-
Notifications
You must be signed in to change notification settings - Fork 28
Open
Description
Expected behavior
Firewall rules are not redundant and as tight as possible.
Actual behavior
The rules for OPNSense firewall, App server network (interface OPT1) first block all traffic from OPT1 interface to LAN and OPT2 interface (rules 3 and 4 respectively), and later allow TCP traffic from OPT1 to all destinations (rule 5). Given that at this point the only remaining interface is WAN, and that OPNSense defaults to block unmatched traffic, wouldn't it be easier to drop rules 3 & 4 and tighten down rule 5 to only allow traffic to WAN interface? This would also help future-proofing in case of firewalls with more interfaces.
Additional information
There's a similar issue with OPT2 firewall rules.
Metadata
Metadata
Assignees
Labels
No labels