Hi,
I have the same problem without VLAN's. I have tried to add traffic rules and iptables, but still the clients which should be dropped are allowed to access WAN. Here is my iptables. The first seven are the ones that should be blocked.
I think there is some major bug in the RUTX firewall. I have RUTX11.
[email protected]:~# iptables -t filter -L FORWARD --line-numbers -n -v
Chain FORWARD (policy DROP 0 packets, 0 bytes)
num pkts bytes target prot opt in out source destination
1 0 0 DROP all -- * wwan0 10.77.20.2 0.0.0.0/0
2 0 0 DROP all -- * wwan0 10.77.20.3 0.0.0.0/0
3 0 0 DROP all -- * wwan0 10.77.20.4 0.0.0.0/0
4 0 0 DROP all -- * wwan0 10.77.20.5 0.0.0.0/0
5 0 0 DROP all -- * wwan0 10.77.20.195 0.0.0.0/0
6 0 0 DROP all -- * wwan0 10.77.20.196 0.0.0.0/0
7 0 0 DROP all -- * wwan0 10.77.20.197 0.0.0.0/0
8 3403 1301K forwarding_rule all -- * * 0.0.0.0/0 0.0.0.0/0 /* !fw3: Custom forwarding rule chain */
9 3357 1289K ACCEPT all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate RELATED,ESTABLISHED /* !fw3 */
10 0 0 DROP all -- * * 0.0.0.0/0 0.0.0.0/0 ctstate INVALID /* !fw3 */
11 36 11207 zone_lan_forward all -- br-lan * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */
12 0 0 zone_wan_forward all -- eth1 * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */
13 0 0 zone_wan_forward all -- wwan0 * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */
14 0 0 zone_wan_forward all -- qmimux0 * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */
15 10 700 zone_openvpn_forward all -- tun_+ * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */
16 0 0 reject all -- * * 0.0.0.0/0 0.0.0.0/0 /* !fw3 */