Thanks a lot for making this clear to me.
But I would have another very interesting (and at the moment theoretical) question: The documentation says "These firewall rules are appended to the existing outbound rules".
My current ruleset has the following structure:
{"protocol" | udp | "srcPort" | Any | "srcCidr" | Any | "destPort" | 53 | "destCidr" | Any | "policy" | allow | "syslogEnabled" | false | "comment" | DNS for FQDN support} |
{"protocol" | tcp | "srcPort" | Any | "srcCidr" | Any | "destPort" | 80,443 | "destCidr" | *.microsoft.com | "policy" | allow | "syslogEnabled" | false | "comment" | HTTP[S] to MS} |
{"protocol" | any | "srcPort" | Any | "srcCidr" | Any | "destPort" | Any | "destCidr" | Any | "policy" | deny | "syslogEnabled" | false | "comment" | Default catch-all other traffic} |
{"protocol" | Any | "srcPort" | Any | "srcCidr" | Any | "destPort" | Any | "destCidr" | Any | "policy" | allow | "syslogEnabled" | false | "comment" | Default rule} |
(rule #2 has been capped for demo purposes)
That said my question would be: Where are the Cellular Failover Rules "appended"?
- Before or after rule #4 (which is the default rule that cannot be changed)?
- Before or after rule #3 (which I had to insert in order to block unwanted outgoing traffic: I'm not very happy with the default rule #4 -- this is NOT the best practice for firewalls)?
How can I control this? How can the Cellular Failover Rules do what they're supposed to do (e.g. deny traffic to microsoft.com, because you don't want to update your device using an expensive cellular service billed by volume)?
Rgds, Andreas