Introduction to the Firewall Rules screen (2024)

This section provides an introduction and overview of the Firewall Rules screenlocated at Firewall > Rules. This page lists the WAN ruleset to start with,which by default has no entries other than those for Block private networksand Block bogon networks if those options are active on the WAN interface,as shown in Figure Default WAN Rules.

Tip

Click Introduction to the Firewall Rules screen (1) the to the right of the Block private networks or Blockbogon networks rules to reach the WAN interface configuration page wherethese options can be enabled or disabled. SeeBlock Private Networks andBlock Bogon Networks for more details.

Introduction to the Firewall Rules screen (2)

Click the LAN tab to view the LAN rules. By default, the only entries arethe Default allow LAN to any rules for IPv4 and IPv6 as seen in FigureDefault LAN Rules, and the Anti-Lockout Rule if it is active.The anti-lockout rule is designed to prevent administrators from accidentallylocking themselves out of firewall management services. Click Introduction to the Firewall Rules screen (3) next tothe anti-lockout rule to reach the page where this rule can be disabled.

See also

For more information on how the Anti-Lockout Rule works and how to disablethe rule, see Anti-lockout Rule andAnti-lockout.

Introduction to the Firewall Rules screen (4)

To display rules for other interfaces, click their respective tabs. OPTinterfaces will appear with their descriptive names, so if the OPT1 interfacewas renamed DMZ, then the tab for its rules will also say DMZ.

To the left of each rule is a set of an indicator icons, including:

  • The action of the rule: pass (Introduction to the Firewall Rules screen (5)), block (Introduction to the Firewall Rules screen (6)), or reject(Introduction to the Firewall Rules screen (7)).

  • Logging status: If logging is enabled for the rule, Introduction to the Firewall Rules screen (8) is present.

  • Advanced options: If the rule has any advanced options enabled, an Introduction to the Firewall Rules screen (9)icon is present.

Hovering the mouse cursor over any of these icons will display text explainingtheir meaning. The same icons are shown for disabled rules, except the icon andthe rule are a lighter shade of their original color.

Adding a firewall rule

To add a rule to the top of the list, click Introduction to the Firewall Rules screen (10) Add.

To add a rule to the bottom of the list, click Introduction to the Firewall Rules screen (11) Add.

Editing Firewall Rules

To edit a firewall rule, click Introduction to the Firewall Rules screen (12) to the right of the rule, or doubleclick anywhere on the line.

The edit page for that rule will load, and from there adjustments are possible.See Configuring firewall rules for more information on the options availablewhen editing a rule.

Reordering Firewall Rules

The order of the rules on an interface can be changed in two different ways:Drag-and-drop or select-and-click.

To reorder rules using the drag-and-drop method:

Warning

Attempting to navigate away from the page after moving a rule, but beforesaving the order, will result in the browser presenting an error confirmingwhether or not to exit the page. If the browser navigates away from the pagewithout saving, the rule will still be in its original location.

To move rules in the list in groups or by selecting them first, use theselect-and-click method:

  • Select the rules to move

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click Introduction to the Firewall Rules screen (14) on the row below where the rule should be moved.

    Tip

    Hold Shift before clicking the mouse on Introduction to the Firewall Rules screen (15) to move the rulebelow the selected rule instead of above.

When moving rules using the select-and-click method, the new order is storedautomatically.

Copying Firewall Rules

To make a new rule that is similar to an existing rule, click Introduction to the Firewall Rules screen (16) to theright of the existing rule. The edit screen will appear with the existing rule’ssettings pre-filled, ready to be adjusted. When duplicating an existing rule,the new rule will be added directly below the original rule. For moreinformation about how to configure the new rule, see Configuring firewall rules.

To copy multiple rules:

  • Select the rules to copy

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click the Introduction to the Firewall Rules screen (17) Copy button below the rule list

    The firewall will open a new modal dialog with options to set before copying.

  • Select the Destination Interface

  • Select Convert interface definitions to automatically adjust the source ofthe rule to match the target interface, if necessary

  • Click Introduction to the Firewall Rules screen (18) Paste to complete the operation

Warning

When copying rules to different interfaces, they may fall at the start or theend of the target interface rule list depending on the order of the interfacerules in the configuration. Be prepared to reorder the rules on the targetinterface before applying changes.

Deleting Firewall Rules

To delete a single rule, click Introduction to the Firewall Rules screen (19) to the right of the rule. Thefirewall will present a confirmation prompt before deleting the rule.

To delete multiple rules:

  • Select the rows to remove

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click the Introduction to the Firewall Rules screen (20) Delete button below the rule list

  • Confirm the action

Checking Rule Usage

The States column contains usage counters for each rule. It shows the numberof active states created by a rule and the amount of traffic consumed by thosestates.

Hovering the mouse over these counters shows additional detailed statistics.

Note

Though the firewall makes an effort to maintain these statistics, the valuescan reset over time depending on firewall ruleset reloads and other similaractions.

Clicking the value in this column will display a list of states created by therule.

Clearing States Created by a Rule

Click the Introduction to the Firewall Rules screen (21) icon to the right of a rule and then confirm the action toclear all active states created by that rule.

Note

This only affects states on this interface created by this rule directly. Itdoes not clear states on other interfaces where traffic may have exited thefirewall.

Disabling and Enabling Firewall Rules

To disable a rule, click Introduction to the Firewall Rules screen (22) at the end of its row. The appearance of therule will change to a lighter shade to indicate that it is disabled and theIntroduction to the Firewall Rules screen (23) icon changes to Introduction to the Firewall Rules screen (24).

To enable a rule which was previously disabled, click Introduction to the Firewall Rules screen (25) at theend of its row. The appearance of the rule will return to normal and theenable/disable icon will return to the original Introduction to the Firewall Rules screen (26).

A rule may also be disabled or enabled by editing the rule and toggling theDisabled checkbox.

To disable or enable multiple rules at once:

  • Select the rules to disable

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click the Introduction to the Firewall Rules screen (27) Toggle button below the rule list

Rule Separators

Firewall Rule Separators are colored bars in the ruleset that contain a smallbit of text, but do not take any action on traffic. They are useful for visuallyseparating or adding notes to special parts of the ruleset. FigureFirewall Rule Separators Example shows how they can be utilize to groupand document the ruleset.

Introduction to the Firewall Rules screen (28)

To create a new Rule Separator:

  • Open the firewall rule tab where the Rule Separator will reside

  • Click Introduction to the Firewall Rules screen (29) Separator

  • Enter description text for the Rule Separator

  • Choose the color for the Rule Separator by clicking the Introduction to the Firewall Rules screen (30) icon ofthe desired color

  • Click and drag the Rule Separator to its new location

  • Click Introduction to the Firewall Rules screen (31) Save inside the Rule Separator to store its contents

  • Click Introduction to the Firewall Rules screen (32) Save at the bottom of the rule list

To move a Rule Separator:

  • Open the firewall rule tab containing the Rule Separator

  • Click and drag the Rule Separator to its new location

  • Click Introduction to the Firewall Rules screen (33) Save at the bottom of the rule list

To delete a Rule Separator:

  • Open the firewall rule tab containing the Rule Separator

  • Click Introduction to the Firewall Rules screen (34) inside the Rule Separator on the right side

  • Click Introduction to the Firewall Rules screen (35) Save at the bottom of the rule list

Rule Separators cannot be edited. If a change in text or color is required,create a new Rule Separator and delete the existing entry.

Tracking Firewall Rule Changes

When a rule is created or updated the firewall records the user’s login name, IPaddress, and a timestamp on the rule to track who added and/or last changed therule in question. If the firewall automatically created the rule, that is alsonoted. This is done for firewall rules as well as port forwards and outbound NATrules. An example of a rule update tracking block is shown in FigureFirewall Rule Time Stamps, which is visible when editing afirewall rule at the very bottom of the rule editing screen.

Introduction to the Firewall Rules screen (36)
Introduction to the Firewall Rules screen (2024)

FAQs

What are the firewall rules? ›

Firewall rules are instructions that control how a firewall device handles incoming and outgoing traffic. They are access control mechanisms that enforce security in networks by blocking or allowing communication based on predetermined criteria.

What are the 4 firewall rules? ›

The Four Basic Firewall Rules Types
  • Allow all: This rule permits all traffic to flow through the firewall, inclusive of all TCP, ICMP, UDP, IPv4, and IPv6 traffic. ...
  • Deny all: This rule blocks all traffic, both inbound and outbound. ...
  • Allow specific: This rule permits only specified types of traffic.
Jun 27, 2023

What should be the first rule in a firewall? ›

Typically, a firewall policy starts with a default rule like “deny all,” and then specific “allow” rules are added on top. Specific Over General: Place more specific rules first.

How do I manage firewall rules? ›

Best practices for firewall management
  1. Block all access by default. When configuring a firewall, it's important to start by blocking access to the network from all traffic. ...
  2. Regularly audit firewall rules and policies. ...
  3. Keep the firewall up-to-date. ...
  4. Keep track of authorized users. ...
  5. Document all firewall changes.

How do I open firewall rules? ›

How to open a port on the firewall
  1. Click on Start then on Control Panel.
  2. Click on Windows Firewall and then click on Advanced Settings.
  3. Right click on Inbound Rules then on New Rule:
  4. Select Port and click on Next:
  5. Enter a specific local port (e.g. 8080) and click on Next:
  6. Click on Next:
  7. Name the rule and click on Finish:
Jun 16, 2023

How do I troubleshoot firewall rules? ›

How to Troubleshoot Firewall Problems
  1. 1) Ping a PC near the device. ...
  2. 2) Ping the device. ...
  3. 3) Telnet and/or browse to the device. ...
  4. 4) Confirm the port configuration of the device. ...
  5. 5) Confirm that important IP addresses are not blocked. ...
  6. 6) Trace the route to the device.

How do Windows Firewall rules work? ›

Windows Firewall is a security feature that helps to protect your device by filtering network traffic that enters and exits your device. This traffic can be filtered based on several criteria, including source and destination IP address, IP protocol, or source and destination port number.

Can I make my own firewall rules? ›

Since there's a default block action in Windows Firewall, you must create inbound exception rules to allow the traffic. It's common for the app or the app installer itself to add this firewall rule. Otherwise, the user (or firewall admin on behalf of the user) needs to manually create a rule.

What are the default firewall rules? ›

Default Firewall Policies
  • Source — Any-Internal (a built-in alias for all internal networks)
  • Traffic Types — Web, FTP, All TCP and UDP, Ping.
  • Decrypt HTTPS Traffic — Disabled.
  • Destination — Any-External (a built-in alias for all external networks)
  • Security Services — All security services are enabled.

What are the firewall rule actions? ›

Firewall Rules can take the following actions: Allow: Explicitly allows traffic that matches the rule to pass, and then implicitly denies everything else. Bypass: Allows traffic to bypass both firewall and Intrusion Prevention analysis.

What are the firewall rules allow? ›

Firewall rules are the major components of firewall policies that determine which types of traffic your firewall allows in and out of your network, and which are blocked. They are access control mechanisms that firewalls use to protect your network from being infiltrated by malicious or unauthorized traffic.

What are the 3 varieties of different firewall rules? ›

Types of network firewalls include: Packet Filters. Stateful Inspection Firewalls. Application Layer Firewalls.

What are Layer 7 firewall rules? ›

A Layer 7 firewall operates at the application layer of the OSI. It can analyze and filter traffic based on specific applications or protocols rather than just looking at the source and destination IP addresses and ports. They also provide content filtering, user authentication, and intrusion prevention capabilities.

Top Articles
What to Know About the New Bill Repealing Social Security Income Taxes    | ThinkAdvisor
Is Mr. Market wrong about Shift4?
Euro (EUR), aktuální kurzy měn
Nc Maxpreps
Fototour verlassener Fliegerhorst Schönwald [Lost Place Brandenburg]
Paula Deen Italian Cream Cake
Used Wood Cook Stoves For Sale Craigslist
Culvers Tartar Sauce
C-Date im Test 2023 – Kosten, Erfahrungen & Funktionsweise
ocala cars & trucks - by owner - craigslist
U/Apprenhensive_You8924
Current Time In Maryland
Missing 2023 Showtimes Near Landmark Cinemas Peoria
Grasons Estate Sales Tucson
Buy PoE 2 Chaos Orbs - Cheap Orbs For Sale | Epiccarry
Spectrum Field Tech Salary
Robin D Bullock Family Photos
Craigslist Lewes Delaware
Galaxy Fold 4 im Test: Kauftipp trotz Nachfolger?
Nesb Routing Number
Avatar: The Way Of Water Showtimes Near Maya Pittsburg Cinemas
Solo Player Level 2K23
Vlacs Maestro Login
Ryujinx Firmware 15
Trust/Family Bank Contingency Plan
25Cc To Tbsp
Missing 2023 Showtimes Near Grand Theatres - Bismarck
Gus Floribama Shore Drugs
Ridge Culver Wegmans Pharmacy
Appraisalport Com Dashboard /# Orders
آدرس جدید بند موویز
Tenant Vs. Occupant: Is There Really A Difference Between Them?
Ippa 番号
Nobodyhome.tv Reddit
Finland’s Satanic Warmaster’s Werwolf Discusses His Projects
Merkantilismus – Staatslexikon
Anhedönia Last Name Origin
Live Delta Flight Status - FlightAware
Firestone Batteries Prices
062203010
Miami Vice turns 40: A look back at the iconic series
Traumasoft Butler
60 Days From May 31
Best Conjuration Spell In Skyrim
Haunted Mansion (2023) | Rotten Tomatoes
Cult Collectibles - True Crime, Cults, and Murderabilia
2294141287
Yosemite Sam Hood Ornament
Upcoming Live Online Auctions - Online Hunting Auctions
2000 Fortnite Symbols
Craigslist.raleigh
4015 Ballinger Rd Martinsville In 46151
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 6000

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.