My Azureus listening port is 54983 and as advised I have created netmon rule to allow input from that port.
When using the vpn I am getting a huge number of inbound policy violations (:NRD) , access denied… port 45147. I presume this is something to do with the way vpn works and I should create a netmon rule for that port as well. Am I correct?
I have my VPN connection working and I can surf through it to the web. For p2p it is recommended by the vpn supplier that I do not use their firewalled feed and they advise against the connection to the feed being made a trusted zone.
From this I have deduced that a normal connection would be sufficient as that does not default to trusted. Presumably I have to specifically make an address trusted otherwise it will not be.
As mentioned above I am getting 45147 port in, blocked by Comodo. This only happens when I connect through the vpn. Can you see any problem with allowing it through?
The attached entries are taking place without being connected to azureus ie it was not loaded when the entries appeared. Should I be making a multiple port rule in the netmon?
There’s no difference between creating 2 netmon rules for TCP/UDP for those 2 ports or creating one netmon rule for both other than being efficient so you have less rules on your list. I like efficiency, so I would recommend that you set it as one rule whenever possible.