I made a simple drop-rule (realy barebone, for sake of simplicity):
Source zones: LAN
Source networks and devices: ANY
Destination zones: WAN
Destination networks: one FQDN host (its actually the address of a VPN-server)
Services: any
If I enable the rule, then my cisco vpn client can't connect to the vpn anymore, which proofs the rule is working.
Then I cloned that rule, changed 'drop' into 'allowed' mode and put it in the order of rules at the very top.
(Neither scanning nor web- or appfilters are applied)
Oddly enough, despite having the allow-rule enabled, I couldn't connect to the vpn! I would have assumed the allow-rule to cancel the drop-rule completely.
When checking with policy tester, connecting to vpn is marked as allowed.
What's happening here? How can I achieve a complete override?
(Just in case, if you wonder "what the heck is he doing with such a sensless setup?": in the end, the allow-rule will have traffic shaping enabled)
SFOS 17.5.12 MR-12
This thread was automatically locked due to age.