So after looking into to this I'm afraid that we do not support custom rules with Windows Firewall at this time.
The problem is two fold:
1) Windows Firewall needs to see the redirect area, and we cannot exclude it's process SVCHOST from SWV.
2) Windows Firewall saves it's settings to the registry so when you pass in a redirect path (say, c:\FSLRDR\1\[_b_]ProgramFiles[_E_]\myProgram) we convert that path into a normal windows path (C:\FSLRDR\1\C:\Program Files\MyProgram) so as soon as you reboot the system your custom rule no longer works.
The only way to work around this is to delete and create a new rule upon log-in or layer activation.
Most other firewalls do not have this problem because they either have an exe that we can exclude or they don't save their firewall settings in the registry.