You did put the Rule under the VLAN interface in the Firewall>Rules> VLAN correct?To me your rule looks alright. The default deny/state violation has two functions I believe.Deny any explicitly not permitted trafficDeny session in case of a violationIn FW world if you have a session/state open on the FW, while the same Source IP/port towards same Destination IP/ports wants to open a new connection this will be Dropped by the FW aka a violation. You can not open a new session if old one is present.
# netstat -pant | grep sshtcp 0 0 192.168.70.10:22 192.168.70.103:34538 ESTABLISHED 2257291/sshd: root@tcp 0 3604 192.168.99.10:22 192.168.70.103:54188 ESTABLISHED 2254739/sshd: root@
Yes, the Rule is under the VLAN interface in the Firewall>Rules> VLAN.What I noticed in live view is that only tcp S flags (SYNC) are allowed while A (ACK) are being blocked.