{% extends "base.html" %} {% load i18n %} {% block content %}
This interface serves as a comprehensive tool for managing firewall rules, enabling users to implement advanced traffic policies between VPN peers and networks. It simplifies establishing firewall rules, packet filtering, and NAT configurations, allowing for precise control over network security. Users can define source and destination IP addresses, ports, protocols, and actions to tailor traffic flow, ensuring a secure and efficient networking environment.
You have the option to apply this rule to a specific IP address or network and/or to multiple peers. Enabling the "Include peer networks" option will automatically include all Allowed IPs associated with each selected peer. Please note that selecting multiple peers with included networks on both the source and destination ends may result in a rapid increase in the number of firewall rules generated, depending on your configuration. The "Not Source" option negates the selected source IP, network, or peer(s).
You have the option to apply this rule to a specific IP address or network and/or to multiple peers as the destination. Enabling the "Include peer networks" option will automatically include all Allowed IPs associated with each selected peer as the destination. Please note that selecting multiple peers with included networks on both the source and destination ends may result in a rapid increase in the number of firewall rules generated, depending on your configuration. The "Not Destination" option negates the selected destination IP, network, or peer(s).
Only the most commonly used protocols are listed here. If you require a specific protocol, please open an issue on GitHub. Selecting TCP+UDP will result in the duplication of generated rules. Ports can be specified as single numbers (e.g., 8080) or as ranges (e.g., 8001:8999).