Introduction to the Firewall Rules screen (2024)

This section provides an introduction and overview of the Firewall Rules screenlocated at Firewall > Rules. This page lists the WAN ruleset to start with,which by default has no entries other than those for Block private networksand Block bogon networks if those options are active on the WAN interface,as shown in Figure Default WAN Rules.

Tip

Click Introduction to the Firewall Rules screen (1) the to the right of the Block private networks or Blockbogon networks rules to reach the WAN interface configuration page wherethese options can be enabled or disabled. SeeBlock Private Networks andBlock Bogon Networks for more details.

Introduction to the Firewall Rules screen (2)

Click the LAN tab to view the LAN rules. By default, the only entries arethe Default allow LAN to any rules for IPv4 and IPv6 as seen in FigureDefault LAN Rules, and the Anti-Lockout Rule if it is active.The anti-lockout rule is designed to prevent administrators from accidentallylocking themselves out of firewall management services. Click Introduction to the Firewall Rules screen (3) next tothe anti-lockout rule to reach the page where this rule can be disabled.

See also

For more information on how the Anti-Lockout Rule works and how to disablethe rule, see Anti-lockout Rule andAnti-lockout.

Introduction to the Firewall Rules screen (4)

To display rules for other interfaces, click their respective tabs. OPTinterfaces will appear with their descriptive names, so if the OPT1 interfacewas renamed DMZ, then the tab for its rules will also say DMZ.

To the left of each rule is a set of an indicator icons, including:

  • The action of the rule: pass (Introduction to the Firewall Rules screen (5)), block (Introduction to the Firewall Rules screen (6)), or reject(Introduction to the Firewall Rules screen (7)).

  • Logging status: If logging is enabled for the rule, Introduction to the Firewall Rules screen (8) is present.

  • Advanced options: If the rule has any advanced options enabled, an Introduction to the Firewall Rules screen (9)icon is present.

Hovering the mouse cursor over any of these icons will display text explainingtheir meaning. The same icons are shown for disabled rules, except the icon andthe rule are a lighter shade of their original color.

Adding a firewall rule

To add a rule to the top of the list, click Introduction to the Firewall Rules screen (10) Add.

To add a rule to the bottom of the list, click Introduction to the Firewall Rules screen (11) Add.

Editing Firewall Rules

To edit a firewall rule, click Introduction to the Firewall Rules screen (12) to the right of the rule, or doubleclick anywhere on the line.

The edit page for that rule will load, and from there adjustments are possible.See Configuring firewall rules for more information on the options availablewhen editing a rule.

Reordering Firewall Rules

The order of the rules on an interface can be changed in two different ways:Drag-and-drop or select-and-click.

To reorder rules using the drag-and-drop method:

Warning

Attempting to navigate away from the page after moving a rule, but beforesaving the order, will result in the browser presenting an error confirmingwhether or not to exit the page. If the browser navigates away from the pagewithout saving, the rule will still be in its original location.

To move rules in the list in groups or by selecting them first, use theselect-and-click method:

  • Select the rules to move

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click Introduction to the Firewall Rules screen (14) on the row below where the rule should be moved.

    Tip

    Hold Shift before clicking the mouse on Introduction to the Firewall Rules screen (15) to move the rulebelow the selected rule instead of above.

When moving rules using the select-and-click method, the new order is storedautomatically.

Copying Firewall Rules

To make a new rule that is similar to an existing rule, click Introduction to the Firewall Rules screen (16) to theright of the existing rule. The edit screen will appear with the existing rule’ssettings pre-filled, ready to be adjusted. When duplicating an existing rule,the new rule will be added directly below the original rule. For moreinformation about how to configure the new rule, see Configuring firewall rules.

To copy multiple rules:

  • Select the rules to copy

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click the Introduction to the Firewall Rules screen (17) Copy button below the rule list

    The firewall will open a new modal dialog with options to set before copying.

  • Select the Destination Interface

  • Select Convert interface definitions to automatically adjust the source ofthe rule to match the target interface, if necessary

  • Click Introduction to the Firewall Rules screen (18) Paste to complete the operation

Warning

When copying rules to different interfaces, they may fall at the start or theend of the target interface rule list depending on the order of the interfacerules in the configuration. Be prepared to reorder the rules on the targetinterface before applying changes.

Deleting Firewall Rules

To delete a single rule, click Introduction to the Firewall Rules screen (19) to the right of the rule. Thefirewall will present a confirmation prompt before deleting the rule.

To delete multiple rules:

  • Select the rows to remove

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click the Introduction to the Firewall Rules screen (20) Delete button below the rule list

  • Confirm the action

Checking Rule Usage

The States column contains usage counters for each rule. It shows the numberof active states created by a rule and the amount of traffic consumed by thosestates.

Hovering the mouse over these counters shows additional detailed statistics.

Note

Though the firewall makes an effort to maintain these statistics, the valuescan reset over time depending on firewall ruleset reloads and other similaractions.

Clicking the value in this column will display a list of states created by therule.

Clearing States Created by a Rule

Click the Introduction to the Firewall Rules screen (21) icon to the right of a rule and then confirm the action toclear all active states created by that rule.

Note

This only affects states on this interface created by this rule directly. Itdoes not clear states on other interfaces where traffic may have exited thefirewall.

Disabling and Enabling Firewall Rules

To disable a rule, click Introduction to the Firewall Rules screen (22) at the end of its row. The appearance of therule will change to a lighter shade to indicate that it is disabled and theIntroduction to the Firewall Rules screen (23) icon changes to Introduction to the Firewall Rules screen (24).

To enable a rule which was previously disabled, click Introduction to the Firewall Rules screen (25) at theend of its row. The appearance of the rule will return to normal and theenable/disable icon will return to the original Introduction to the Firewall Rules screen (26).

A rule may also be disabled or enabled by editing the rule and toggling theDisabled checkbox.

To disable or enable multiple rules at once:

  • Select the rules to disable

    Note

    Select rules by single clicking anywhere on their line or by checking thebox at the start of the row.

  • Click the Introduction to the Firewall Rules screen (27) Toggle button below the rule list

Rule Separators

Firewall Rule Separators are colored bars in the ruleset that contain a smallbit of text, but do not take any action on traffic. They are useful for visuallyseparating or adding notes to special parts of the ruleset. FigureFirewall Rule Separators Example shows how they can be utilize to groupand document the ruleset.

Introduction to the Firewall Rules screen (28)

To create a new Rule Separator:

  • Open the firewall rule tab where the Rule Separator will reside

  • Click Introduction to the Firewall Rules screen (29) Separator

  • Enter description text for the Rule Separator

  • Choose the color for the Rule Separator by clicking the Introduction to the Firewall Rules screen (30) icon ofthe desired color

  • Click and drag the Rule Separator to its new location

  • Click Introduction to the Firewall Rules screen (31) Save inside the Rule Separator to store its contents

  • Click Introduction to the Firewall Rules screen (32) Save at the bottom of the rule list

To move a Rule Separator:

  • Open the firewall rule tab containing the Rule Separator

  • Click and drag the Rule Separator to its new location

  • Click Introduction to the Firewall Rules screen (33) Save at the bottom of the rule list

To delete a Rule Separator:

  • Open the firewall rule tab containing the Rule Separator

  • Click Introduction to the Firewall Rules screen (34) inside the Rule Separator on the right side

  • Click Introduction to the Firewall Rules screen (35) Save at the bottom of the rule list

Rule Separators cannot be edited. If a change in text or color is required,create a new Rule Separator and delete the existing entry.

Tracking Firewall Rule Changes

When a rule is created or updated the firewall records the user’s login name, IPaddress, and a timestamp on the rule to track who added and/or last changed therule in question. If the firewall automatically created the rule, that is alsonoted. This is done for firewall rules as well as port forwards and outbound NATrules. An example of a rule update tracking block is shown in FigureFirewall Rule Time Stamps, which is visible when editing afirewall rule at the very bottom of the rule editing screen.

Introduction to the Firewall Rules screen (36)
Introduction to the Firewall Rules screen (2024)

FAQs

What are the firewall rules? ›

Firewall rules are instructions that control how a firewall device handles incoming and outgoing traffic. They are access control mechanisms that enforce security in networks by blocking or allowing communication based on predetermined criteria.

What are the 4 firewall rules? ›

The Four Basic Firewall Rules Types
  • Allow all: This rule permits all traffic to flow through the firewall, inclusive of all TCP, ICMP, UDP, IPv4, and IPv6 traffic. ...
  • Deny all: This rule blocks all traffic, both inbound and outbound. ...
  • Allow specific: This rule permits only specified types of traffic.
Jun 27, 2023

What should be the first rule in a firewall? ›

Typically, a firewall policy starts with a default rule like “deny all,” and then specific “allow” rules are added on top. Specific Over General: Place more specific rules first.

How do I manage firewall rules? ›

Best practices for firewall management
  1. Block all access by default. When configuring a firewall, it's important to start by blocking access to the network from all traffic. ...
  2. Regularly audit firewall rules and policies. ...
  3. Keep the firewall up-to-date. ...
  4. Keep track of authorized users. ...
  5. Document all firewall changes.

How do I open firewall rules? ›

How to open a port on the firewall
  1. Click on Start then on Control Panel.
  2. Click on Windows Firewall and then click on Advanced Settings.
  3. Right click on Inbound Rules then on New Rule:
  4. Select Port and click on Next:
  5. Enter a specific local port (e.g. 8080) and click on Next:
  6. Click on Next:
  7. Name the rule and click on Finish:
Jun 16, 2023

How do I troubleshoot firewall rules? ›

How to Troubleshoot Firewall Problems
  1. 1) Ping a PC near the device. ...
  2. 2) Ping the device. ...
  3. 3) Telnet and/or browse to the device. ...
  4. 4) Confirm the port configuration of the device. ...
  5. 5) Confirm that important IP addresses are not blocked. ...
  6. 6) Trace the route to the device.

How do Windows Firewall rules work? ›

Windows Firewall is a security feature that helps to protect your device by filtering network traffic that enters and exits your device. This traffic can be filtered based on several criteria, including source and destination IP address, IP protocol, or source and destination port number.

Can I make my own firewall rules? ›

Since there's a default block action in Windows Firewall, you must create inbound exception rules to allow the traffic. It's common for the app or the app installer itself to add this firewall rule. Otherwise, the user (or firewall admin on behalf of the user) needs to manually create a rule.

What are the default firewall rules? ›

Default Firewall Policies
  • Source — Any-Internal (a built-in alias for all internal networks)
  • Traffic Types — Web, FTP, All TCP and UDP, Ping.
  • Decrypt HTTPS Traffic — Disabled.
  • Destination — Any-External (a built-in alias for all external networks)
  • Security Services — All security services are enabled.

What are the firewall rule actions? ›

Firewall Rules can take the following actions: Allow: Explicitly allows traffic that matches the rule to pass, and then implicitly denies everything else. Bypass: Allows traffic to bypass both firewall and Intrusion Prevention analysis.

What are the firewall rules allow? ›

Firewall rules are the major components of firewall policies that determine which types of traffic your firewall allows in and out of your network, and which are blocked. They are access control mechanisms that firewalls use to protect your network from being infiltrated by malicious or unauthorized traffic.

What are the 3 varieties of different firewall rules? ›

Types of network firewalls include: Packet Filters. Stateful Inspection Firewalls. Application Layer Firewalls.

What are Layer 7 firewall rules? ›

A Layer 7 firewall operates at the application layer of the OSI. It can analyze and filter traffic based on specific applications or protocols rather than just looking at the source and destination IP addresses and ports. They also provide content filtering, user authentication, and intrusion prevention capabilities.

Top Articles
Austin Healey 100/6 BN6 - Austin Healey
7 Levels of Financial Freedom
The UPS Store | Ship & Print Here > 400 West Broadway
Greedfall Console Commands
Ds Cuts Saugus
Ub Civil Engineering Flowsheet
Craigslist Phoenix Cars By Owner Only
About Goodwill – Goodwill NY/NJ
Craigslist/Phx
Hope Swinimer Net Worth
Explore Top Free Tattoo Fonts: Style Your Ink Perfectly! 🖌️
Trini Sandwich Crossword Clue
Washington Poe en Tilly Bradshaw 1 - Brandoffer, M.W. Craven | 9789024594917 | Boeken | bol
What is Cyber Big Game Hunting? - CrowdStrike
Craigslist Farm And Garden Cincinnati Ohio
Echat Fr Review Pc Retailer In Qatar Prestige Pc Providers – Alpha Marine Group
Marvon McCray Update: Did He Pass Away Or Is He Still Alive?
TBM 910 | Turboprop Aircraft - DAHER TBM 960, TBM 910
Traveling Merchants Tack Diablo 4
Pickswise Review 2024: Is Pickswise a Trusted Tipster?
Jail View Sumter
Craigs List Tallahassee
Www Va Lottery Com Result
Ou Class Nav
Cb2 South Coast Plaza
When His Eyes Opened Chapter 3123
Movies - EPIC Theatres
John Deere 44 Snowblower Parts Manual
Weather Underground Durham
Ff14 Sage Stat Priority
Tendermeetup Login
Naya Padkar Newspaper Today
KITCHENAID Tilt-Head Stand Mixer Set 4.8L (Blue) + Balmuda The Pot (White) 5KSM175PSEIC | 31.33% Off | Central Online
Ukg Dimensions Urmc
Tiny Pains When Giving Blood Nyt Crossword
Culver's of Whitewater, WI - W Main St
WorldAccount | Data Protection
Improving curriculum alignment and achieving learning goals by making the curriculum visible | Semantic Scholar
Clima De 10 Días Para 60120
Leland Nc Craigslist
Ups Authorized Shipping Provider Price Photos
Best Haircut Shop Near Me
Go Nutrients Intestinal Edge Reviews
Gw2 Support Specter
Hillsborough County Florida Recorder Of Deeds
Kenwood M-918DAB-H Heim-Audio-Mikrosystem DAB, DAB+, FM 10 W Bluetooth von expert Technomarkt
German American Bank Owenton Ky
Doelpuntenteller Robert Mühren eindigt op 38: "Afsluiten in stijl toch?"
Unpleasant Realities Nyt
Solving Quadratics All Methods Worksheet Answers
Karen Kripas Obituary
Latest Posts
Article information

Author: Aracelis Kilback

Last Updated:

Views: 6000

Rating: 4.3 / 5 (44 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aracelis Kilback

Birthday: 1994-11-22

Address: Apt. 895 30151 Green Plain, Lake Mariela, RI 98141

Phone: +5992291857476

Job: Legal Officer

Hobby: LARPing, role-playing games, Slacklining, Reading, Inline skating, Brazilian jiu-jitsu, Dance

Introduction: My name is Aracelis Kilback, I am a nice, gentle, agreeable, joyous, attractive, combative, gifted person who loves writing and wants to share my knowledge and understanding with you.