Yes, I do want to block all internet access to vmx1 (my MGMT network) except for the sites I've configured under Exclusions.
When I was on Zen Armor 2.1.1 and earlier, it worked as described above. After upgrading to newer versions of Zen Armor, I now have to disable the use of "Block all internet access" so that my computer on the same subnet can reach OPNsense, but what is so confusing about this is either:
A) Zen Armor wasn't working properly before the upgrade, and the upgrade "fixed" it, or
B) Zen Armor was working properly before the upgrade, and the upgrade broke it.
I don't know which it is.
EDIT: I reached out to Zen Armor support. They confirmed that the version I was using previously, 2.1.1, in fact DID have an issue which was resolved in newer versions. This is taken from their release notes page for v2.2: https://www.zenarmor.com/docs/support/release-notes
Zen Armor support also suggested an alternative configuration. On my policy, leave "Block all internet access" turned off. On the same policy, under App Controls, turn on the block for Secure Web Browsing and Web Browsing. This would block all HTTP and HTTPS traffic, except for any of the whitelisted addresses I defined under Exclusions.
Hope this helps others.
When I was on Zen Armor 2.1.1 and earlier, it worked as described above. After upgrading to newer versions of Zen Armor, I now have to disable the use of "Block all internet access" so that my computer on the same subnet can reach OPNsense, but what is so confusing about this is either:
A) Zen Armor wasn't working properly before the upgrade, and the upgrade "fixed" it, or
B) Zen Armor was working properly before the upgrade, and the upgrade broke it.
I don't know which it is.
EDIT: I reached out to Zen Armor support. They confirmed that the version I was using previously, 2.1.1, in fact DID have an issue which was resolved in newer versions. This is taken from their release notes page for v2.2: https://www.zenarmor.com/docs/support/release-notes
QuoteThe issue allowing clients to access whitelisted domains unexpectedly, even with the No Internet option selected in the policy, has been resolved.This means that when working correctly, with "Block all internet access" enabled, it takes precedence over the whitelisted URLs configured under Exclusions. It doesn't matter that my computer is on the same subnet and not trying to reach the internet, it being blocked is by design when enabling "Block all internet access". Personally, I think it should be renamed to "Block all network and internet access" to be crystal clear.
Zen Armor support also suggested an alternative configuration. On my policy, leave "Block all internet access" turned off. On the same policy, under App Controls, turn on the block for Secure Web Browsing and Web Browsing. This would block all HTTP and HTTPS traffic, except for any of the whitelisted addresses I defined under Exclusions.
Hope this helps others.
"