I have read the opnsense docs on firewall rules.
It says that "When changing rules, sometimes its necessary to reset states to assure the new policies are used for existing traffic. You can do this in Firewall ‣ Diagnostics ‣ States."
I have done that with no change.
This is the current set of rules enabled on the LAN40 interface.
automatically generated rules:
IPv6 * * * * * * * * Block all IPv6
IPv4+6 * * * * * * * * Default deny / state violation rule
IPv4+6 TCP/UDP * 0 * * * * * block all targeting port 0
IPv4+6 TCP/UDP * * * 0 * * * block all targeting port 0
IPv4+6 TCP <sshlockout> * (self) 22 (SSH) * * * sshlockout
IPv4+6 TCP <sshlockout> * (self) 443 (HTTPS) * * * sshlockout
IPv4+6 * <virusprot> * * * * * * virusprot overload table
IPv4 UDP * 68 255.255.255.255 67 * * allow access to DHCP server
IPv4+6 UDP * 68 (self) 67 * * allow access to DHCP server
IPv4+6 UDP (self) 67 * 68 * * allow access to DHCP server
IPv4+6 * * * * * * * * let out anything from firewall host itself
IPv4+6 * (ix0) * ! WAN net * WAN_GW * * let out anything from firewall host itself (force gw)
Rules I have added
IPv4 * 192.168.40.11/32 * LAN20 net * * * Out rule for a single host to any internal network
IPv4 * 192.168.20.70/32 * 192.168.40.5/32 * * * In rule for Security Camera
IPv4 * 192.168.40.5/32 * 192.168.20.70/32 * * * Out Rule for Security Camera
IPv4 * LAN40 net * LAN20 net, LAN30 net, LAN50 net * * * Default block out to private subnets rule
IPv4 * LAN40 net * LAN20 net, LAN30 net, LAN50 net * * * Default block in to private subnets rule
Default created at installation
IPv4 * LAN40 net * * * * * Default allow WiFi to any rule
Can anyone clue me in?
What am I missing here?
I have tried only In rules and only Out rules and both.
Nothing seems to work.
It says that "When changing rules, sometimes its necessary to reset states to assure the new policies are used for existing traffic. You can do this in Firewall ‣ Diagnostics ‣ States."
I have done that with no change.
This is the current set of rules enabled on the LAN40 interface.
automatically generated rules:
IPv6 * * * * * * * * Block all IPv6
IPv4+6 * * * * * * * * Default deny / state violation rule
IPv4+6 TCP/UDP * 0 * * * * * block all targeting port 0
IPv4+6 TCP/UDP * * * 0 * * * block all targeting port 0
IPv4+6 TCP <sshlockout> * (self) 22 (SSH) * * * sshlockout
IPv4+6 TCP <sshlockout> * (self) 443 (HTTPS) * * * sshlockout
IPv4+6 * <virusprot> * * * * * * virusprot overload table
IPv4 UDP * 68 255.255.255.255 67 * * allow access to DHCP server
IPv4+6 UDP * 68 (self) 67 * * allow access to DHCP server
IPv4+6 UDP (self) 67 * 68 * * allow access to DHCP server
IPv4+6 * * * * * * * * let out anything from firewall host itself
IPv4+6 * (ix0) * ! WAN net * WAN_GW * * let out anything from firewall host itself (force gw)
Rules I have added
IPv4 * 192.168.40.11/32 * LAN20 net * * * Out rule for a single host to any internal network
IPv4 * 192.168.20.70/32 * 192.168.40.5/32 * * * In rule for Security Camera
IPv4 * 192.168.40.5/32 * 192.168.20.70/32 * * * Out Rule for Security Camera
IPv4 * LAN40 net * LAN20 net, LAN30 net, LAN50 net * * * Default block out to private subnets rule
IPv4 * LAN40 net * LAN20 net, LAN30 net, LAN50 net * * * Default block in to private subnets rule
Default created at installation
IPv4 * LAN40 net * * * * * Default allow WiFi to any rule
Can anyone clue me in?
What am I missing here?
I have tried only In rules and only Out rules and both.
Nothing seems to work.
"