C:\Program Files\Comodo\COMODO Internet Security
INFORMATION: There are 4 Configurations reported In CFP Configuration Tree
INFORMATION: Active Configuration ID 0 reported In CFP Configuration Tree
DIAGNOSTIC: 4 Configuration/s Confirmed
File Group 7: [COMODO Internet Security] is defined as
[0] C:\Program Files\Comodo\COMODO Internet Security\cfp.exe
[1] C:\Program Files\Comodo\COMODO Internet Security\cmdagent.exe
[2] C:\Program Files\Comodo\COMODO Internet Security\cfpupdat.exe
[3] C:\Program Files\Comodo\COMODO Internet Security\cfpsbmit.exe
[4] C:\Program Files\Comodo\COMODO Internet Security\cfplogvw.exe
[5] C:\Program Files\Comodo\COMODO Internet Security\crashrep.exe
File Group 8: [Startup Folders] is defined as
[0] C:\Documents and Settings\All Users\Start Menu\Programs\Startup*
[1] C:\Documents and Settings\K\Start Menu\Programs\Startup*
[2] C:\WINDOWS\system32\GroupPolicy\Machine\Scripts\Startup*
[3] C:\WINDOWS\system32\GroupPolicy\User\Scripts\Logon*
File Group 9: [Windows Management] is defined as
[0] \Device\NamedPipe\atsvc
File Group 10: [3rd Party Protocol Drivers] is defined as
INFORMATION: There are 7 Global Rules reported In CFP Configuration Tree
[0] Allow UDP In/Out From IP Any To IP [255.255.255.255] Where Source Port Is In [67-68] And Destination Port Is In [67-68]
[1] Allow IP In/Out From Zone [Local Area Network #2] To Zone [Local Area Network #2] Where Protocol Is Any
[2] Block TCP Or UDP Out From Zone [Local Area Network #2] To IP Any Where Source Port Is Any And Destination Port Is In [136-139]
[3] Allow TCP Or UDP Out From Zone [Local Area Network #2] To IP Any Where Source Port Is Any And Destination Port Is Any
[4] Allow ICMP Out From Zone [Local Area Network #2] To IP Any Where ICMP Message Is Any
[5] Block IP In/Out From Zone [Local Area Network #2] To IP Any Where Protocol Is Any
[6] Block ICMP In From IP Any To IP Any Where ICMP Message Is ECHO REQUEST {8.0}
Network Security Policy
INFORMATION: There are 24 Application Rules reported In CFP Configuration Tree
The predefined rules are as follows:
[0] Allow IP Out From IP Any To Zone [Loopback Zone] Where Protocol Is Any
[1] Allow TCP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is In. [HTTP Ports]
[2] Allow TCP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is 21
[3] Allow TCP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is Not In. [Privileged Ports]
[4] Allow UDP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is 53
[5] Block & Log IP In/Out From IP Any To IP Any Where Protocol Is Any
The predefined rules are as follows:
[0] Allow IP Out From IP Any To Zone [Loopback Zone] Where Protocol Is Any
[1] Allow TCP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is In. [HTTP Ports]
[2] Allow TCP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is 21
[3] Allow TCP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is Not In. [Privileged Ports]
[4] Allow UDP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is 53
[5] Block & Log IP In/Out From IP Any To IP Any Where Protocol Is Any
Application 4: System Treat as: [Custom Policy]
[0] Allow IP Out From IP Any To Zone [Local Area Network #2] Where Protocol Is Any
[1] Allow IP In From Zone [Local Area Network #2] To IP Any Where Protocol Is Any
[2] Allow IP Out From IP Any To IP Any Where Protocol Is Any
[3] Allow IP In From IP Any To IP Any Where Protocol Is Any
The predefined rules are as follows:
[0] Allow IP In/Out From IP Any To IP Any Where Protocol Is Any
Application 7: Group [COMODO Internet Security] Treat as: [Outgoing Only]
The predefined rules are as follows:
[0] Allow TCP Or UDP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is Any
[1] Block & Log IP In/Out From IP Any To IP Any Where Protocol Is Any
Application 8: Group [Windows Updater Applications] Treat as: [Custom Policy]
[0] Allow TCP Or UDP Out From IP Any To IP Any Where Source Port Is Any And Destination Port Is Any
[0] Allow UDP In From IP In [192.168.0.2/255.255.255.0] To IP Any Where Source Port Is Any And Destination Port Is Any
[1] Allow IP Out From IP Any To IP Any Where Protocol Is Any
[0] Allow IP Out From IP Any To IP Any Where Protocol Is Any
Firewall Settings
Firewall Behavior Settings
Firewall Mode [train with Safe Mode] Alert level [Low]
Keep an alert on Screen For a Maximum of 120 seconds
Enable Alerts For TCP requests
Enable Alerts For UDP requests
Enable Alerts For ICMP requests
This Computer is an Internet gateway
Enable Alerts For Loopback requests
It looks like there is a problem with the a Global Rule:
[5] Block IP In/Out From Zone [Local Area Network #2] To IP Any Where Protocol Is Any
If you consider how an ICS LAN is laid out:
Internet ---- modem ----- ICS host ------- other PCs
when one of the other PCs wants to connect to the Internet, it has to send the packet into the ICS host. But rule 5, as written, will block that packet.
To fix that, rule 5 should be
[5] Block IP Out From Zone [Local Area Network #2] To IP Any Where Protocol Is Any
so that packets can come in from the other PCs, but but packets not expected in the usual protocols (TCP, UDP, or ICMP) will be blocked.