Nexapp - Rule
Rules
Firewall rules control how traffic is allowed, blocked, or monitored between different network zones. NexappOS uses zones to separate trusted internal networks from untrusted external networks (such as the Internet) and applies policies based on the rules you define.
Rules are evaluated top to bottom. The first matching rule wins, so ordering is critical to achieving the intended security behavior.
Rule Tabs
The Rules page is divided into three tabs, each dedicated to a specific traffic direction:
Forward Rules
Controls traffic moving between zones.
Example: LAN → WAN, LAN → DMZ, VPN → LAN.
Use this tab to define how internal, guest, DMZ, and VPN networks talk to each other.
Input Rules
Controls traffic destined to the NexappOS unit itself.
Example: allowing HTTPS management on port 9090 from LAN.
Use this tab to protect and limit access to services running on the gateway.
Output Rules
Controls traffic originating from NexappOS toward other zones.
Example: DNS queries, updates, monitoring traffic.
Use this tab to restrict or allow services started by the unit.
Add a New Rule
Click Add rule in the desired tab to create a new policy.
Complete the following fields:
Status
Enable or disable the rule.
New rules are enabled by default.Rule name
Provide a clear, descriptive label.
Example:Allow_LAN_to_WAN_HTTP,Block_Guest_to_LAN.Source address
Define where traffic comes from:- enter IPv4/IPv6 addresses, CIDR networks, or IP ranges
- choose a firewall object
- select Any
Not available in Output rules because the source is always NexappOS.
Source zone
Select the originating zone (LAN, WAN, Guest, DMZ, VPN, etc.) or choose Any.Destination address
Define where traffic is going:- enter IPv4/IPv6 addresses, CIDR networks, or IP ranges
- choose a firewall object
- select Any
Not available in Input rules because the destination is always NexappOS.
Destination zone
Select the target zone.
Source and destination zones cannot be the same.Destination service
Choose a predefined service or select Custom to specify ports and protocol manually.Action
Decide what NexappOS does when traffic matches:- Accept — allow traffic
- Reject — block and notify sender
- Drop — block silently (no sender notification)
Rule position
Choose where to place the rule in the list:- Top (higher priority)
- Bottom (lower priority)
Logging
Enable logging for matching packets.
Logged entries include the rule name as a prefix.Default rate: 1 log/sec per rule.
Adjust limits if needed (see below).Tags (optional)
Add tags for organization and filtering.
The tagautomatedis reserved for system-generated rules.
Logging Limits
Logging can be enabled on:
- zones
- firewall rules
- redirect rules (port forwards)
To prevent performance issues, NexappOS applies default log rate limits:
- Firewall rules: 1 log entry/second
- Zones: 5 log entries/second
- Redirect rules: 1 log entry/second
Change Default Logging Limits
Warning
Increasing log limits can affect system performance.
Change only when necessary.
Default values are stored under the ns_defaults firewall configuration:
zone_log_limitrule_log_limitredirect_log_limit
Example: increase zone logging to 10 logs/sec:
uci set firewall.ns_defaults.zone_log_limit="10/s"
uci commit firewall
Apply new defaults:
firewall-apply-default-logging
Previous page: NAT Next page: Traffic Objects and Services
::contentReference[oaicite:0]{index=0}