Difference between revisions of "Firewall traffic rules"

From Teltonika Networks Wiki
Line 1: Line 1:
 +
 +
<p style="color:red">The information in this page is updated in accordance with [https://wiki.teltonika-networks.com/view/FW_%26_SDK_Downloads '''00.07.03.4'''] firmware version. </p>
 +
 +
==Introduction==
 +
 +
This article contains instructions on how to configure firewall traffic rules to filter network traffic. Firewalls are a critical component of network security, and they act as a barrier between your network and the internet. By configuring traffic rules, you can gain granular control over what traffic should be allowed, blocked, or rejected. This can help to enhance network security by preventing unauthorized access and reducing the risk of malicious attacks. By following the instructions in this article, you can learn how to configure firewall traffic rules to enhance network security.
  
 
==What is a traffic rule?==
 
==What is a traffic rule?==
The '''Traffic rules''' tab is used to set firewall rules that filter traffic moving through the device. In simple terms, traffic rules determine, what firewall rules are being applied to these packets. The packets can be allowed, blocked, or rejected based on the IP addresses and port numbers in the packet headers, as well as from which firewall zone the packet is coming and to which zone it is destined. This information can be used choose and pick to which packets the rules should apply.
 
  
Traffic rule settings can be found by navigating to '''Network -> Firewall -> Traffic rules''' via '''WebUI'''.
+
The '''Traffic Rules''' tab is a crucial feature of a firewall functionality that allows you to set rules to filter and control network traffic moving through the device. In essence, traffic rules determine which firewall rules will be applied to packets traveling through the network. These packets can be allowed, blocked, or rejected based on various criteria such as the source and destination IP addresses and port numbers specified in the packet headers. Additionally, traffic rules can be applied based on the specific firewall zone the packet is originating from and its intended destination zone.
 +
 
 +
With traffic rules, you have the flexibility to choose which packets should be subject to specific firewall rules based on their characteristics. By allowing, blocking, or rejecting certain types of traffic, you can protect your network from malicious attacks and unauthorized access while ensuring that legitimate traffic flows smoothly.
 +
 
 +
Teltonika devices come equipped with preconfigured traffic rules that provide adequate security for basic scenarios. However, if your solution requirements demand additional unique changes to the firewall configuration, it's crucial to carefully configure traffic rules to ensure that your network operates efficiently and securely. You should analyze your network traffic patterns and security risks to determine which traffic should be allowed, blocked, or rejected. This process will help you create a custom traffic rule set tailored to your network's specific needs, thereby enhancing network security and efficiency.
 +
 
 +
It's worth noting that improperly configured traffic rules can cause network performance issues, such as delays or lost packets. Therefore, it's essential to test and verify the effectiveness of your traffic rules before implementing them in a production environment. Regularly reviewing and updating your traffic rules is also recommended to ensure that your network remains secure and optimized for performance.
 +
 
  
The new rules are created in the '''‘Add new instance’''' section of the settings page. Rule names can be any and are used for management purposes only.
+
===Configuration specifics of Traffic Rules===
  
The traffic is evaluated against each rule in the traffic rules from top to bottom. This means that if there are two distinct rules, one that allows traffic on specific IP and another rule that blocks the traffic on that same IP, only the first rule will apply, and the traffic will be allowed. The traffic will be evaluated against the first rule and stop without checking the second rule because the packet already matches the first rule. Hence, if the first rule that allows traffic is above the rule that blocks traffic, the traffic will pass, and the second rule will be ignored.
+
====Traffic Rules evaluation====
  
It is important to be mindful of the order of traffic rules. The rules can always be rearranged by simply clicking on the symbol on the left side of the rule and dragging the rule where it is needed.
+
Traffic rule settings can be found by navigating to '''Network -> Firewall -> Traffic rules''' via WebUI. The new rules are created in the ‘Add new instance’ section of the settings page.
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_rules_order.png|alt=firewall traffic rules rule order|frameless|800x800px]]
+
The traffic is evaluated against each rule in the traffic rules from top to bottom. This means that if there are two distinct rules, one that allows traffic on a specific IP and another rule that blocks the traffic on that same IP, only the first rule will apply, and the traffic will be allowed.
  
It is possible to define both, specific IP addresses to block hosts, as well as networks to block whole networks of devices. Examples are:
+
It is important to be mindful of the order of traffic rules. The rules can always be rearranged by simply clicking on the symbol on the left side of the rule and dragging the rule where it is needed. You can also change the configuration of each rule by finding your rule in the traffic rules and pressing a ‘pencil’ button to edit settings.<br>
  
*Full IP address for a host:
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_rules_order.png|alt=firewall traffic rules rule order|border|class=tlt-border|800x800px]]
**192.168.1.151
 
  
*Network using CIDR notation:
+
====Defining specific IP addresses and networks====
**84.15.239.0/24
 
  
It is also possible to define single ports, as well as a range of ports.
+
It is possible to define both specific IP addresses to block hosts, as well as networks to block whole networks of devices. Examples are:
  
*To apply the rule for two ports, 22 and 443:
+
Full IP address for a host:
**Add port 22
+
*192.168.1.151
**Add port 443
+
Network using CIDR notation:
 +
*192.168.1.0/24
  
*Apply the rule to all ports from 1200 to 1600:
+
====Defining single ports and range of ports====
**Add ports 1200-1600
 
A command '''‘nslookup <hostname>’''' can be used on both, '''Windows''' and '''Linux''' machines to resolve a hostname to the IP address. For example, '''‘nslookup www.wikipedia.org’''' resolves to IP addresses for this website. These IP addresses can be used as the destination IP in the traffic rule. This command works on '''RutOS''' as well, as '''RutOS''' is based on '''OpenWRT''', a '''Linux''' distribution.
 
  
Many services have a well-known default port assigned to them. For example, '''MQTT''' uses port number '''1883'''. The rule to allow traffic on port '''1883''' is created automatically when Teltonika devices are configured to use '''MQTT'''. However, if you are experiencing an issue where '''MQTT''' traffic is dropped, you can check the traffic rules to ensure that the rule which accepts traffic on port '''1883''' exists and is enabled.
+
It is also possible to define single ports, as well as a range of ports. To apply the rule for two ports, 22 and 443:
  
==Traffic rule usage examples==
+
*Add port '''22'''
 +
*Add port '''443'''
  
===Allow a single host to access a web server in WAN.===
+
To apply the rule to all ports from 1200 to 1600:
 +
 
 +
*Add ports '''1200-1600'''
 +
 
 +
====Resolving hostnames to IP addresses====
 +
 
 +
A command '''‘nslookup <hostname>’''' can be used on both, Windows and Linux machines to resolve a hostname to the IP address. For example, the following command resolves ''''www.wikipedia.org'''' to it's IP address:
 +
<pre>
 +
nslookup www.wikipedia.org
 +
</pre>
 +
These IP addresses can be used as the destination IP in the traffic rule. This command works on RutOS as well, as RutOS is based on OpenWRT, a Linux distribution.
 +
 
 +
====Default ports for specific services====
 +
 
 +
In the realm of networking, many services are assigned a default port number for communication. These are well-known, reserved TCP/IP ports, which range from 0 to 1023 and are used by specific services, and therre are other well-known ports outside of this range. For instance, the MQTT protocol uses port number 1883 as its default port. When configuring Teltonika devices to use MQTT, the rule to allow traffic on this port is automatically created. However, in case you face an issue with MQTT traffic being dropped, you should check the traffic rules to ensure that the rule which allows traffic on port 1883 exists and is enabled.
 +
 
 +
==Traffic rules configuration examples==
 +
 
 +
In this section, we will discuss various types of traffic rule configurations that you can implement based on your specific needs. It's worth noting that traffic rules are highly flexible and allow you to create specific rules tailored to your network's unique requirements. Therefore, the following are merely examples of some possible configurations.
 +
 
 +
=== Allow a single host to access a web server in WAN network. ===
 
----
 
----
 
<br>Let’s imagine that we would like to restrict traffic for this LAN network (192.168.1.0/24) and only one host needs to have access to the web server (185.11.24.37) on the internet. To achieve this, traffic rules could be configured.
 
<br>Let’s imagine that we would like to restrict traffic for this LAN network (192.168.1.0/24) and only one host needs to have access to the web server (185.11.24.37) on the internet. To achieve this, traffic rules could be configured.
Line 41: Line 71:
 
Two traffic rules would be required for this scenario:
 
Two traffic rules would be required for this scenario:
  
#One traffic rule with lower priority to block all traffic from LAN to WAN.
+
# One traffic rule with lower priority to block all traffic from LAN to WAN network.
#Another traffic rule with higher priority to allow a specific host (PC2) to access the web server.
+
# Another traffic rule with higher priority to allow a specific host (PC2) to access the web server.
  
 
All network traffic coming from the specified host (192.168.1.11) will match the first rule and will be allowed. All other traffic coming from other hosts on the local Network will not match the first rule, but will match the second rule and will be dropped.  
 
All network traffic coming from the specified host (192.168.1.11) will match the first rule and will be allowed. All other traffic coming from other hosts on the local Network will not match the first rule, but will match the second rule and will be dropped.  
Line 49: Line 79:
  
 
<br>
 
<br>
[[File:Firewall_traffic_rules_topology.png|alt=|center|frameless|800x800px]]
+
[[File:Firewall_traffic_rules_topology.png||border|class=tlt-border|800x800px]]
  
  
Create and configure the first rule to block all local traffic to WAN.
+
Create and configure the first rule to block all local traffic to WAN network.
  
* In the ‘Add type’ field choose '''‘Add new forward rule’'''.
+
*In the ‘Add type’ field choose '''‘Add new forward rule’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as source zone.
 
*Choose '''LAN''' as source zone.
 
*Choose '''WAN''' as destination zone.
 
*Choose '''WAN''' as destination zone.
*Click '''‘Add’'''.
+
*Click '''‘Add’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-1_v1.png|alt=Firewall traffic rule to block LAN network.|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-1_v1.png|alt=Firewall traffic rule to block LAN network.|border|class=tlt-border|800x800px]]
  
  
  
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
+
A new window will pop-out where you will be able to specify additional settings.
  
* In the action field choose '''Drop’'''
+
*In the action field choose '''‘Drop’'''<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-2_v1.png|alt=Firewall traffic rule to deny LAN network configuration|frameless|517x517px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-2_v1.png|alt=Firewall traffic rule to deny LAN network configuration|border|class=tlt-border|600x600px]]
  
  
Line 74: Line 104:
 
Scroll down and press '''‘Save & Apply’'''.
 
Scroll down and press '''‘Save & Apply’'''.
  
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
+
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-3_v1.png|alt=|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-3_v1.png||border|class=tlt-border|800x800px]]
  
  
 
Create and configure the second rule to allow the host to access the web server:
 
Create and configure the second rule to allow the host to access the web server:
  
* In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
+
*In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as source zone.
 
*Choose '''LAN''' as source zone.
 
*Choose '''WAN''' as destination zone.
 
*Choose '''WAN''' as destination zone.
*Click '''‘Add’'''.
+
*Click '''‘Add’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-1_v1.png|alt=Firewall traffic rule to allow single host to web server|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-1_v1.png|alt=Firewall traffic rule to allow single host to web server|border|class=tlt-border|800x800px]]
  
  
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
+
A new window will pop-out where you will be able to specify additional settings.
  
* In the protocol field, choose '''TCP+UDP'''.
+
*In the protocol field, choose '''TCP+UDP'''.
  
* In the source IP address enter the IP address of the host in '''LAN''' that you wish to allow to access the web server. In this example, the IP address of PC2 is '''192.168.1.11'''.
+
*In the source IP address enter the IP address of the host in '''LAN''' that you wish to allow to access the web server. In this example, the IP address of PC2 is '''192.168.1.11'''.
* In the destination address field, enter the IP address of the web server, which is '''185.11.24.37''' in this example.
+
*In the destination address field, enter the IP address of the web server, which is '''185.11.24.37''' in this example.
* In the destination port field add ports '''’80’''' and '''‘443’'''. These are '''HTTP''' and '''HTTPS''' port numbers that are used for communication with a web server.
+
*In the destination port field add ports '''’80’''' and '''‘443’'''. These are '''HTTP''' and '''HTTPS''' port numbers that are used for communication with a web server.
* In the action field choose '''‘Accept’'''.
+
*In the action field choose '''‘Accept’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-2_v1.png|alt=Firewall traffic rule to allow a single host to web server configuration|frameless|622x622px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-2_v1.png|alt=Firewall traffic rule to allow a single host to web server configuration|border|class=tlt-border|600x600px]]
  
  
Line 106: Line 136:
 
Scroll down and press '''‘Save & Apply’'''.
 
Scroll down and press '''‘Save & Apply’'''.
  
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. In addition, we need to move the second rule and ensure that the second rule is above the first rule.
+
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. In addition, we need to move the second rule and ensure that the second rule is above the first rule.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-3_v1.png|alt=Firewall two traffic rules to allow only a single host to access web server enabled|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-3_v1.png|alt=Firewall two traffic rules to allow only a single host to access web server enabled|border|class=tlt-border|800x800px]]
  
  
 
These rules indicates that traffic from the host '''192.168.1.11''' in '''LAN''' destined to the IP address of 185.11.24.37 on ports '''80''' and '''443''' in '''WAN''' must be accepted. The '''‘Accept forward’''' indicates the action (accept). The slider on the right side shows that the rule is enabled. The rule is above the Deny-LAN-WAN rule, so that traffic from host 192.168.1.11 (PC2) matches the first rule and is accepted. Traffic from other hosts in LAN will match the second rule and will be dropped.
 
These rules indicates that traffic from the host '''192.168.1.11''' in '''LAN''' destined to the IP address of 185.11.24.37 on ports '''80''' and '''443''' in '''WAN''' must be accepted. The '''‘Accept forward’''' indicates the action (accept). The slider on the right side shows that the rule is enabled. The rule is above the Deny-LAN-WAN rule, so that traffic from host 192.168.1.11 (PC2) matches the first rule and is accepted. Traffic from other hosts in LAN will match the second rule and will be dropped.
  
===Opening a port on the device.===
+
===Opening a port on the device. ===
 
----
 
----
To open a port on the device for WAN:
+
To open a port on the device for WAN network:
* In the add type field select the '''‘Open ports on router’''' option.
+
*In the add type field select the '''‘Open ports on router’''' option.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Select a protocol that will be allowed to access the port. '''TCP''' + '''UDP''' by default
 
*Select a protocol that will be allowed to access the port. '''TCP''' + '''UDP''' by default
 
*Enter an external port that you want to open.
 
*Enter an external port that you want to open.
*Press the '''‘Add'''button.
+
*Press the '''‘Add’''' button.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_3-1_v1.png|alt=Firewall traffic rule to open a port of a device|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_3-1_v1.png|alt=Firewall traffic rule to open a port of a device||border|class=tlt-border|800x800px]]
  
  
 
<br>A new window will pop-out where you will be able to specify additional settings. For the purpose of just opening a port, no additional settings are required. Scroll down and press '''‘Save & Apply’'''.
 
<br>A new window will pop-out where you will be able to specify additional settings. For the purpose of just opening a port, no additional settings are required. Scroll down and press '''‘Save & Apply’'''.
  
<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
+
<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_3-2_v1.png|alt=Firewall traffic rule to open a port on a device enabled|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_3-2_v1.png|alt=Firewall traffic rule to open a port on a device enabled||border|class=tlt-border|800x800px]]
  
 
<br>
 
<br>
Line 140: Line 170:
  
 
First rule:
 
First rule:
* In the '''‘Add type’''' field choose '''‘open ports on router’'''.
+
*In the '''‘Add type’''' field choose '''‘open ports on router’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
 
*Enter an external port to block.
 
*Enter an external port to block.
*Click '''‘Add’.'''
+
*Click '''‘Add’.'''<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_4-1_v1.png|alt=Firewall traffic rule to deny a single port for LAN network|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_4-1_v1.png|alt=Firewall traffic rule to deny a single port for LAN network||border|class=tlt-border|800x800px]]
  
 
<br>
 
<br>
Line 153: Line 183:
 
*Choose '''LAN''' as the source zone.
 
*Choose '''LAN''' as the source zone.
 
*Leave the source IP field '''‘any’''' or specify a LAN network to block.
 
*Leave the source IP field '''‘any’''' or specify a LAN network to block.
* In the action field choose '''‘Drop’'''.
+
*In the action field choose '''‘Drop’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_4-2_v1.png|alt=Firewall traffic rule to deny single port for LAN network configuration|frameless|620x620px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_4-2_v1.png|alt=Firewall traffic rule to deny single port for LAN network configuration|border|class=tlt-border|600x600px]]
  
  
Line 164: Line 194:
 
The second rule:
 
The second rule:
  
* In the '''‘Add type’''' field choose '''‘open ports on router’'''.
+
*In the '''‘Add type’''' field choose '''‘open ports on router’'''.
 
*Enter a name of your choice for this rule that allow host on a specified port.
 
*Enter a name of your choice for this rule that allow host on a specified port.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
 
*Enter an external port to allow.
 
*Enter an external port to allow.
*Click '''‘Add’.'''
+
*Click '''‘Add’.''' <br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-1_v1.png|alt=Firewall traffic rule to allow a single host on one port|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-1_v1.png|alt=Firewall traffic rule to allow a single host on one port|border|class=tlt-border|800x800px]]
  
*set the source IP address to the IP address of the host.
+
* set the source IP address to the IP address of the host.
* In the action field choose '''‘Accept’'''.
+
*In the action field choose '''‘Accept’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-2_v1.png|alt=Firewall traffic rule to allow a single host on one port configuration|frameless|665x665px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-2_v1.png|alt=Firewall traffic rule to allow a single host on one port configuration|border|class=tlt-border|600x600px]]
  
  
Line 181: Line 211:
 
Scroll down and press '''‘Save & Apply’'''.
 
Scroll down and press '''‘Save & Apply’'''.
  
The new rules are created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. These rules indicate that any traffic coming from host '''192.168.11.50''' in the '''LAN''' to port '''5000''' on the device will be accepted. The slider on the right side shows that the rule is enabled. Drag the second rule to be above the first rule, so the traffic from the host is matched against it and is allowed to access the device on port 5000. All other traffic from the local network coming to port 5000 on the router will be dropped because it will match the second rule. For example, if port is set to 53 (a port used by DNS), only this host would be allowed to use DNS service running on the device. Similarly, if the ports are set to 80 and 443, only that specific IP address will be able to access the WebUI of the device.
+
The new rules are created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. These rules indicate that any traffic coming from host '''192.168.11.50''' in the '''LAN''' to port '''5000''' on the device will be accepted. The slider on the right side shows that the rule is enabled. Drag the second rule to be above the first rule, so the traffic from the host is matched against it and is allowed to access the device on port 5000. All other traffic from the local network coming to port 5000 on the router will be dropped because it will match the second rule. For example, if port is set to 53 (a port used by DNS), only this host would be allowed to use DNS service running on the device. Similarly, if the ports are set to 80 and 443, only that specific IP address will be able to access the WebUI of the device.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-3_v1.png|alt=Firewall two traffic rules to allow only a single host on one port enabled|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-3_v1.png|alt=Firewall two traffic rules to allow only a single host on one port enabled|border|class=tlt-border|800x800px]]
  
  
===Allow to remotely access the WebUI.===
+
===Allow to remotely access the WebUI. ===
 
----
 
----
By default, all the traffic from WAN to the router is rejected. A traffic rule can be configured to allow a specific IP address to access the WebUI of the router. It is a bad practice to allow all devices on the internet to be able to connect to the router, so only a single IP address will be able to do that in this example.
+
By default, all the traffic from WAN network to the router is rejected. A traffic rule can be configured to allow a specific IP address to access the WebUI of the router. It is a bad practice to allow all devices on the internet to be able to connect to the router, so only a single IP address will be able to do that in this example.
  
* In the '''‘Add type’''' field choose '''‘Open ports on router'''.
+
*In the '''‘Add type’''' field choose '''‘Open ports on router’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''TCP''' as the protocol.
 
*Choose '''TCP''' as the protocol.
* In the external port field, enter ports '''80''' and '''443 (HTTP(S))''' so that only the access to the WebUI is allowed. Click '''‘Add’'''.
+
*In the external port field, enter ports '''80''' and '''443 (HTTP(S))''' so that only the access to the WebUI is allowed. Click '''‘Add’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-1_v1.png|alt=Firewall traffic rule to allow web access from WAN|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-1_v1.png|alt=Firewall traffic rule to allow web access from WAN|border|class=tlt-border|800x800px]]
  
  
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
+
A new window will pop-out where you will be able to specify additional settings.
  
 
* In the source IP enter the IP address from which you want to be able to access the WebUI.
 
* In the source IP enter the IP address from which you want to be able to access the WebUI.
 
*Destination zone should be set to Device (input).
 
*Destination zone should be set to Device (input).
* In the destination IP address choose the IP address of the router.
+
*In the destination IP address choose the IP address of the router.
* In the action field choose '''‘Accept’'''.
+
*In the action field choose '''‘Accept’'''.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-2_v1.png|alt=Firewall traffic rule to allow web access from WAN configuration|frameless|617x617px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-2_v1.png|alt=Firewall traffic rule to allow web access from WAN configuration|border|class=tlt-border|600x600px]]
  
  
Line 212: Line 242:
 
Scroll down and press '''‘Save & Apply’'''.
 
Scroll down and press '''‘Save & Apply’'''.
  
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
+
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-3_v1.png|alt=Firewall traffic rule to allow web access from WAN enabled|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-3_v1.png|alt=Firewall traffic rule to allow web access from WAN enabled|border|class=tlt-border|800x800px]]
  
  
The rule indicates that TCP traffic coming from the host  '''138.199.19.170''' in the '''WAN''' to the device (router) on ports '''80''' and '''443''' will be accepted. The '''‘Accept input’''' indicates the action (accept). The slider on the right side shows that the rule is enabled.
+
The rule indicates that TCP traffic coming from the host  '''138.199.19.170''' in the '''WAN''' to the device (router) on ports '''80''' and '''443''' will be accepted. The '''‘Accept input’''' indicates the action (accept). The slider on the right side shows that the rule is enabled.
  
 
In this scenario, only the host 138.199.19.170 will be able to access the WebUI of the router via it’s public IP. Similarly, if the port is set to 22 instead of 80 and 443, the remote host would be able to connect to the device via SSH, but not WebUI.
 
In this scenario, only the host 138.199.19.170 will be able to access the WebUI of the router via it’s public IP. Similarly, if the port is set to 22 instead of 80 and 443, the remote host would be able to connect to the device via SSH, but not WebUI.
Line 224: Line 254:
 
----
 
----
 
In this scenario devices on the '''LAN''' will not be able to send traffic to '''WAN''' on selected ports.<br>
 
In this scenario devices on the '''LAN''' will not be able to send traffic to '''WAN''' on selected ports.<br>
* In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
+
*In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
*Enter a name of your choice for this rule.
+
* Enter a name of your choice for this rule.
 
*Choose '''LAN''' as the source zone.
 
*Choose '''LAN''' as the source zone.
 
*Choose '''WAN''' as the destination zone.
 
*Choose '''WAN''' as the destination zone.
*Click '''‘Add’'''.
+
*Click '''‘Add’'''.<br>
  
  
[[File:Networking rutos configuration example firewall traffic rules rutos configuration traffic rule1-10 v1.png|border|class=tlt-border|alt=|frameless|800x800px]]
+
[[File:Networking rutos configuration example firewall traffic rules rutos configuration traffic rule1-10 v1.png|border|class=tlt-border|800x800px]]
  
 
<br>
 
<br>
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
+
A new window will pop-out where you will be able to specify additional settings.
  
 
*Select '''<nowiki/>'TCP+UDP'''' as protocol.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocol.
* In the destination port field enter the range of ports you wish to deny (For example, '''‘1500-1700’'''), or list specific ports by leaving spaces in-between port numbers (For example, '''‘80 443'''’).
+
*In the destination port field enter the range of ports you wish to deny (For example, '''‘1500-1700’'''), or list specific ports by leaving spaces in-between port numbers (For example, '''‘80 443'''’).
* In the action field choose '''‘Drop’'''.<br>
+
*In the action field choose '''‘Drop’'''.<br>
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-11_v1.png|alt=Firewall traffic rule to block a range of ports|frameless|560x560px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-11_v1.png|alt=Firewall traffic rule to block a range of ports|border|class=tlt-border|600x600px]]
  
  
Line 246: Line 276:
 
Scroll down and press '''‘Save & Apply’'''.<br>
 
Scroll down and press '''‘Save & Apply’'''.<br>
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-12_v1.png|alt=Firewall traffic rule to block a range of ports enabled|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-12_v1.png|alt=Firewall traffic rule to block a range of ports enabled|border|class=tlt-border|800x800px]]
  
 
<br>
 
<br>
Line 256: Line 286:
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as source zone.
 
*Choose '''LAN''' as source zone.
*Choose '''WAN''' as destination zone.
+
* Choose '''WAN''' as destination zone.
 
*Click '''‘Add’'''.<br>
 
*Click '''‘Add’'''.<br>
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-1_v1.png|alt=Firewall traffic rule to block host MAC on certain times|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-1_v1.png|alt=Firewall traffic rule to block host MAC on certain times|border|class=tlt-border|800x800px]]
  
 
<br>
 
<br>
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
+
A new window will pop-out where you will be able to specify additional settings.
  
* In the source '''MAC''' address choose the '''MAC''' address of the host to who the rule will apply. You can enter a custom MAC address.
+
*In the source '''MAC''' address choose the '''MAC''' address of the host to who the rule will apply. You can enter a custom MAC address.
* In the action field choose '''‘Drop’'''.
+
*In the action field choose '''‘Drop’'''.
* On weekdays you can choose on which days the rule will apply (The device will not be able to communicate). You can choose days of the month, start and stop times, and other time settings.
+
*On weekdays you can choose on which days the rule will apply (The device will not be able to communicate). You can choose days of the month, start and stop times, and other time settings.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-2_v1.png|alt=Firewall traffic rule to block host MAC on certain times configuration|frameless|825x825px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-2_v1.png|alt=Firewall traffic rule to block host MAC on certain times configuration|border|class=tlt-border|600x600px]]
  
  
<br>You can specify additional settings as you wish.<br>Scroll down and press '''‘Save & Apply’'''.<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
+
<br>You can specify additional settings as you wish.<br>Scroll down and press '''‘Save & Apply’'''.<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
  
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-3_v1.png|alt=Firewall traffic rule to block host MAC on certain times enabled|frameless|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-3_v1.png|alt=Firewall traffic rule to block host MAC on certain times enabled|border|class=tlt-border|800x800px]]
  
  
 
<br>
 
<br>
 
This rule indicates that the PC with mac address of '''00:00:5e:00:53:af''' will not be able to send traffic to '''WAN'''. The '''‘Discard forward’''' indicates the action (drop).  The rule does not show the times at which this rule is applied, but the times can be found on the settings page ('''‘Pencil’''' button). This rule will be applied for the first time on the 12th of February, 2023. Then, every Monday, Tuesday, Wednesday, Thursday, and Friday, from 8 AM to 4 PM this PC  will not be able to send traffic to '''WAN'''.
 
This rule indicates that the PC with mac address of '''00:00:5e:00:53:af''' will not be able to send traffic to '''WAN'''. The '''‘Discard forward’''' indicates the action (drop).  The rule does not show the times at which this rule is applied, but the times can be found on the settings page ('''‘Pencil’''' button). This rule will be applied for the first time on the 12th of February, 2023. Then, every Monday, Tuesday, Wednesday, Thursday, and Friday, from 8 AM to 4 PM this PC  will not be able to send traffic to '''WAN'''.

Revision as of 08:31, 7 April 2023

The information in this page is updated in accordance with 00.07.03.4 firmware version.

Introduction

This article contains instructions on how to configure firewall traffic rules to filter network traffic. Firewalls are a critical component of network security, and they act as a barrier between your network and the internet. By configuring traffic rules, you can gain granular control over what traffic should be allowed, blocked, or rejected. This can help to enhance network security by preventing unauthorized access and reducing the risk of malicious attacks. By following the instructions in this article, you can learn how to configure firewall traffic rules to enhance network security.

What is a traffic rule?

The Traffic Rules tab is a crucial feature of a firewall functionality that allows you to set rules to filter and control network traffic moving through the device. In essence, traffic rules determine which firewall rules will be applied to packets traveling through the network. These packets can be allowed, blocked, or rejected based on various criteria such as the source and destination IP addresses and port numbers specified in the packet headers. Additionally, traffic rules can be applied based on the specific firewall zone the packet is originating from and its intended destination zone.

With traffic rules, you have the flexibility to choose which packets should be subject to specific firewall rules based on their characteristics. By allowing, blocking, or rejecting certain types of traffic, you can protect your network from malicious attacks and unauthorized access while ensuring that legitimate traffic flows smoothly.

Teltonika devices come equipped with preconfigured traffic rules that provide adequate security for basic scenarios. However, if your solution requirements demand additional unique changes to the firewall configuration, it's crucial to carefully configure traffic rules to ensure that your network operates efficiently and securely. You should analyze your network traffic patterns and security risks to determine which traffic should be allowed, blocked, or rejected. This process will help you create a custom traffic rule set tailored to your network's specific needs, thereby enhancing network security and efficiency.

It's worth noting that improperly configured traffic rules can cause network performance issues, such as delays or lost packets. Therefore, it's essential to test and verify the effectiveness of your traffic rules before implementing them in a production environment. Regularly reviewing and updating your traffic rules is also recommended to ensure that your network remains secure and optimized for performance.


Configuration specifics of Traffic Rules

Traffic Rules evaluation

Traffic rule settings can be found by navigating to Network -> Firewall -> Traffic rules via WebUI. The new rules are created in the ‘Add new instance’ section of the settings page.

The traffic is evaluated against each rule in the traffic rules from top to bottom. This means that if there are two distinct rules, one that allows traffic on a specific IP and another rule that blocks the traffic on that same IP, only the first rule will apply, and the traffic will be allowed.

It is important to be mindful of the order of traffic rules. The rules can always be rearranged by simply clicking on the symbol on the left side of the rule and dragging the rule where it is needed. You can also change the configuration of each rule by finding your rule in the traffic rules and pressing a ‘pencil’ button to edit settings.

firewall traffic rules rule order

Defining specific IP addresses and networks

It is possible to define both specific IP addresses to block hosts, as well as networks to block whole networks of devices. Examples are:

Full IP address for a host:

  • 192.168.1.151

Network using CIDR notation:

  • 192.168.1.0/24

Defining single ports and range of ports

It is also possible to define single ports, as well as a range of ports. To apply the rule for two ports, 22 and 443:

  • Add port 22
  • Add port 443

To apply the rule to all ports from 1200 to 1600:

  • Add ports 1200-1600

Resolving hostnames to IP addresses

A command ‘nslookup <hostname>’ can be used on both, Windows and Linux machines to resolve a hostname to the IP address. For example, the following command resolves 'www.wikipedia.org' to it's IP address:

nslookup www.wikipedia.org

These IP addresses can be used as the destination IP in the traffic rule. This command works on RutOS as well, as RutOS is based on OpenWRT, a Linux distribution.

Default ports for specific services

In the realm of networking, many services are assigned a default port number for communication. These are well-known, reserved TCP/IP ports, which range from 0 to 1023 and are used by specific services, and therre are other well-known ports outside of this range. For instance, the MQTT protocol uses port number 1883 as its default port. When configuring Teltonika devices to use MQTT, the rule to allow traffic on this port is automatically created. However, in case you face an issue with MQTT traffic being dropped, you should check the traffic rules to ensure that the rule which allows traffic on port 1883 exists and is enabled.

Traffic rules configuration examples

In this section, we will discuss various types of traffic rule configurations that you can implement based on your specific needs. It's worth noting that traffic rules are highly flexible and allow you to create specific rules tailored to your network's unique requirements. Therefore, the following are merely examples of some possible configurations.

Allow a single host to access a web server in WAN network.



Let’s imagine that we would like to restrict traffic for this LAN network (192.168.1.0/24) and only one host needs to have access to the web server (185.11.24.37) on the internet. To achieve this, traffic rules could be configured.

Two traffic rules would be required for this scenario:

  1. One traffic rule with lower priority to block all traffic from LAN to WAN network.
  2. Another traffic rule with higher priority to allow a specific host (PC2) to access the web server.

All network traffic coming from the specified host (192.168.1.11) will match the first rule and will be allowed. All other traffic coming from other hosts on the local Network will not match the first rule, but will match the second rule and will be dropped.

In this scenario only the host named ‘PC2’ on the LAN will be able to reach a web server in WAN.


Firewall traffic rules topology.png


Create and configure the first rule to block all local traffic to WAN network.

  • In the ‘Add type’ field choose ‘Add new forward rule’.
  • Enter a name of your choice for this rule.
  • Choose LAN as source zone.
  • Choose WAN as destination zone.
  • Click ‘Add’.

Firewall traffic rule to block LAN network.


A new window will pop-out where you will be able to specify additional settings.

  • In the action field choose ‘Drop’

Firewall traffic rule to deny LAN network configuration


Scroll down and press ‘Save & Apply’.

The new rule is created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled.

Networking rutos configuration example firewall traffic rules 1-3 v1.png


Create and configure the second rule to allow the host to access the web server:

  • In the ‘Add type’ field choose ‘Add new forward rule’.
  • Enter a name of your choice for this rule.
  • Choose LAN as source zone.
  • Choose WAN as destination zone.
  • Click ‘Add’.

Firewall traffic rule to allow single host to web server


A new window will pop-out where you will be able to specify additional settings.

  • In the protocol field, choose TCP+UDP.
  • In the source IP address enter the IP address of the host in LAN that you wish to allow to access the web server. In this example, the IP address of PC2 is 192.168.1.11.
  • In the destination address field, enter the IP address of the web server, which is 185.11.24.37 in this example.
  • In the destination port field add ports ’80’ and ‘443’. These are HTTP and HTTPS port numbers that are used for communication with a web server.
  • In the action field choose ‘Accept’.

Firewall traffic rule to allow a single host to web server configuration


You can specify additional settings as you wish. For example, you can set times when this rule should apply. This way, the host will be able to access the web server only at certain times.

Scroll down and press ‘Save & Apply’.

The new rule is created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled. In addition, we need to move the second rule and ensure that the second rule is above the first rule.

Firewall two traffic rules to allow only a single host to access web server enabled


These rules indicates that traffic from the host 192.168.1.11 in LAN destined to the IP address of 185.11.24.37 on ports 80 and 443 in WAN must be accepted. The ‘Accept forward’ indicates the action (accept). The slider on the right side shows that the rule is enabled. The rule is above the Deny-LAN-WAN rule, so that traffic from host 192.168.1.11 (PC2) matches the first rule and is accepted. Traffic from other hosts in LAN will match the second rule and will be dropped.

Opening a port on the device.


To open a port on the device for WAN network:

  • In the add type field select the ‘Open ports on router’ option.
  • Enter a name of your choice for this rule.
  • Select a protocol that will be allowed to access the port. TCP + UDP by default
  • Enter an external port that you want to open.
  • Press the ‘Add’ button.

Firewall traffic rule to open a port of a device



A new window will pop-out where you will be able to specify additional settings. For the purpose of just opening a port, no additional settings are required. Scroll down and press ‘Save & Apply’.


The new rule is created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled.

Firewall traffic rule to open a port on a device enabled


Here we can see that a new rule was created. It accepts TCP, UDP traffic from any host in WAN coming to the router on port 8080. The slider on the right side is set to ‘on’ indicating that the rule is enabled.

Open ports on the device for a specific LAN host.


To open a port for only one host on LAN you would need to create 2 traffic rules. One rule to block LAN traffic from accessing the port on device, and the second rule to allow only a single host to access that port. Both rules have similarities. The steps below describe how to create and configure both rules with differences mentioned.


First rule:

  • In the ‘Add type’ field choose ‘open ports on router’.
  • Enter a name of your choice for this rule.
  • Select 'TCP+UDP' as protocols.
  • Enter an external port to block.
  • Click ‘Add’.

Firewall traffic rule to deny a single port for LAN network


A new window will pop-out where you will be able to specify additional settings.

  • Choose LAN as the source zone.
  • Leave the source IP field ‘any’ or specify a LAN network to block.
  • In the action field choose ‘Drop’.

Firewall traffic rule to deny single port for LAN network configuration


Scroll down and press ‘Save & Apply’.


The second rule:

  • In the ‘Add type’ field choose ‘open ports on router’.
  • Enter a name of your choice for this rule that allow host on a specified port.
  • Select 'TCP+UDP' as protocols.
  • Enter an external port to allow.
  • Click ‘Add’.

Firewall traffic rule to allow a single host on one port

  • set the source IP address to the IP address of the host.
  • In the action field choose ‘Accept’.

Firewall traffic rule to allow a single host on one port configuration


Scroll down and press ‘Save & Apply’.

The new rules are created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled. These rules indicate that any traffic coming from host 192.168.11.50 in the LAN to port 5000 on the device will be accepted. The slider on the right side shows that the rule is enabled. Drag the second rule to be above the first rule, so the traffic from the host is matched against it and is allowed to access the device on port 5000. All other traffic from the local network coming to port 5000 on the router will be dropped because it will match the second rule. For example, if port is set to 53 (a port used by DNS), only this host would be allowed to use DNS service running on the device. Similarly, if the ports are set to 80 and 443, only that specific IP address will be able to access the WebUI of the device.

Firewall two traffic rules to allow only a single host on one port enabled


Allow to remotely access the WebUI.


By default, all the traffic from WAN network to the router is rejected. A traffic rule can be configured to allow a specific IP address to access the WebUI of the router. It is a bad practice to allow all devices on the internet to be able to connect to the router, so only a single IP address will be able to do that in this example.

  • In the ‘Add type’ field choose ‘Open ports on router’.
  • Enter a name of your choice for this rule.
  • Choose TCP as the protocol.
  • In the external port field, enter ports 80 and 443 (HTTP(S)) so that only the access to the WebUI is allowed. Click ‘Add’.

Firewall traffic rule to allow web access from WAN


A new window will pop-out where you will be able to specify additional settings.

  • In the source IP enter the IP address from which you want to be able to access the WebUI.
  • Destination zone should be set to Device (input).
  • In the destination IP address choose the IP address of the router.
  • In the action field choose ‘Accept’.

Firewall traffic rule to allow web access from WAN configuration


You can specify additional settings as you wish.

Scroll down and press ‘Save & Apply’.

The new rule is created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled.

Firewall traffic rule to allow web access from WAN enabled


The rule indicates that TCP traffic coming from the host 138.199.19.170 in the WAN to the device (router) on ports 80 and 443 will be accepted. The ‘Accept input’ indicates the action (accept). The slider on the right side shows that the rule is enabled.

In this scenario, only the host 138.199.19.170 will be able to access the WebUI of the router via it’s public IP. Similarly, if the port is set to 22 instead of 80 and 443, the remote host would be able to connect to the device via SSH, but not WebUI.

Block LAN network from accessing WAN on selected ports.


In this scenario devices on the LAN will not be able to send traffic to WAN on selected ports.

  • In the ‘Add type’ field choose ‘Add new forward rule’.
  • Enter a name of your choice for this rule.
  • Choose LAN as the source zone.
  • Choose WAN as the destination zone.
  • Click ‘Add’.


Networking rutos configuration example firewall traffic rules rutos configuration traffic rule1-10 v1.png


A new window will pop-out where you will be able to specify additional settings.

  • Select 'TCP+UDP' as protocol.
  • In the destination port field enter the range of ports you wish to deny (For example, ‘1500-1700’), or list specific ports by leaving spaces in-between port numbers (For example, ‘80 443’).
  • In the action field choose ‘Drop’.

Firewall traffic rule to block a range of ports



You can specify additional settings as you wish.
Scroll down and press ‘Save & Apply’.
The new rule is created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled.
Firewall traffic rule to block a range of ports enabled


In this scenario, the traffic coming from the LAN devices to WAN on any port from a range of 1500-1700 will be dropped. The ‘Discard forward’ indicates the action (drop). The slider on the right side shows that the rule is enabled.

Block specific host on the LAN from accessing WAN on certain times.


In this scenario, a specific PC will not be able to send traffic to WAN during specified time periods. To block a certain PC, a MAC address is used. This is an address of a physical device and can belong to that device only. This is opposed to IP addresses, which can be easily changed.

  • In the ‘Add type’ field choose ‘Add new forward rule’.
  • Enter a name of your choice for this rule.
  • Choose LAN as source zone.
  • Choose WAN as destination zone.
  • Click ‘Add’.

Firewall traffic rule to block host MAC on certain times


A new window will pop-out where you will be able to specify additional settings.

  • In the source MAC address choose the MAC address of the host to who the rule will apply. You can enter a custom MAC address.
  • In the action field choose ‘Drop’.
  • On weekdays you can choose on which days the rule will apply (The device will not be able to communicate). You can choose days of the month, start and stop times, and other time settings.

Firewall traffic rule to block host MAC on certain times configuration



You can specify additional settings as you wish.
Scroll down and press ‘Save & Apply’.
The new rule is created and enabled. To verify, go to the last page in ‘Traffic rules’ and verify that the rule is configured correctly and is enabled.

Firewall traffic rule to block host MAC on certain times enabled



This rule indicates that the PC with mac address of 00:00:5e:00:53:af will not be able to send traffic to WAN. The ‘Discard forward’ indicates the action (drop). The rule does not show the times at which this rule is applied, but the times can be found on the settings page (‘Pencil’ button). This rule will be applied for the first time on the 12th of February, 2023. Then, every Monday, Tuesday, Wednesday, Thursday, and Friday, from 8 AM to 4 PM this PC will not be able to send traffic to WAN.