Guard your trusted internal network against infiltration from untrusted external sources.
User Rating
5 Star Rating UTM Firewall5 Star Rating UTM Firewall5 Star Rating UTM Firewall5 Star Rating UTM Firewall5 Star Rating UTM Firewall
5 / 5 1 Review

A strong security posture needs smart perimeter protection.

Maintaining day-to-day operations—and growing your business—requires network traffic to constantly flow into and out of your internal network. A lot of that traffic is trusted. But much of it isn't, and you need to be able to distinguish between the two. Comodo Dome Firewall is a unified threat management system that helps to secure all ports and protocols and delivers a host of security controls.

Comodo Dome Firewall is available in two versions: free and full protection.

Protect your network with full protection against all unknown internet-based threats. Comodo Dome’s free firewall will protect against all known threats, but what about the unknown? Upgrade to the full protection firewall to access the advanced security settings.

utm firewall

Key capabilities

  • Certification: Rest easy knowing that the Comodo Dome Firewall is Common Criteria EAL 4+ certified, which is verified by vendor-neutral, third-party laboratories.
  • Advanced protection: Defend against malware, phishing, and botnets at the gateway with real-time threat intelligence.
  • Flexible deployment: Easily upgrade from the free version to full protection with no re-installation required.

When is a firewall not just a firewall? When it protects against unknown, as well as known threats. Comodo Dome Firewall doesn't just deliver protection for all ports and protocols—it offers a host of other security features along with centralized management.

Unified firewall

Comodo Dome Firewall uses stateful packet inspection to secure all ports and protocols. You can create rules based on user, group, source, destination, MAC and IP, and schedule to control inbound and outbound traffic.

Gateway security

Protect against malware (signature-based), phishing, and botnets at the gateway. The Full Protection version also provides zero-day malware protection with static and behavioral analysis at the gateway along with Comodo's patented auto-containment for unknown files.

Content filtering

Block URLs by category or by custom domain categorization. You can set web filtering policies by user, group, zone, or time for flexibility and control.

Networking

Comodo Dome Firewall delivers a wide range of network management tools, including VLAN management, DHCP, virtual IP routing, NAT, ICAP, WAN failover, and zone management.

Intrusion prevention

Block URLs by category or by custom domain categorization. You can set web filtering policies by user, group, zone, or time for flexibility and control.

VPN

Comodo Dome Firewall delivers a wide range of network management tools, including VLAN management, DHCP, virtual IP routing, NAT, ICAP, WAN failover, and zone management.

Features

Not sure which version of Comodo Dome Firewall is right for you? Compare features—and see how they stack up against other firewalls on the market.

Features Free Firewall
Download now
Full Protection Firewall
Buy Now
Endian pfSense IPFire
Central management          
Manage multiple firewalls Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Organization- and device-based management Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Remote management Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Security features          
Static and behavioral malware analysis at the gateway Red Cross Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Zero-day malware protection Red Cross Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Automated unknown file containment Red Cross Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Portable containment technology Red Cross Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Manual human-based malware analysis at the gateway Red Cross Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Signature-based antimalware at the gateway Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Phishing protection Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Real-time threat intelligence Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Botnet protection (block callback attempts of infected endpoints) Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Application auto-whitelisting Red Cross Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Certification          
Common Criteria EAL 4+ Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Content filtering          
Category-based URL filtering (block URLs by category and custom blacklists) Comodo web filtering database with live updates Comodo web filtering database with live updates Open source manual updates Open source manual updates Open source manual updates
Domain categorization feed updates Every 2 hours Every 2 hours n/a n/a n/a
HTTPS interception (analysis of encrypted HTTPS traffic) Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Source-, destination-, schedule-, and user-based rule management Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Firewall          
Unified policy management Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Green Tick Icon
Stateful packet inspection firewall Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Source-, destination-, service-, port-, IP-, and FQDN-based traffic blocking Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
User-, group-, schedule-, and network-based policy management Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Networking          
Source- and destination-based NAT support with masquerading Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Zone-based management supporting multiple LANs Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
NAT, PAT, routing, ICAP support Green Tick Icon Green Tick Icon Red Cross Icon Green Tick Icon Green Tick Icon
Virtual IP management Green Tick Icon Green Tick Icon Red Cross Icon Green Tick Icon Red Cross Icon
Intrusion prevention          
Category-based IPS signature database (block intrusion attacks with granular policies by category) Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Real-time updates (weekly addition of new IPS signatures to database) Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Support for custom IPS signatures Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Virtual private network          
Site-to-site VPN Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Client-to-site VPN Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Support for IPSEC, L2TP, SSLVPN, and GRE tunnels Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Active Directory authentication Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Management          
Simple web-based management interface Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
User-, group-, and time-based rules Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Active Directory integration Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Role-based access control rights to management interface Green Tick Icon Green Tick Icon Red Cross Icon Red Cross Icon Red Cross Icon
Bandwidth management          
Service-based traffic prioritization Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
TOS/DSCP-based controls Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Quality-of-service-based bandwidth allocation Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon Green Tick Icon
Download now BUY NOW      
User Reviews
5 Star Rating AV 5 Star Rating AV 5 Star Rating AV 5 Star Rating AV 5 Star Rating AV 1 users   Newest Date  
5 Star Rating AV 5 Star Rating AV 5 Star Rating AV 5 Star Rating AV Star Rating Icon 1 0 users   Oldest Date  
5 Star Rating AV 5 Star Rating AV 5 Star Rating AV Star Rating Icon 1 Star Rating Icon 1 0 users        
5 Star Rating AV 5 Star Rating AV Star Rating Icon 1 Star Rating Icon 1 Star Rating Icon 1 0 users   Most Favourable Review  
5 Star Rating AV Star Rating Icon 1 Star Rating Icon 1 Star Rating Icon 1 Star Rating Icon 1 0 users   Most Critical Review  
  • Cancel ButtonComodo AV Reviews
Comodo AV Software
07/20/2018
5 5 Star Rating AV 5 Star Rating AV 5 Star Rating AV 5 Star Rating AV 5 Star Rating AV
excellent product
The choice between open and paid software frequently melts down to a choice between payment and limitations. But the free Comodo Dome Shield DNS filtering completely protects users and is available for homes, businesses, and MSPs. I am completely satisfied and will surely recommend for others.