Hey gladston3,There's no need for an "block all" rule to block traffic between the LAN ports. The default blocking rule of the firewall will block the traffic between your different subnets if is not explicit allowed by an rule.
To access the Internet you need to configure NAT for each subnet first.
Then you will need some allow rules for each service and subnet you would like to allow. You can use floating rule to create one rule e.g. for HTTP(S) to WAN for all your LAN interfaces. Choose the WAN gateway to allow this traffic only for WAN. Otherwise it will also allow HTTP(S) between your subnets.
Do you mean outbound NAT rules? Those are set automatically in the default settings, aren't they?
That's where I am struggeling. What do I have to put at "destination" so WAN traffic is allowed? The only option with which I got it working was "any" and that's definitely not what I want. Can you maybe show me a sample rule for HTTPS or any other service?
There's no firewall object for Internet hosts. But you can create an alias with all privat networks (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), add it as destination in your rule and invert it. That's how I did it. Works fine.