Jump to content
Not connected, Your IP: 13.59.73.248

Search the Community

Showing results for tags 'Comodo'.



More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • AirVPN
    • News and Announcement
    • How-To
    • Databases
  • Community
    • General & Suggestions
    • Troubleshooting and Problems
    • Blocked websites warning
    • Eddie - AirVPN Client
    • DNS Lists
    • Reviews
    • Other VPN competitors or features
    • Nonprofit
    • Off-Topic
  • Other Projects
    • IP Leak
    • XMPP

Product Groups

  • AirVPN Access
  • Coupons
  • Misc

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


Website URL


Twitter


Mastodon


AIM


MSN


ICQ


Yahoo


XMPP / Jabber


Skype


Location


Interests

Found 14 results

  1. Hello, Server Side(the computer where EMBY software is installed) Name it embymyairvpnserver as an example. You can pick any name you want, for your EMBY server if available. After you config this in Port Forwarding in your account/profile @ airvpn.org. -------------------------- localport: 8096 forwarded port: 34567(e.g.) or pick your own. -------------------------- Server Side Comodo FW Rule(image example) Updated. Use it for embyserver.exe and embytray.exe. emby.server.allowed.address in Network Zones-->contains all your clients IPs which you define as range(184.75.0.0-184.75.255.255) or single address. Server Side -- AirVPN server you connect to make sure it is close to your location(latency/speed*) *Upload speed is what matters here. EMBY Server Side --- Rotating Servers Option 1.(Use Option2 if you don't want/wish/have to task kill and re-start EMBY). EMBY.rotate.openvpn.servers.at.time.specified.bat.zip ----------------------------------------------------------------------------------------- 1. CHANGE THE NAME OF YOUR TAP/VPN ADAPTER(S). 2. 3600 SECONDS IS JUST AN EXAMPLE FOR THE COUNTDOWN....MAKE IT 10000/15000/20000 SECONDS. 3. embytray.exe and embyserver.exe process will be killed/terminated. 4 embytray.exe and embyserver.exe process will be re-started. 5. It will then use the new IP/server IP. 6. No fancy interface/UI.....things are kept simple(command line) ----------------------------------------------------------------------------------------- Option 2. https://airvpn.org/topic/17440-guide-fix-for-tap-adapter-in-windows/page-3?do=findComment&comment=83234 Client Side(computer or device where you connect from) Use your Iphone/Tablet open a browser and key in embymyairvpnserver.airdns.org:34567 Comodo Rule Use this for client computers--> https://airvpn.org/topic/29189-block-all-interfaces-except-tapvpn/ Log-in and happy streaming. Client Side -- Use your ISP IP(any IP). IF IT IS NOT IN THE LIST OF emby.server.allowed.address IT WILL NOT CONNECT. *Download speed is what matters on the Client Side.. P.S. I would recommend that both computers/devices(Server/Client) are connected to different AirVPN servers. NOTE: This is only for http NOT https. Regards, Flx
  2. Yesterday I was running airvpn over tor with socks5 (vip72). I had no issues, iplocation.net had my location pinned as the location of my socks5 proxy. But today I am running the same setup but iplocation.net still has my location pinned as the location of the airvpn server. ( we'll say airvpn server is somewhere in WA, and socks5 is somewhere in Texas) The only change I have made since yesterday is that I switched my DNS servers to Comodo rather than my ISP. Would this be enough to change the differing results?
  3. Hello, Prior to having trouble I was using an older version of Comodo Firewall that had a GUI similar to the one in this post: https://airvpn.org/topic/3405-windows-comodo-prevent-leaks/ (sorry I don't recall the exact version). The firewall was working fine and prevented any form of leaks when AirVPN was disconnected for whatever reason. Upon doing a clean install of Comodo Firewall two days ago and reconfiguring the global rules as described in the tutorial above traffic coming from my computer when the VPN connections is down is no longer blocked based on ipleak.net. Im assuming there is something that changed in the new version of Comodo Firewall because I followed the same procedure as I had in the past. This blog post: https://www.bestvpn.com/blog/10218/build-your-own-vpn-kill-switch-in-windows-comodo/ also mentioned problems regarding their implementation of preventing leaks upon using the new version of Comodo Firewall, so I don't believe I am following the tutorial provided by AirVPN incorrectly. If anyone else could test AirVPNs initial tutorial with the newest version of Comodo Firewall it would be appreciated just so I know it's not me that is doing something wrong. If that is the case I can take screenshots of what I've done to try to fix my issue. As of now I have been using the Network Lock feature in the GUI and it seems to be working fine which I will stick to if I can't get Comodo to work. Thanks.
  4. Is it possible to configure Comodo Firewall (or Windows firewall) to block a particular browser (e.g. Firefox) from accessing the internet when via the VPN interface (TAP adapter), while everything else is allowed to use the VPN connection?
  5. Hi, I want to set up comodo to prevent dns & ip leaks. I have found this tutorial on a vpn review website. But it's dated. How can I set up comodo just as in this tutorial for the new version of comodo? https://www.bestvpn.com/blog/10218/build-your-own-vpn-kill-switch-in-windows-comodo/ Thank you.
  6. Hi guys, I set up Comodo Firewall in the way you descriped it on this tutorial https://airvpn.org/index.php?option=com_kunena&func=view&catid=3&id=3405&Itemid=142 I did everything correctly (I think so) but I'm still leaking DNS. When I access AirVPN homepage via VPNClient it says at the bottom "not connected" Any ideas how to fix this?? I can see my own IP address
  7. I have an OpenVPN issue. The problem is, I can only switch back and forth once before I am forced to restart my computer due to a completely loss of network capability. For Example: 1. Connect to OpenVPN 2. Disconnect (everything fine) 3. Connect to OpenVPN (network issues) 4. Disconnect (network issues remain) When I say it is "broken" I mean I cannot access any websites or other computers on my local network. When I open a command prompt (Windows 7) and type ipconfig /renew I receive the message: No operation can be performed on Local Area Connection 5 while it has its media disconnected. This is weird because my network adapter is enabled. The only other connection I have is the TAP-Windows Adapter setup by OpenVPN. So I right click and disable that connection. I try the ipconfig command again and this time receive the message: The operation failed as no adapter is in the state permissible for this operation. I tried to disable/re-enable my non-TAP LAN but I receive the same message when I try the ipconfig command again. I find it very weird that the ipconfig command is targeting the TAP when it should be targeting my normal LAN adapter. OpenVPN is also able to connect to the AirVPN servers without issue, despite my network issues. I know very little about OpenVPN so I am completely unsure on how to proceed. Is there anything I can do to reset my network stuff via the command prompt to avoid having to restart my entire computer? Any ideas on what is happening with OpenVPN?
  8. While using AirVPN I only want a single application (my browser) to have access to the internet. Should any other internet related application startup I do not want it to connect to the internet. Is there a way to block all applications except those I specify should have access?
  9. How do you configure the firewall (I'm wondering about both Comodo (Windows) and GUFW (Linux)) when using Air VPN over TOR? Or, are the firewall settings to prevent leaks the same as if I were just using Air VPN? Assuming I was fine with my ISP seeing that I'm using TOR, is there any reason to choose TOR over VPN instead of VPN over TOR? I read the TOR page on this site, but I just want to be sure there aren't cases in which I shouldn't choose VPN over TOR. I've heard some people talk about wanting to hide from their ISP the fact that they are using TOR. Why is this? Do some ISPs not tolerate their customers using TOR?
  10. Hi everyone, one year ago i used Comodo+uTorrent on WinXP to prevent leaks, which did quite well. But installing Comodo on a Win7 machine always causes the problem, that no connection can be established. uTorrent tells "DHT: Waiting to log in", even if Comodo firewall is NOT on. Which means, installing Comodo firewall changes some of my internet preferences. After deinstalling Comodo firewall, everything works fine. Do you have any ideas? (For me it seems to be any option which has to be set on/off, but i can't get it run.) Thanks a lot, mrronny
  11. Hello! I am using COMODO but the posts on the forum about its configuration lock too many connections for my needs. I only want to prevent two programs from communicating when I am not connected to AirVPN, i.e. utorrent and jdownloader. To do that, I set the configuration shown in the picture below: Can you confirm that I do not have any kind of leaks for the two programs when I disconnect from the VPN? Am I safe even if the connection to you stops working? I made some tests and the configuration seems to be effective (when I disconnect from you the downloads and uploads just stop), but I'd like to have a confirmation. Kind regards, Pr1nc1p1
  12. Since I use the Comodo firewall at the recommendation of the excellent support staff here, I was wondering what do you think of their Dragon web browser, as far as privacy and security is concerned? Because I respect their opinions on such matters, I'd love to hear from the support staff, but also others who might have used it. Thanks in advance, L
  13. Hello, You reccommend Comodo as being a very good firewall for Windows. What about Smart Security from Eset? And if so do can you provide some settings that we should use in order not to get leaks?
  14. Hello! Previous thread on Windows and Comodo to prevent DNS leaks and leaks in case of unexpected VPN disconnection have become very big and detailed. We invite you to consult those threads for details and support, while we publish this message as a quick, clarifying overview of the essential steps. Please note that if you don't use Windows you don't need to read this post. If you use Windows and a firewall other than Comodo, you can anyway take these rules as an example and adapt them to your firewall. This is a minimal set of instructions to prevent any leak in case of unexpected VPN disconnection and prevent, in any case, DNS leaks, on Windows system with Comodo firewall. Comodo firewall is currently the only firewall we recommend for Windows. The free version is just fine for our purposes. Never rename the rules: in case you need support, we need to see what the rules really state. 1) If you're not familiar with a firewall, read Comodo Firewall manual or guides. In particular, please see the following: https://help.comodo.com/topic-72-1-451-4773-global-rules.html https://help.comodo.com/topic-72-1-451-4884-Network-Zones.html 2) Install Comodo Personal Firewall free version available here: https://personalfirewall.comodo.com/ 3) Set the Firewall Security Level to "Custom Policy" 4) Determine or create the Network Zone of your TAP-Win32 network adapter (from now on "AirVPN"). A safe way to define it: IP Range [10.1.0.0 - 10.255.255.255] if you need OpenVPN over SSH/SSL and other alternative connection modes, see also https://airvpn.org/specs 5) Determine the entry-IP addresses of the AirVPN server(s) you wish to connect to: https://airvpn.org/topic/14378-how-can-i-get-vpn-servers-entry-ip-addresses 6) Define a "Global Rule" which blocks everything: Block And Log IP In/Out From MAC Any To MAC Any Where Protocol Is Any The logging is important for troubleshooting if necessary. 7) Put the above Global Rule in the top position. This will block completely your connectivity and let you add a whitelist of Allow global rules put BEFORE this total block global rule. All the "Allow" rules that you want to be evaluated shall be put BEFORE (i.e. higher than) the above block rule. 8) Define a"Global" rule which allows in/out communications of your TAP-Win32 adapter ("AirVPN") both In and Out: Allow IP In/Out From In [AirVPN] To MAC Any Where Protocol Is Any Allow IP In/Out From MAC Any To In [AirVPN] Where Protocol Is Any 9) Do the same for your loopback zone (IP range 127.0.0.1 - 127.255.255.254) Allow IP In/Out From In [Loopback Zone] to MAC Any Where Protocol Is Any Allow IP In/Out From MAC Any To In [Loopback Zone] Where Protocol Is Any 10) Do the same for any entry-IP address of the VPN servers you wish to connect to. For example for Leporis: Allow TCP or UDP In/Out From IP 95.211.191.33 To MAC Any Where Source Port Is Any And Destination Port Is Any Allow TCP or UDP In/Out From MAC Any To IP 95.211.191.33 Where Source Port Is Any And Destination Port Is Any For your comfort, you might define a Network Zone (for example [Air servers entry IPs]) containing only the entry-IP addresses of our servers and then set two rules like Allow TCP or UDP In/Out From In [Air servers entry IPs] To MAC Any Where Source Port Is Any And Destination Port Is Any Allow TCP or UDP In/Out From MAC Any To In [Air servers entry IPs] Where Source Port Is Any And Destination Port Is Any In this way, you will only need to add a single IPv4 address to that Network Zone in order to connect to a new server, instead of defining two additional rules for each server, which may be annoying if you switch between a lot of servers. 11) Add similar rules to allow communications of your device with your router (and within your home/office network, if you wish so). For example, if your network is [192.168.0.0 / 255.255.0.0] define a network zone with IP Range [192.168.0.0 - 192.168.255.255] (let's call it "Home Network") and set the following rules: Allow TCP In/Out From In [Home Network] To In [Home Network] Where Source Port Is Any And Destination Port Is Any Allow UDP In/Out From In [Home Network] To In [Home Network] Where Source Port Is Any And Destination Port Is Not 53 Allow ICMP In/Out From In [Home Network] To In [Home Network] Where ICMP Message Is Any 11a) Allow DHCP "negotiation": Allow IP In/Out From MAC Any To IP 255.255.255.255 Where Protocol Is Any 12) In order to allow "airvpn.org" resolution even when disconnected (and any other hostname you wish to be resolved even when VPN is disconnected), add to your hosts file the line: 95.211.138.143 airvpn.org Do not forget about this change! If we change our main frontend IP address, you will not be able to reach airvpn.org anymore until you remove that line. No more necessary starting with Air client edition 2 "Eddie". 13) If you use the Air client, add rules to allow communications with IP addresses 5.196.64.52 and 95.211.138.143 (two of our frontend servers), In and Out Allow TCP or UDP In/Out From IP 5.196.64.52 To MAC Any Where Source Port Is Any And Destination Port Is Any Allow TCP or UDP In/Out From MAC Any To IP 5.196.64.52 Where Source Port Is Any And Destination Port Is Any Allow TCP or UDP In/Out From IP 95.211.138.143 To MAC Any Where Source Port Is Any And Destination Port Is Any Allow TCP or UDP In/Out From MAC Any To IP 95.211.138.143 Where Source Port Is Any And Destination Port Is Any 14) You can progressively enlarge your whitelist just by adding "Allow" rules before the total blocking rule of point 6) according to your system needs. Keep in mind that there are literally dozens of ways to accomplish the same task with Comodo. Pay attention not to confuse the "-" symbol, which stands for "IP range", with the "/" symbol, which stands for IP address / NetMask. For example, [10.4.0.0 - 10.9.255.255] is correct (the IP range from 10.4.0.0 to 10.9.255.255), while [10.4.0.0 / 10.9.255.255] is NOT correct (IP 10.4.0.0 NetMask 10.9.255.255, which covers almost every existing IP address!). When you have defined all the rules, do not forget to click "Apply" and "OK" in order to store them and make them active for any new connection. Test everything and do not be afraid to experiment before you rely on the secured connection for sensitive data transmissions. Kind regards
×
×
  • Create New...