@subfire91:
Basically what i want to do is to have any access to internet but service specific access to other LANs
I had the same thought. I have yet to actually make my pfsense setup live (i'm pre-configuring so the transition is as quick as possible), but I had a similar issue coming from Sonicwall Logic to pfSense logic.
~~What i'm going to try, as I have multiple internal interfaces, is to do a 'default deny' where the rule is:
Deny: Protocol - Any; Source: (interface); Source Port: Any; Destination: !WAN
If my logic is right, that should deny any traffic not meant for the WAN, and then as said, add individual rules above that one for the specific stuff. As said I don't have the system implemented yet, but I may need to add an 'all access' rule below that one, so the processing goes:
1. Allow specifics
2. Deny non-WAN
3. Allow All
Rule 3 is important as I believe pfSense simply does nothing without a rule present, and since the Deny rule precedes the Allow, only WAN traffic should be allowed via rule 3.~~
Bah, scratch all that. Gruens I think has it right, as I forgot the 'WAN' in the dropdowns is for the actual WAN IP, not as a 'zone' kind of deal like on Sonicwalls.