Changes

m
Fixed to fit.
Line 11: Line 11:  
It is important to be mindful of the order of traffic rules. The rules can always be rearranged by simply clicking on the symbol on the left side of the rule and dragging the rule where it is needed.
 
It is important to be mindful of the order of traffic rules. The rules can always be rearranged by simply clicking on the symbol on the left side of the rule and dragging the rule where it is needed.
   −
[[File:Networking rutos configuration example firewall traffic rules rules order.png|alt=firewall traffic rules rule order|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_rules_order.png|alt=firewall traffic rules rule order|frameless|800x800px]]
    
It is possible to define both, specific IP addresses to block hosts, as well as networks to block whole networks of devices. Examples are:
 
It is possible to define both, specific IP addresses to block hosts, as well as networks to block whole networks of devices. Examples are:
Line 21: Line 21:  
**84.15.239.0/24
 
**84.15.239.0/24
   −
It is possible to define single ports, as well as a range of ports.
+
It is also possible to define single ports, as well as a range of ports.
    
*To apply the rule for two ports, 22 and 443:
 
*To apply the rule for two ports, 22 and 443:
Line 48: Line 48:     
<br>
 
<br>
[[File:Firewall traffic rules topology.png|thumb|Firewall Traffic rules topoly]]
+
[[File:Firewall_traffic_rules_topology.png|alt=|center|frameless|800x800px]]
       
Create and configure the first rule to block all local traffic to WAN.
 
Create and configure the first rule to block all local traffic to WAN.
   −
*In the ‘Add type’ field choose '''‘Add new forward rule’'''.
+
* In the ‘Add type’ field choose '''‘Add new forward rule’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as source zone.
 
*Choose '''LAN''' as source zone.
 
*Choose '''WAN''' as destination zone.
 
*Choose '''WAN''' as destination zone.
 
*Click '''‘Add’'''.
 
*Click '''‘Add’'''.
[[File:Networking rutos configuration example firewall traffic rules 1-1 v1.png|alt=Firewall traffic rule to block LAN network.|none|thumb|800x800px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-1_v1.png|alt=Firewall traffic rule to block LAN network.|frameless|800x800px]]
      Line 64: Line 65:  
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
 
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
   −
*In the action field choose ‘'''Drop’'''
+
* In the action field choose ‘'''Drop’'''
   −
[[File:Networking rutos configuration example firewall traffic rules 1-2 v1.png|alt=Firewall traffic rule to deny LAN network configuration|none|thumb|517x517px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-2_v1.png|alt=Firewall traffic rule to deny LAN network configuration|frameless|517x517px]]
      Line 74: Line 75:  
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
   −
[[File:Networking rutos configuration example firewall traffic rules 1-3 v1.png|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-3_v1.png|alt=|frameless|800x800px]]
       
Create and configure the second rule to allow the host to access the web server:
 
Create and configure the second rule to allow the host to access the web server:
   −
*In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
+
* In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as source zone.
 
*Choose '''LAN''' as source zone.
Line 85: Line 86:  
*Click '''‘Add’'''.
 
*Click '''‘Add’'''.
   −
[[File:Networking rutos configuration example firewall traffic rules 2-1 v1.png|alt=Firewall traffic rule to allow single host to web server|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-1_v1.png|alt=Firewall traffic rule to allow single host to web server|frameless|800x800px]]
       
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
 
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
   −
*In the protocol field, choose '''TCP+UDP'''.
+
* In the protocol field, choose '''TCP+UDP'''.
 +
 
 +
* In the source IP address enter the IP address of the host in '''LAN''' that you wish to allow to access the web server. In this example, the IP address of PC2 is '''192.168.1.11'''.
 +
* In the destination address field, enter the IP address of the web server, which is '''185.11.24.37''' in this example.
 +
* In the destination port field add ports '''’80’''' and '''‘443’'''. These are '''HTTP''' and '''HTTPS''' port numbers that are used for communication with a web server.
 +
* In the action field choose '''‘Accept’'''.
   −
*In the source IP address enter the IP address of the host in '''LAN''' that you wish to allow to access the web server. In this example, the IP address of PC2 is '''192.168.1.11'''.
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-2_v1.png|alt=Firewall traffic rule to allow a single host to web server configuration|frameless|622x622px]]
*In the destination address field, enter the IP address of the web server, which is '''185.11.24.37''' in this example.
  −
*In the destination port field add ports '''’80’''' and '''‘443’'''. These are '''HTTP''' and '''HTTPS''' port numbers that are used for communication with a web server.
  −
*In the action field choose '''‘Accept’'''.
  −
[[File:Networking rutos configuration example firewall traffic rules 2-2 v1.png|alt=Firewall traffic rule to allow a single host to web server configuration|none|thumb|622x622px]]
        Line 105: Line 107:  
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. In addition, we need to move the second rule and ensure that the second rule is above the first rule.
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. In addition, we need to move the second rule and ensure that the second rule is above the first rule.
   −
[[File:Networking rutos configuration example firewall traffic rules 2-3 v1.png|alt=Firewall two traffic rules to allow only a single host to access web server enabled|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_2-3_v1.png|alt=Firewall two traffic rules to allow only a single host to access web server enabled|frameless|800x800px]]
      Line 112: Line 114:  
===Opening a port on the device.===
 
===Opening a port on the device.===
 
To open a port on the device for WAN:
 
To open a port on the device for WAN:
*In the add type field select the '''‘Open ports on router’''' option.
+
* In the add type field select the '''‘Open ports on router’''' option.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Select a protocol that will be allowed to access the port. '''TCP''' + '''UDP''' by default
 
*Select a protocol that will be allowed to access the port. '''TCP''' + '''UDP''' by default
 
*Enter an external port that you want to open.
 
*Enter an external port that you want to open.
 
*Press the '''‘Add'''’ button.
 
*Press the '''‘Add'''’ button.
[[File:Networking rutos configuration example firewall traffic rules 3-1 v1.png|alt=Firewall traffic rule to open a port of a device|none|thumb|800x800px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_3-1_v1.png|alt=Firewall traffic rule to open a port of a device|frameless|800x800px]]
      Line 123: Line 126:     
<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
 
<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
[[File:Networking rutos configuration example firewall traffic rules 3-2 v1.png|alt=Firewall traffic rule to open a port on a device enabled|none|thumb|800x800px]]
+
 
<br><br>
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_3-2_v1.png|alt=Firewall traffic rule to open a port on a device enabled|frameless|800x800px]]
 +
 
 +
<br>
 
Here we can see that a new rule was created. It accepts '''TCP, UDP''' traffic from any host in '''WAN''' coming to the router on port '''8080'''. The slider on the right side is set to '''‘on’''' indicating that the rule is enabled.
 
Here we can see that a new rule was created. It accepts '''TCP, UDP''' traffic from any host in '''WAN''' coming to the router on port '''8080'''. The slider on the right side is set to '''‘on’''' indicating that the rule is enabled.
   Line 133: Line 138:     
First rule:
 
First rule:
*In the '''‘Add type’''' field choose '''‘open ports on router’'''.
+
* In the '''‘Add type’''' field choose '''‘open ports on router’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
Line 139: Line 144:  
*Click '''‘Add’.'''
 
*Click '''‘Add’.'''
   −
[[File:Networking rutos configuration example firewall traffic rules 4-1 v1.png|alt=Firewall traffic rule to deny a single port for LAN network|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_4-1_v1.png|alt=Firewall traffic rule to deny a single port for LAN network|frameless|800x800px]]
    
<br>
 
<br>
Line 146: Line 151:  
*Choose '''LAN''' as the source zone.
 
*Choose '''LAN''' as the source zone.
 
*Leave the source IP field '''‘any’''' or specify a LAN network to block.
 
*Leave the source IP field '''‘any’''' or specify a LAN network to block.
*In the action field choose '''‘Drop’'''.
+
* In the action field choose '''‘Drop’'''.
[[File:Networking rutos configuration example firewall traffic rules 4-2 v1.png|alt=Firewall traffic rule to deny single port for LAN network configuration|none|thumb|620x620px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_4-2_v1.png|alt=Firewall traffic rule to deny single port for LAN network configuration|frameless|620x620px]]
      Line 156: Line 162:  
The second rule:
 
The second rule:
   −
*In the '''‘Add type’''' field choose '''‘open ports on router’'''.
+
* In the '''‘Add type’''' field choose '''‘open ports on router’'''.
 
*Enter a name of your choice for this rule that allow host on a specified port.
 
*Enter a name of your choice for this rule that allow host on a specified port.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocols.
Line 162: Line 168:  
*Click '''‘Add’.'''
 
*Click '''‘Add’.'''
   −
[[File:Networking rutos configuration example firewall traffic rules 5-1 v1.png|alt=Firewall traffic rule to allow a single host on one port|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-1_v1.png|alt=Firewall traffic rule to allow a single host on one port|frameless|800x800px]]
    
*set the source IP address to the IP address of the host.
 
*set the source IP address to the IP address of the host.
*In the action field choose '''‘Accept’'''.
+
* In the action field choose '''‘Accept’'''.
[[File:Networking rutos configuration example firewall traffic rules 5-2 v1.png|alt=Firewall traffic rule to allow a single host on one port configuration|none|thumb|665x665px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-2_v1.png|alt=Firewall traffic rule to allow a single host on one port configuration|frameless|665x665px]]
      Line 174: Line 181:  
The new rules are created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. These rules indicate that any traffic coming from host '''192.168.11.50''' in the '''LAN''' to port '''5000''' on the device will be accepted. The slider on the right side shows that the rule is enabled. Drag the second rule to be above the first rule, so the traffic from the host is matched against it and is allowed to access the device on port 5000. All other traffic from the local network coming to port 5000 on the router will be dropped because it will match the second rule. For example, if port is set to 53 (a port used by DNS), only this host would be allowed to use DNS service running on the device. Similarly, if the ports are set to 80 and 443, only that specific IP address will be able to access the WebUI of the device.
 
The new rules are created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled. These rules indicate that any traffic coming from host '''192.168.11.50''' in the '''LAN''' to port '''5000''' on the device will be accepted. The slider on the right side shows that the rule is enabled. Drag the second rule to be above the first rule, so the traffic from the host is matched against it and is allowed to access the device on port 5000. All other traffic from the local network coming to port 5000 on the router will be dropped because it will match the second rule. For example, if port is set to 53 (a port used by DNS), only this host would be allowed to use DNS service running on the device. Similarly, if the ports are set to 80 and 443, only that specific IP address will be able to access the WebUI of the device.
   −
[[File:Networking rutos configuration example firewall traffic rules 5-3 v1.png|alt=Firewall two traffic rules to allow only a single host on one port enabled|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_5-3_v1.png|alt=Firewall two traffic rules to allow only a single host on one port enabled|frameless|800x800px]]
      Line 181: Line 188:  
By default, all the traffic from WAN to the router is rejected. A traffic rule can be configured to allow a specific IP address to access the WebUI of the router. It is a bad practice to allow all devices on the internet to be able to connect to the router, so only a single IP address will be able to do that in this example.
 
By default, all the traffic from WAN to the router is rejected. A traffic rule can be configured to allow a specific IP address to access the WebUI of the router. It is a bad practice to allow all devices on the internet to be able to connect to the router, so only a single IP address will be able to do that in this example.
   −
*In the '''‘Add type’''' field choose '''‘Open ports on router'''.
+
* In the '''‘Add type’''' field choose '''‘Open ports on router'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''TCP''' as the protocol.
 
*Choose '''TCP''' as the protocol.
*In the external port field, enter ports '''80''' and '''443 (HTTP(S))''' so that only the access to the WebUI is allowed. Click '''‘Add’'''.
+
* In the external port field, enter ports '''80''' and '''443 (HTTP(S))''' so that only the access to the WebUI is allowed. Click '''‘Add’'''.
[[File:Networking rutos configuration example firewall traffic rules 6-1 v1.png|alt=Firewall traffic rule to allow web access from WAN|none|thumb|800x800px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-1_v1.png|alt=Firewall traffic rule to allow web access from WAN|frameless|800x800px]]
       
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
 
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
   −
*In the source IP enter the IP address from which you want to be able to access the WebUI.
+
* In the source IP enter the IP address from which you want to be able to access the WebUI.
 
*Destination zone should be set to Device (input).
 
*Destination zone should be set to Device (input).
*In the destination IP address choose the IP address of the router.
+
* In the destination IP address choose the IP address of the router.
*In the action field choose '''‘Accept’'''.
+
* In the action field choose '''‘Accept’'''.
[[File:Networking rutos configuration example firewall traffic rules 6-2 v1.png|alt=Firewall traffic rule to allow web access from WAN configuration|none|thumb|617x617px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-2_v1.png|alt=Firewall traffic rule to allow web access from WAN configuration|frameless|617x617px]]
      Line 203: Line 212:  
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
   −
[[File:Networking rutos configuration example firewall traffic rules 6-3 v1.png|alt=Firewall traffic rule to allow web access from WAN enabled|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_6-3_v1.png|alt=Firewall traffic rule to allow web access from WAN enabled|frameless|800x800px]]
      Line 212: Line 221:  
===Block LAN network from accessing WAN on selected ports.===
 
===Block LAN network from accessing WAN on selected ports.===
 
In this scenario devices on the '''LAN''' will not be able to send traffic to '''WAN''' on selected ports.<br>
 
In this scenario devices on the '''LAN''' will not be able to send traffic to '''WAN''' on selected ports.<br>
*In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
+
* In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as the source zone.
 
*Choose '''LAN''' as the source zone.
Line 219: Line 228:       −
[[File:Networking rutos configuration example firewall traffic rules rutos configuration traffic rule1-10 v1.png|border|class=tlt-border]]
+
[[File:Networking rutos configuration example firewall traffic rules rutos configuration traffic rule1-10 v1.png|border|class=tlt-border|alt=|frameless|800x800px]]
    
<br>
 
<br>
Line 225: Line 234:     
*Select '''<nowiki/>'TCP+UDP'''' as protocol.
 
*Select '''<nowiki/>'TCP+UDP'''' as protocol.
*In the destination port field enter the range of ports you wish to deny (For example, '''‘1500-1700’'''), or list specific ports by leaving spaces in-between port numbers (For example, '''‘80 443'''’).
+
* In the destination port field enter the range of ports you wish to deny (For example, '''‘1500-1700’'''), or list specific ports by leaving spaces in-between port numbers (For example, '''‘80 443'''’).
*In the action field choose '''‘Drop’'''.<br>
+
* In the action field choose '''‘Drop’'''.<br>
 
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-11_v1.png|alt=Firewall traffic rule to block a range of ports|frameless|560x560px]]
[[File:Networking rutos configuration example firewall traffic rules 1-11 v1.png|alt=Firewall traffic rule to block a range of ports|none|thumb|560x560px]]
        Line 235: Line 243:  
Scroll down and press '''‘Save & Apply’'''.<br>
 
Scroll down and press '''‘Save & Apply’'''.<br>
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
 
The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.<br>
[[File:Networking rutos configuration example firewall traffic rules 1-12 v1.png|alt=Firewall traffic rule to block a range of ports enabled|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_1-12_v1.png|alt=Firewall traffic rule to block a range of ports enabled|frameless|800x800px]]
 +
 
 
<br>
 
<br>
 
In this scenario, the traffic coming from the '''LAN''' devices to '''WAN''' on any port from a range of '''1500-1700''' will be dropped. The '''‘Discard forward’''' indicates the action (drop). The slider on the right side shows that the rule is enabled.<br>
 
In this scenario, the traffic coming from the '''LAN''' devices to '''WAN''' on any port from a range of '''1500-1700''' will be dropped. The '''‘Discard forward’''' indicates the action (drop). The slider on the right side shows that the rule is enabled.<br>
 
===Block specific host on the LAN from accessing WAN on certain times.===
 
===Block specific host on the LAN from accessing WAN on certain times.===
 
In this scenario, a specific PC will not be able to send traffic to '''WAN''' during specified time periods. To block a certain PC, a '''MAC''' address is used. This is an address of a physical device and can belong to that device only. This is opposed to IP addresses, which can be easily changed.<br>
 
In this scenario, a specific PC will not be able to send traffic to '''WAN''' during specified time periods. To block a certain PC, a '''MAC''' address is used. This is an address of a physical device and can belong to that device only. This is opposed to IP addresses, which can be easily changed.<br>
*In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
+
* In the '''‘Add type’''' field choose '''‘Add new forward rule’'''.
 
*Enter a name of your choice for this rule.
 
*Enter a name of your choice for this rule.
 
*Choose '''LAN''' as source zone.
 
*Choose '''LAN''' as source zone.
 
*Choose '''WAN''' as destination zone.
 
*Choose '''WAN''' as destination zone.
 
*Click '''‘Add’'''.<br>
 
*Click '''‘Add’'''.<br>
[[File:Networking rutos configuration example firewall traffic rules 7-1 v1.png|alt=Firewall traffic rule to block host MAC on certain times|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-1_v1.png|alt=Firewall traffic rule to block host MAC on certain times|frameless|800x800px]]
 +
 
 
<br>
 
<br>
 
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
 
A new window will pop-out where you will be able to specify additional settings. You can also access these settings by finding your rule in the traffic rules and pressing a '''‘pencil’''' button to edit settings for that rule.
   −
*In the source '''MAC''' address choose the '''MAC''' address of the host to who the rule will apply. You can enter a custom MAC address.
+
* In the source '''MAC''' address choose the '''MAC''' address of the host to who the rule will apply. You can enter a custom MAC address.
*In the action field choose '''‘Drop’'''.
+
* In the action field choose '''‘Drop’'''.
*On weekdays you can choose on which days the rule will apply (The device will not be able to communicate). You can choose days of the month, start and stop times, and other time settings.
+
* On weekdays you can choose on which days the rule will apply (The device will not be able to communicate). You can choose days of the month, start and stop times, and other time settings.
[[File:Networking rutos configuration example firewall traffic rules 7-2 v1.png|alt=Firewall traffic rule to block host MAC on certain times configuration|none|thumb|825x825px]]
+
 
 +
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-2_v1.png|alt=Firewall traffic rule to block host MAC on certain times configuration|frameless|825x825px]]
       
<br>You can specify additional settings as you wish.<br>Scroll down and press '''‘Save & Apply’'''.<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
 
<br>You can specify additional settings as you wish.<br>Scroll down and press '''‘Save & Apply’'''.<br>The new rule is created and enabled. To verify, go to the last page in '''‘Traffic rules’''' and verify that the rule is configured correctly and is enabled.
   −
[[File:Networking rutos configuration example firewall traffic rules 7-3 v1.png|alt=Firewall traffic rule to block host MAC on certain times enabled|none|thumb|800x800px]]
+
[[File:Networking_rutos_configuration_example_firewall_traffic_rules_7-3_v1.png|alt=Firewall traffic rule to block host MAC on certain times enabled|frameless|800x800px]]
       
<br>
 
<br>
 
This rule indicates that the PC with mac address of '''00:00:5e:00:53:af''' will not be able to send traffic to '''WAN'''. The '''‘Discard forward’''' indicates the action (drop).  The rule does not show the times at which this rule is applied, but the times can be found on the settings page ('''‘Pencil’''' button). This rule will be applied for the first time on the 12th of February, 2023. Then, every Monday, Tuesday, Wednesday, Thursday, and Friday, from 8 AM to 4 PM this PC  will not be able to send traffic to '''WAN'''.
 
This rule indicates that the PC with mac address of '''00:00:5e:00:53:af''' will not be able to send traffic to '''WAN'''. The '''‘Discard forward’''' indicates the action (drop).  The rule does not show the times at which this rule is applied, but the times can be found on the settings page ('''‘Pencil’''' button). This rule will be applied for the first time on the 12th of February, 2023. Then, every Monday, Tuesday, Wednesday, Thursday, and Friday, from 8 AM to 4 PM this PC  will not be able to send traffic to '''WAN'''.