Does the order of Sophos UTM "Network Protection" firewall rules matter at all?!?!?!
On my sophos utm, the "Network Protection" firewall rules are as follows (summarizing)
Top Rule = deny PrivateIP#1... any protocol... to any external ip
(block PrivateIP#1 from reachign the internet)
<<<<<Additional Subsequent rules exist >>>>>
Rule#20 = permit all internal IPs... specfic protocol... to external ip address ranges
<<<<<Additional Subsequent rules exist >>>>>
Final Rule = Deny Any IP... any protocol... to any ip.
That said, I have logs indicating PrivateIP#1 is "allowed" on internet access via Rule#20 In the world of Cisco: ACLs are applied in order with early rules "deny any any any" superceding any other rules that follow which contradict
This thread was automatically locked due to age.