No. You want to block the source IP, not the destination.
Also note the limitation mentioned by Martineau - this will protect you if you have forwarded ports, but not if the target is the router's built-in OpenVPN service.
I'm trying to restrict my outgoing and incoming network stream on the WAN side of the router to always go thru my OpenVPN server IP address on Port 443 (TCP) and not allow communications from the router WAN on any other ports nor with UDP protocol if possible. I would also like to block modem access from my LAN as well. For a few devices (e.g. TVs), I would like run these particular devices without the constraints above. In attempt to achieve these objectives I'm doing the following:
1) On the VPN/VPN Server/Traffic Redirect with Strict Policy Rules, I'm using the following VPN Traffic Routing Rules:
Rules for routing client traffic through the tunnel (Max Limit : 100)
Description Source IP Destination IP Iface
Default VPN out 192.168.xxx.0/24 0.0.0.0 VPN
Default VPN in 0.0.0.0 192.168.xxx.0/24 VPN
TV out <TV IP address> 0.0.0.0 WAN
TV in 0.0.0.0 <TV IP address> WAN
2) On the Firewall/Network Services Filter I'm using a whitelist (rather than blacklist) with the following Firewall Routing Table Rules:
Source IP Port Range Dest IP Port Range Protocol
192.168.xxx.0/24 443 <VPN IP> 443 TCP
<VPN IP> 443 192.168.xxx.0/24 443 TCP
With this implementation, I can still ping my modem address 192.168.100.1 from my LAN. What am I doing wrong, do I not properly understand the whitelist, or is there a better way to achieve my objectives?
Also, I've read opinions about leaving OpenVPN running continuously on the ASUS router that suggest this configuration may not be so secure. I would be interested in hearing thoughts on an additional ethernet restricted (no wi-fi) OpenVPN router behind the ASUS router in terms of whether this will provide any additional security for keeping a continuous OpenVPN connection(s) running between my Home Router and the OpenVPN server particularly for more sensitive data streams?
Thanks in advance for the transparent open source firmware solution and the community of support for helping solve this type of issue. I'm a believer!
Lancairone