Protocol Source Port Destination Port Gateway # Schedule Description IPv4+6* * * * * * * * let out anything from firewall host itself
What exactly is concerning you about those rules? I believe it's required for NAT functionality. Also, did you happen to notice the rule direction?
So basically my FW rules block/allow INcoming traffic and once allowed the FW ...
... needs a rule to let this traffic back OUTgoing to the destination VLAN?
Nope. The "allow all out" rule is for traffic that did never come in anywhere. Like outbound DNS requests or NTP requests originating on the firewall itself. Download of updates. ICMP echo requests from gateway monitoring. These.Hence the description: "let out anything from firewall host itself"
Sorry if IU am being a bit dense here somewhere, but I'd love to actually understand this now.
Quote from: Patrick M. Hausen on March 25, 2024, 06:16:10 pmNope. The "allow all out" rule is for traffic that did never come in anywhere. Like outbound DNS requests or NTP requests originating on the firewall itself. Download of updates. ICMP echo requests from gateway monitoring. These.Hence the description: "let out anything from firewall host itself"Mmm, then why do I see client<>server DNS traffic hitting this rule/label?For example my client requesting DNS resolving from the server (not the FW).In FIREWALL: LOG FILES: LIVE VIEW this shows up twice even though the FW should just pass the traffic:client_vlan OUT 2024-03-25T19:04:53 <client IP>:64696 <server IP>:53 udp let out anything from firewall host itself server_vlan IN 2024-03-25T19:04:53 <client IP>:64696 <server IP>:53 udp My DNS rule Sorry if IU am being a bit dense here somewhere, but I'd love to actually understand this now.