Rules Flowchart

Somebody mentioned a flowchart? Is this one ok? I’ve made it in Draw in 10 minutes for my personal use. I’m new to COMODO and Firewalls in general.

[attachment deleted by admin]

One small point that might make you rethink your diagram (great idea to do it as a flowchart BTW);

Your flowcharts contains the terms “Incoming - to and from your PC - requested” and “Outgoing - from and to your PC - requested”.

The terms “incoming” and outgoing", in a firewall context, refer to the originiating point in any data exchange, relative to your PC.

When your PC requests, for example, a web site, your PC is starting the “conversation” with the web server that contains the web page. Since your PC is the originating point of the conversation, this is normally considered an outbound connection, as the first bit was outbound from your PC. The replies that come back from the web server are assumed, as they are seen as a valid response to your valid outbound request.

If, on the other hand, someone out there on the internet tries to contact your PC (pinging or port scanning your IP address, for example) without your PC requesting the contact, since they are the originating point in the conversation, this is usually termed an inbound request. Because your PC didn’t ask for the contact, this can also be called an inbound unsolicited request.

As a rule, inbound unsolicited requests are BAD!! Very bad! There, therefore, needs to be a rule in your firewall that blocks these.

Ewen :slight_smile:

It says Outgoing is unrequested :slight_smile: Hey! It should be opposite! :confused:

I was trying to reflect this:

I think highlited part confused me PLUS I got it wrong aside of being confused :slight_smile:

So… How about the next version of my flowchart? :slight_smile:

[attachment deleted by admin]

Nice job! Well done and very easy to follow.

Ewen :slight_smile:

Thank you! ;D
Soooo… If it’s correct why don’t someone use it for this “manual for users by users” I’ve heard of. I can provide it in DRAW (.odg) format.