Ok when enabling P2P Blocking action to "Drop", that would prevent users from seeing each other on a public network. Is this correct?
So my question would be then if P2P Blocking action "Drop" prevents users from seeing each other on a public network, will it stop Firesheep from hacking your login info for Facebook, Twitter, MySpace, etc.
P2P blocking will stop users to send traffic from each other directly. But if you're on a website like Facebook, you're not directly sending traffic to someone in your subnet I believe, you are sending to the Facebook server who sends back to the other client in your subnet so here it wouldn't work.
Moreover, the Firesheep exploit is based on sniffing, which means "listening to the air". The PC running the firesheep exploit doesn't even need to be associated to sniff and capture the session cookies of the other people, so no that won't help either.
However, if you have WPA encryption ... anyone can try to "listen" to traffic but he will only see encrypted data so he will not be able to do anything.
The problem persists still for a public open network.
Hope this helps.
Don't hesitate to rate answers that you find useful and mark them as answered when they have been