Comodo Help
Find the desired product help
Comodo Internet Security

Comodo Internet Security

Version 5.9/5.10

English

Print Help Download Help
Appendix 1 CIS - How To... Tutorials > Enabling File Sharing Applications Like BitTorrent And Emule
  • Introduction To Comodo Internet Security
    • Special Features
    • System Requirements
    • Installation
      • CIS Premium Installation
      • CIS Pro-Installation And Activation
      • CIS Complete-Installation And Activation
        • Installing Comodo Internet Security 2012 Complete
        • Activating Online Backup, TrustConnect And Guarantee
        • Installing Comodo Backup
        • Installing Comodo TrustConnect
      • Activating Pro/ Complete Services After Installation
        • Activating Your License
        • Activating Your Guarantee Coverage
        • Renewal Of Your License
    • Starting Comodo Internet Security
    • Comodo Internet Security - Overview Of Summary Screens
      • Comodo Internet Security – Summary
      • Comodo Antivirus – Summary
      • Comodo Firewall – Summary
    • Comodo Internet Security - Navigation
    • Understanding Alerts
  • Antivirus Tasks-Introduction
    • Run A Scan
    • Update Virus Database
    • Quarantined Items
    • View Antivirus Events
    • Submit Files To Comodo For Analysis
    • Scheduled Scans
    • Scan Profiles
    • Scanner Settings
      • Real Time Scanning
      • Manual Scanning
      • Scheduled Scanning
      • Exclusions
  • Firewall Tasks-Introduction
    • View Firewall Events
    • Define A New Trusted Application
    • Define A New Blocked Application
    • Network Security Policy
      • General Navigation
      • Application Rules
      • Global Rules
      • Predefined Policies
      • Network Zones
      • Blocked Zones
      • Port Sets
    • View Active Connections
    • Stealth Ports Wizard
    • Firewall Behavior Settings
      • General Settings
      • Alert Settings
      • Advanced Settings
  • Defense+ Tasks - Introduction
    • View Defense+ Events
    • Trusted Files
    • Unrecognized Files
      • Unrecognized Files
      • Submitted Files
    • Computer Security Policy
      • Defense+ Rules
      • Predefined Policies
      • Always Sandbox
      • Blocked Files
      • Protected Files And Folders
      • Protected Registry Keys
      • Protected COM Interfaces
      • Trusted Software Vendors
    • The Sandbox - An Introduction
      • Unknown Files - The Sand-boxing And Scanning Processes
    • View Active Process List
    • Run A Program In The Sandbox
    • Defense+ Settings
      • General Settings
      • Execution Control Settings
      • Sandbox Settings
      • Monitoring Settings
  • More Options-Introduction
    • Preferences
      • General Settings
      • Parental Control Settings
      • Appearance
      • Log Settings
      • Connection Settings
      • Update Settings
    • Manage My Configurations
      • Comodo Preset Configurations
      • Importing/Exporting And Managing Personal Configurations
    • Diagnostics
    • Check For Updates
    • Manage This Endpoint
    • Browse Support Forums
    • Help
    • About
  • Comodo GeekBuddy
    • Overview Of Services
    • Launching The Client And Using The Service
    • Accepting Remote Desktop Requests
    • Registration
    • Activation Of Service
    • Uninstalling Comodo GeekBuddy
  • TrustConnect Overview
    • Microsoft Windows - Configuration And Connection
    • Mac OS X - Configuration And Connection
    • Linux / OpenVPN - Configuration And Connection
    • Apple IPhone / IPod Touch - Configuration And Connection
    • TrustConnect FAQ
  • Comodo Dragon
  • Appendix 1 CIS - How To... Tutorials
    • Setting Up Security Levels Easily
    • Setting Up The Firewall For Maximum Security And Usability
    • Blocking Internet Access While Allowing Local Area Network (LAN) Access
    • Setting Up Defense+ For Maximum Security And Usability
    • How To Password Protect Your CIS Settings
    • How To Reset Forgotten Password (Advanced)
    • Running An Instant Antivirus Scan On Selected Items
    • Creating An Antivirus Scanning Schedule
    • Running An Untrusted Program Inside Sandbox
    • Restoring Incorrectly Quarantined Item(s)
    • Submitting Quarantined Items To Comodo For Analysis
    • Enabling File Sharing Applications Like BitTorrent And Emule
    • Blocking Any Downloads Of A Specific File Type
    • Disabling Defense+ And Sandboxing For Specific Files Selectively
    • Switching Between Complete CIS Suite And Individual Components (just AV Or FW)
    • Switch Off Automatic Antivirus And Software Updates
    • Suppressing CIS Alerts Temporarily While Playing Games
  • Appendix 2 Comodo Secure DNS Service
    • Router - Manually Enabling Or Disabling Comodo Secure DNS Service
    • Windows XP - Manually Enabling Or Disabling Comodo Secure DNS Service
    • Windows 7 / Vista - Manually Enabling Or Disabling Comodo Secure DNS Service
  • Appendix 3 CIS Versions
  • About Comodo Security Solutions

 

Enabling File Sharing Applications like BitTorrent and Emule


This page explains how to configure Comodo Firewall for file sharing applications like Shareaza/Emule and BitTorrent/UTorrent. To allow these file sharing applications, you must:

  • Disable 'Do Protocol analysis' (disable, by default)

  • Create a 'Predefined Firewall Policy' for Shareaza/Emule

  • Create a 'Predefined Firewall Policy' for BitTorrent/Utorrent'


To Create a 'Predefined Firewall Policy' for Shareaza/Emule

  1. Click 'Firewall' from the top navigation pane and click 'Network Security Policy' from the Firewall Tasks interface

  2. In the Network Security policy interface, click 'Predefined Policies' tab...



… and click 'Add'. The 'Application Network Access Control' interface will open for creating a new set of rules.

 



  1. Enter a descriptive name for the new policy to be created in the 'Description' text box (for example: For allowing Shareaza/Emule).

  2. Now you need to create six rules for the newly created security policy. To do so, click 'Add'. The 'Network Control Rule' interface will appear. For creating each rule, select the check box and choose the drop-down options under each tab as given below. After creating each rule, click Apply for the rule to be added and click 'Add' to create the next rule.



Rule 1

  • Action: Allow

  • Protocol: TCP

  • Direction: In

  • Description: Rule for incoming TCP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start Port = 1025 / End Port = 65535)

  • Destination port: A Single Port: (Port : Your TCP port of Shareaza/Emule)

Rule 2

  • Action: Allow

  • Protocol: UDP

  • Direction: In

  • Description: Rule for incoming UDP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start Port = 1025 / End Port = 65535)

  • Destination port: A Single Port: (Port : Your UDP port of Shareaza/Emule)


Rule 3

  • Action: Allow

  • Protocol: TCP or UDP

  • Direction: Out

  • Description: Rule for outgoing TCP and UDP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A port range: (start port = 1025 / end port = 65535)

  • Destination port: A port range: (start port = 1025 / end port = 65535)


Rule 4

  • Action: Allow

  • Protocol: ICMP

  • Direction: Out

  • Description: Ping the server (edk network)

  • Source Address: Any Address

  • Destination Address: Any Address

  • ICMP Details: Message: ICMP Echo Request

Rule 5

  • Action: Ask (Also select the check box 'Log as a firewall event if this rule is fired')

  • Protocol: TCP

  • Direction: Out

  • Description: Rule for HTTP requests

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A port range: (start port = 1025 / end port = 65535)

  • Destination port: Type: Single Port; (Port : 80)

Rule 6

  • Action: Block (Also select the check box 'Log as a firewall event if this rule is fired')

  • Protocol: IP

  • Direction: In/Out

  • Description: Block and Log All Unmatching Requests

  • Source Address: Any Address

  • Destination Address: Any Address

  • IP Details: IP Protocol: Any

 

  1. Click 'Apply' in the 'Application Network Access Control' interface.

The new policy will be created and added as a Predefined Security Policy. Start Shareaza or Emule. When Comodo raises a pop-up alert, choose 'Treat this application as', select the descriptive name you gave for this rule (e.g. For allowing Shareaza/Emule) from the options and select 'Remember my answer'.


To create a 'Predefined Firewall Policy' for BitTorrent/Utorrent'

  1. Click 'Firewall' from the top navigation pane and click 'Network Security Policy' from the Firewall Tasks interface

  2. In the Network Security policy interface, click 'Predefined Policies' tab and click 'Add'. The 'Application Network Access Control' interface will open for creating a new set of rules.

  3. Enter a descriptive name for the new policy to be created in the 'Description' text box (for example: For allowing BitTorrent/Utorrent).

  4. Now you need to create five rules for the newly created security policy. To do so, click 'Add'. The 'Network Control Rule' interface will appear. For creating each rule, select the check box and choose the drop-down options under each tab as given below. After creating each rule, click Apply for the rule to be added and click 'Add' to create the next rule.

Rule 1

  • Action: Allow

  • Protocol: TCP or UDP

  • Direction: In

  • Description: Rule for incoming TCP and UDP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start port = 1025 / End port = 65535)

  • Destination port: A Single Port (Port: The port of BitTorrent/Utorrent)

Rule 2

  • Action: Allow

  • Protocol: TCP

  • Direction: Out

  • Description: Rule for outgoing TCP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start port = 1025 / End port = 65535)

  • Destination port: A Port Range: (Start port = 1025 / End port = 65535)

Rule 3

  • Action: Allow

  • Protocol: UDP

  • Direction: Out

  • Description: Rule for outgoing UDP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Single Port: Port: the port of utorrent

  • Destination port: A Port Range: (Start port = 1025 / End port = 65535)

Rule 4

  • Action: Ask (Also select the check box 'Log as a firewall event if this rule is fired')

  • Protocol: TCP

  • Direction: Out

  • Description: Rule for HTTP requests

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range : (Start port = 1025 / End port = 65535)

  • Destination port; A Single Port (Port = 80)

Rule 5

  • Action: Block (Also select the check box 'Log as a firewall event if this rule is fired')

  • Protocol: IP

  • Direction: In/Out

  • Description: Block and Log All Unmatching Requests

  • Source Address: Any Address

  • Destination Address: Any Address

  • IP Details: IP Protocol: Any

  1. Click 'Apply' in the 'Application Network Access Control' interface.

The new policy will be created and added as a Predefined Security Policy. Start BitTorrent or Utorrent. When Comodo raises a pop-up alert, choose 'Treat this application as', select the descriptive name you gave for this rule (e.g. For allowing BitTorrent/Utorrent) from the options and select 'Remember my answer'.

 

 

To create a 'Predefined Firewall Policy' for BitTorrent/Utorrent'

  1. Click 'Firewall' from the top navigation pane and click 'Network Security Policy' from the Firewall Tasks interface.

  2. In the Network Security policy interface, click 'Predefined Policies' tab and click 'Add'. The 'Application Network Access Control' interface will open for creating a new set of rules.

  3. Enter a descriptive name for the new policy to be created in the 'Description' text box (for example: For allowing BitTorrent/Utorrent).

  4. Now you need to create five rules for the newly created security policy. To do so, click 'Add'. The 'Network Control Rule' interface will appear. For creating each rule, select the check box and choose the drop-down options under each tab as given below. After creating each rule, click Apply for the rule to be added and click 'Add' to create the next rule.

Rule 1

  • Action: Allow

  • Protocol: TCP or UDP

  • Direction: In

  • Description: Rule for incoming TCP and UDP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start port = 1025 / End port = 65535)

  • Destination port: A Single Port (Port: The port of BitTorrent/Utorrent)

Rule 2

  • Action: Allow

  • Protocol: TCP

  • Direction: Out

  • Description: Rule for outgoing TCP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start port = 1025 / End port = 65535)

  • Destination port: A Port Range: (Start port = 1025 / End port = 65535)

Rule 3

  • Action: Allow

  • Protocol: UDP

  • Direction: Out

  • Description: Rule for outgoing UDP connections

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Single Port: Port: the port of utorrent

  • Destination port: A Port Range: (Start port = 1025 / End port = 65535)

Rule 4

  • Action: Ask (Also select the check box 'Log as a firewall event if this rule is fired')

  • Protocol: TCP

  • Direction: Out

  • Description: Rule for HTTP requests

  • Source Address: Any Address

  • Destination Address: Any Address

  • Source port: A Port Range: (Start port = 1025 / End port = 65535)

  • Destination port; A Single Port (Port = 80)

Rule 5

  • Action: Block (Also select the check box 'Log as a firewall event if this rule is fired')

  • Protocol: IP

  • Direction: In/Out

  • Description: Block and Log All Unmatching Requests

  • Source Address: Any Address

  • Destination Address: Any Address

  • IP Details: IP Protocol: Any

  1. Click 'Apply' in the 'Application Network Access Control' interface.

The new policy will be created and added as a Predefined Security Policy. Start BitTorrent or Utorrent. When Comodo raises a pop-up alert, choose 'Treat this application as', select the descriptive name you gave for this rule (e.g. For allowing BitTorrent/Utorrent) from the options and select 'Remember my answer'.



Comodo Internet Security User Guide | © 2012 Comodo Security Solutions Inc. | All rights reserved

Our Products
  • Free Antivirus
  • Free Internet Security
  • Website Malware Removal
  • Free Anti-Malware
  • Anti-Spam (Free Trial)
  • Windows Antivirus
  • Antivirus for Windows 7
  • Antivirus for Windows 8
  • Antivirus for Windows 10
  • Antivirus for MAC
  • Antivirus for Linux
  • Free Endpoint Security
  • Free ModSecurity
  • Free RMM
  • Free Website Malware Scanner
  • Free Device Manager for Android
  • Free Demo
  • Network Security
  • Endpoint Protection
  • Antivirus for Android
  • Comodo Antivirus
  • Wordpress Security
Cheap CDN
  • Bootstrap CDN
  • Semantic UI CDN
  • Jquery CDN
  • CDN Plans
  • CDN
  • Free CDN
Enterprise
  • Patch Management Software
  • Patch Manager
  • Service Desk
  • Website Down
  • Endpoint Protection Solutions
  • Website Security Check
  • Remote Monitoring and Management
  • Website Security
  • Device Manager
  • ITSM
  • CRM
  • MSP
  • Android Device Manager
  • MDR Services
  • Managed IT Support Services
  • Free EDR
Free SSL Certificate
Support Partners Terms and Conditions Privacy Policy

© Comodo Group, Inc. 2025. All rights reserved.