Hey flarp,
welcome to the forums (:WAV)
No, it does not. Only network control rules are parsed in a hierarchical order.
Yes, you can do that. However, you should take the following into account:
One thing to note, in regards to the Alert Frequency...
By default, AF is set to Low; this will provide only details of Application, and Direction of traffic (ie, Out or In). If you leave it there, and create a rule in the Application Monitor that contains more information detail (such as Protocol or Port), the next time you check “Remember” and click Allow for that application on a popup alert, the detailed rule you created will be overwritten by a more generic rule, as the rules are written based on your AF level. If you want more detail, you have to increase the AF level, as grampa and pandlouk have noted.
Here’s the link (you might want to read the entire thread):
https://forums.comodo.com/index.php/topic,8704.msg63183.html#msg63183
For example, if I wanted a rule chain for application "foo.exe":
foo.exe : allow IP out from IP [Any] to IP [Any] where ipproto is any
foo.exe : allow IP in from IP x.x.x.x to IP [Any] where ipproto is any
foo.exe : block IP in from IP [Any] to IP [Any] where ipproto is any
The goal being I want the host at IP x.x.x.x to be able to make inbound connections to my computer to the application foo.exe, but I want to block everyone else. I also want for foo.exe to be able to talk out to anyone. I used to use ZoneAlarm, and they way I would accomplish this in ZA would be to put x.x.x.x in the trusted zone and allow foo.exe to act as a server for the trusted zone but block it for everyone else.
The application rules I have defined now are:
foo.exe : destination [Any] - port [Any] - TCP/UDP out - allow
foo.exe : destination [Any] - port [Any] - UDP in - allow (needed for DNS?)
foo.exe : destination x.x.x.x - port [Any] - TCP in - allow
foo.exe : destination [Any] - port [Any] - TCP in - block
As the rules in AM are not ordered hierachically it’s always better to create a rule using the exclude function than to create a general rule blocking all plus a specific rule allowing a specific IP-address.
I’d suggest you try the following rules (delete the others):
a. General
b. Destination IP
c. Destination Port
Rule 1 for foo.exe:
a. allow TCP/UDP out
b. any
c. any
This will allow foo.exe to talk out to anyone
Rule 2 for foo.exe:
a. block TCP/UDP in
b. EXCLUDE single IP (the IP of the host you want to allow to make inbound connections to your computer)
c. specify a port if you like or select “any”
I don’t think you’ll need the extra “UDP in” rule for DNS but I’m not sure.
Perhaps we’ll have to work on your network control rules as well, as they are more important than app. control rules. If your ACRs conflict with your NCRS, your NCRS will “win”!!!
Cheers,
grampa.
Whoops, sorry Toggie, I was a little late. Consider my post “not there”. :-\
Reading your post I get the impression I’ve got a lot more to learn.
flarp,
please forgive me if I posted nonsense. :-[