Just from quickly reading the guide, It was supposed to be there.
But the guide is for the firewall before CIS and the thread goes on forever.
There may be a correction or change later in the thread.
I never used the guide, but my utorrent works fine.
I will go and read the thread some more and reconcile my way versus their way.
I’ll get back with a solution.
OK my way is more simplified and less granular, but I am good with it.
Bad Frogger’s uTorrent/CIS Set Up.
Set uTorrent to listen on one high numbered port xxxxx. Between 49152 - 65535
Deselect > Randomize Port.
Start uTorrent and answer yes & remember to the first firewall pop up.
If you haven’t allready had one.
(just to get a utorrent entry in firewall application rules.)
In Application Network Access Control > Use a Custom Policy > Add
In Network Control Rule > Allow > TCP or UDP > In > Source Address > Any >
Destination Address > your MAC address > Source Port > Any > Destination Port >
your utorrent listening Port from step 1. xxxxx > Apply.
Add > Network Control Rule > Allow > TCP or UDP > Out > Source Address > Any
Destination Address > Any > Source Port > Any > Destination Port > Any > Apply.
Add > Network Control Rule > Block > tick Log > IP > In/Out > Source Address > Any >
Destination Address > Any > IP Details > Any > Apply.
Should look like attached pic 1. > Apply. Should look like pic 2. > Apply.
Global Rules tab > Add > Network Control Rule > Allow > TCP or UDP > In >
Description > uTorrent Rule (see pic 3.) > Source Address > Any > Destination Address >
your MAC address > Source Port > Any > Destination Port > your uTorrent listening Port >
Apply.
Select uTorrent rule > Move Up. (to be sure it is above your existing Block All Rule.)
pic 4. > Apply.
Note To Turn Off/Close Port at any time just select uTorrent Rule > Move Down below
Block All Rule. > Apply.
The pre existing rules are from running the Stealth Ports Wizard > Invisible to Everyone.
I am not behind a router at the moment so that’s it. Go Hard!
If you are behind a router you have to Open and Forward your Listening Port on the router.
Or your speed will be slow and you will be not connectible.
UPDATE - I have always ignored ICMP Unreachable messages. However it has been
pointed out that blocking these messages can make the firewall log unnecessarily fill up.
And because your uTorrent client doesn’t receive these messages, your client waits until the
original request times out before trying a different peer.
You may find a slight speed increase and keep a cleaner firewall log by adding the following 3 rules.
NOTE Does Not Affect Your Stealth Status.
Global Rules tab > Add > Allow > ICMP > In > Description = Allow ICMP In Host
Unreachable > Source Address > Any > Destination Address > your MAC address >
ICMP Details > Message > Icmp Host Unreachable > Apply > Apply.
Global Rules tab > Add > Allow > ICMP > In > Description = Allow ICMP In Network
Unreachable > Source Address > Any > Destination Address > your MAC address >
ICMP Details > Message > Icmp Net Unreachable > Apply > Apply.
Global Rules tab > Add > Allow > ICMP > In > Description = Allow ICMP In Port Unreachable
Source Address > Any > Destination Address > your MAC address > ICMP Details >
Message > Icmp Port Unreachable > Apply > Apply.
See Pic “ICMP_Host_Port_Net.png” This is how global rules look when done.
Thanks for your help so far but I still need some help. :S
On pic 4, under the global rules you have 4 other rules that I don’t have.
Allow IP Out From IP Any To Any Where Protocol Is Any.
Allow ICMP In From IP Any To IP Any Where ICMP Message Is FRAGMENTATION NEEDED
Allow ICMP In From IP Any To IP Any Where ICMP Message Is TIME EXCEEDED
“uTorrent Rule”
Block And Log IP In From IP Any To IP Any Where Protocol Is Any
Those rules are necessary for stealth ports (makes your PC invisible). I got them by running the
Stealth Ports Wizard on the Firewall Summary Page. You could run the wizard or make them.
The top one is needed to allow out bound.
The 2 Allow rules above the Block and uTorrent in combination with the Block Rule
make your PC not respond to PING’s.
Last whether you Stealth or not a Block rule is a must. NOTE The last one Block and Log IP IN from IP ANY to IP ANY Where Protocol is ANY.
is critical. It is what blocks all unrequested incoming traffic. The main function of any
firewall.
Rules are read/filtered top to bottom that is why you can open or close your P2P listening Port
by moving your uTorrent rule above=Open or below=Closed the Block rule.
Also I run Configuration in Proactive Security Mode, with Defense+ and Firewall both in Safe Mode.
These settings are on the right click menu on taskbar icon.
You do not need to do any of this if are behind a router/hardware firewall. Just make uTorrent trusted and port forward uTorrent im your hardware firewall. All the instructions you need are in the Port Forward site. Click on the check mark on the bottom of uTorrent.
Router at home, but more than once in a while I use utorrent from an non protected wireless access point.
I was thinking about 2 sets of rules.
a. trusted application behind the router (as it is now) for the sake of simplicity
b. special rules set when I need to operate a quick download from a public/non protected access point.
A Bit Torrent tracker centrally coordinates the P2P transfer of files among users. BitTorrent trackers are software server "toolkit" applications that typically run on Web sites. BNBT and CBTT are names of common BitTorrent tracker toolkits.
without connection from the trackers to my machine, can I still download torrents?