If I tell WAN to just pass the traffic through, even if I have a rule blocking ICMP on VLAN 5, it still goes through. As well as I can tell, this is because when the rule was matched to accept the traffic at the WAN level, it stopped caring about everything else and just let it go on through.
How do I set this up? Basically I just want WAN wide open so I can filter incoming on my VLANs as I see fit.
Quote from: hiro24 on April 05, 2018, 01:58:48 amIf I tell WAN to just pass the traffic through, even if I have a rule blocking ICMP on VLAN 5, it still goes through. As well as I can tell, this is because when the rule was matched to accept the traffic at the WAN level, it stopped caring about everything else and just let it go on through.Nope. That's not how it works. Interface firewall rules are applied on ingress. Traffic route to VLAN is egress. So VLAN interface rules will not be applied.Quote from: hiro24 on April 05, 2018, 01:58:48 amHow do I set this up? Basically I just want WAN wide open so I can filter incoming on my VLANs as I see fit.With floating rules. They can be configured for ingress and/or egress.I know you didn't query for opinions. But I'm with elektroninside. Traffic is typically best block earliest possible.
Not that I'm aware of.Interface rules are only applied to ingress traffic on the interface.Floating rules can be configured as ingress and/or egress.WAN ingress traffic is egress on the interface it is routed to.To evaluate traffic at the routed to interface a floating egress rule would be needed.In most cases it is typically better to leave everything blocked at the WAN and only open/NAT the things that are needed. Allowing the WAN to be wide open puts the router at higher risk of compromise. Don't think you'll find this to be a very common practice for an internet facing WAN. Certainly not a BKM. It may seem like more work, but think a compromised router would end up being far more work and impact.