Known limits

A few cases worth knowing before you spend time debugging.

ICMP traffic (ping, tracert) isn’t per-app

A BLOCK rule on ping.exe will save successfully but ping will keep working. Same for tracert and PowerShell’s Test-NetConnection.

These tools don’t have their own network sockets — they ask Windows itself to send the packets, so Windows is technically the sender, not the calling tool. App-level rules can’t catch what Windows doesn’t attribute to an app.

Workaround: to block ICMP, use a Windows Firewall rule (it filters at the packet level where this doesn’t matter). This is the same boundary every per-app firewall on Windows runs into.

Loopback traffic isn’t shaped

Rules don’t affect traffic between your own machine’s localhost endpoints (127.0.0.1, ::1). This is intentional — clamping loopback would slow down NetClamp’s own UI talking to its service, local test scripts, etc.

If you’re measuring rate-limit accuracy, use a real public target (e.g. a speed-test endpoint or any HTTPS download).

Multiple per-app firewalls may interfere

If you have another per-app firewall (NetLimiter, a VPN with a kill switch, etc.) installed alongside NetClamp, Windows evaluates everyone’s rules. Conflicting rules across products may produce surprising outcomes — e.g. NetClamp BLOCK paired with another product’s ALLOW on the same flow can let traffic through.

The Dashboard’s competing shapers field surfaces any well-known ones we detect.

Microsoft Store apps need their own match mode

Store apps live in sandboxed paths that change between Store updates. A rule using App by path on a Store app’s .exe will silently stop matching after a Store update.

Always use the Microsoft Store App match mode for Store apps — that matches by the app’s package identity, which is stable across updates.

Quotas use exact clock boundaries

Window resets happen on the system clock:

  • Hourly quotas reset at :00.

  • Daily quotas reset at local midnight.

  • Weekly quotas reset Monday 00:00 local.

  • Monthly quotas reset on the 1st at 00:00 local.

If you’re streaming exactly when a window rolls over, a kilobyte or two of traffic may land on either side of the boundary. Worth knowing if you’re building dashboards on top of the counters; matters for no other practical use.

Dashboard totals reset when the service restarts

The Upload / Download / Connections totals on the Dashboard are since-boot counters. They go back to zero when the NetClamp service restarts (planned or otherwise).

Quotas don’t reset on restart — they persist on disk. Use quotas if you need long-term usage tracking.