PunchCardBoss
Senior Member
YEAAAA. I cannot begin to describe how happy I am when I saw your reply. I think I've finally got it.You don't need to say "outbound" because all traffic is going to be outbound.
For your port 445 example: "Blocks TCP traffic to port 445 at any address on the WAN".
Your 192.168.100.200 example is ambiguous. If your LAN is 192.168.100.x then it's wrong, otherwise it's OK.
Your 93.158.145.28 example is invalid because it's not a local address.
For the longest time, I have been looking at the NSF from purely a theoretical point of view. And (if I may presume), your comments are from a practical use-case point of view. And (I think) I now understand why beginners have so many problems understanding and asking for NSF help.
I don't claim to understand every comment you have made, but I now understand a bunch of them.
So, I have been writing and re-writing my document many times as I go through this learning curve. So, here is what I have written so far for a novice audience. It is still a work in progress. Please critique and comment.
=================================================
A Guide for Asus Router “Network Service Filter” Deny List
General Description:
All communication packets entering a router contain Source and Destination information (https://www.techrepublic.com/article/exploring-the-anatomy-of-a-data-packet/) . Your router reads this information to know where a communication packet comes from (source or origin) and where it is to be “routed” (destination). The Network Service Filter (NSF) has the ability to block the routing of communication packets. Thus, it is often referred to as an “outbound” filter.
The Asus NSF found under the Firewall menu is one of the most powerful filters. Whereas the Firewall filter blocks inbound traffic by domain names or specific words, the NSF blocks outbound communication packets by IP address and/or port number.
It is important to note that the majority of communication packets originating from WAN will not have an IP address. Packets originating from a static WAN IP may be the only use-case exception. And even in this remote situation, an NSF record using just a Destination IP and/or Port Range will be effective.
Similarly, a WAN Destination IP field is equally rare. Thus, for the vast majority of use-cases, the NSF is used for LAN-to-LAN filtering. Destination IP and/or Port Range are the most common fields used for a filter.
The Filter
The Asus NSF has 4 fill-in-the-blank fields plus a Protocol drop-list field. In this document, one row of fields is referred to as a “record” and represents a filter criterion. From a logic perspective, each field operator is an “AND” (not “OR”) logic condition. In other words, every non-blank field must be found in a communication packet for a filter record to apply. Further, an NSF record may (indeed often) consist of a single field entry that adequately defines a unique deny condition.
Lastly, observe that the Asus NSF has two “Port Range” field labels. To differentiate them in this document, the term “External” and “Internal” have been added. The External Port Range is associated with a Source IP whereas the Internal Port Range is associated with a Destination IP.
------------------------------------------------------------------------