Hi there,I would say the concepts have not changed here.All rules tabs other than floating are inbound-only, so that's one's first distinction if one needs outbound filtering, but most of the time one doesn't.2) This is confusing in terminology, you said outbound but hopefully meant incoming VLAN traffic from the perspective of the firewall.4) Last match wins is an idiosyncrasy of the pf packet filter. "first match / quick" is the normal mode of operation for most firewalls but it was added later to the filter in historical terms. The original rule evaluation was based on "last match" where rules could be written ordered as unspecific to super specific. If you disable "quick" on floating rules, you will gain this behaviour for that particular rule.The most useful way to use last match is to have a floating rule (which is evaluated before the other rules tabs) in last-match mode that acts as a placeholder for more specific rules in the individual tabs and yields authority to a later match there.Cheers,Franco
a) Why would you want to separate Inbound and Outbound rules by forcing us to put Inbound rules in the Floating section and Outbound rules in the Interface section? It makes it harder to manage and keep rules straight!
b) I have been under the impression all along (because it made sense given that Floating rules apply before Interface rules) that Floating rules would apply to all interfaces first, and then the specific Interface rules would apply, and that both Floating and Interface specific rules could be for Inbound & outbound rules. Could you explain the intent / reasoning for this design?
c) You said "if one needs outbound filtering, but most of the time one doesn't", and I'm unclear as to why you say this because best practice for any corporate network is to have a DMZ where you NEED Explicitly defined inbound and outbound rules with specific allowed sources, destinations, and ports. Could you explain the thought behind your statement?
This has nothing to do with the direction of the packets you want to filter accordingly. Normally, enforcing policies is on (1.) and rarely on (2.), because why would you forward something through a firewall if you are going to discard it when it is ready to exit?I hope that explains it a bit better.Cheers,Franco