Egress filtering can mess with outgoing policies and NAT. It's never been the approach in the project's long history even under other names. Not too long ago egress was made possible on interface-based rules where formerly only floating rules were allowed to do it.There isn't a lot of need for it and certainly not from a security perspective if you don't pollute your firewall with all sorts of internal third party services (server applications) that could then be exploited.So to recap: ingress blocking is the default except for a whitelist ingress on the standard LAN interface (which you can use or just skip). Everything else works as you describe it with automated rules and such.Cheers,Franco
I try it differently > If I try to recap about configuring a Fw. 2021 In a pragmatic way balancing security and overhead minimizing a naive approach of gaining security and performance I would first focusing on a slick network design concept ok- A rock solid dns resolver with dns security in mind eg. quad9, + block lists, no http proxy (caching makes no sense anymore and blocking is done by dns), no mitm ssl inspection for so many reasons- overhead and maintaining, ethical and legal aspects + efficiency and also no IDS/IDP because it is also blind for encrypted traffic unless once again to play mitm, right ?!If this is not fundamental wrong or stupid ;-) doesn't it then make sense to think about the good old Egress filtering to work against outgoing threads = focusing on outgoing Rules or do I really miss something !?