just wondering; I’m not sure the packet rules panel is appropriate for this, as I need to enter as you can imagine 2 IPs in the same entry; would it work with and hyphen between the two ?
ps: not talking about URL blocking at all here
just wondering; I’m not sure the packet rules panel is appropriate for this, as I need to enter as you can imagine 2 IPs in the same entry; would it work with and hyphen between the two ?
ps: not talking about URL blocking at all here
No, IP blocking in the firewall, I understand you perfectly well
Like they do with a port range you mean ? I have no idea if it works. But I think together with the friends list there should be a block list as well.
Greetz, Red.
So what you suggest is make a rule like this ?
Block All In/Out IP adress-IP adress
Greetz, Red.
I think together with the friends list there should be a block list as well
yeah I too thought they should implement it that way, but with more tweaking, ports and protocol.
What I suggest: you can’t make a rule without referring to an application. What I need is a global network rule with just what you said: Block All In/Out IP adress-IP adress
on a side note, a bit off topic but I won’t start a new thread for this as there is no feedback anyway (for firewall and sandbox):
don’t know which is the culprit, Windows or Avast Firewall… when closing my Internet completely (wifi :-X ), all current connections keep being displayed in the network activity panel of Avast. But also in Windows resource monitor, avast is probably picking up the info using the same method (?)…with no packet sent/received of course, but the list is just not refreshed at all. That’s regrettable, when compared to Comodo firewall connection panel where stuff gets refreshed almost in real time. Also, Avast doesn’t offer the opportunity to abort connections individually :
OK it works, example with Google:
209.85.128.0-209.85.255.255
Nice
But than only google applications are blocked to that IP range, right ??? Now how to block all network trafic to an ip range:-\
Greetz, Red.
The packet rules are global - so what Logos showed will apply to all processes.
The firewall also has the functionality per-application, but it’s currently not exposed via the UI.
This will be added in one of the upcoming updates.
Thanks
Vlk
I get it, it’s just a name for the rule
What about a separate global IP Blocklist like the friends list as we suggested ???
Greetz, Red.
Yeah, the “Enemy list”. You’ll have to wait for Lukas on this one, I’m afraid.
(he’s currently in Thailand though).
Thanks
Vlk
I get it, it's just a name for the ruleyes, no executable there ;) you can call it whatever you want.
like Vlk mentioned, that’s global, once done no process can access anything inside that IP range.
@ Vlk, OK, so I suppose this means it will be possible to block an application access to one single IP or an IP range, or some protocol and ports, and not block it completely like it can be done already. Good to hear as I was also wondering about that earlier today. Saw an unexpected persistent connection…only way out was to terminate the process, as you can’t abort a connection currently, as well as you can’t (yet) blacklist just one connection for an app.
All of these will be there relatively soon… all are implemented in the engine, there’s just no UI for them.
Thanks
Vlk
What about the ability to import an IP Blacklist from the Calender Of Updates like Kaspersky, Online Armor and Outpost ???
Greetz, Red.