Your rule matches one destination IP address, not “a URL.” This is an important distinction because it won’t work in the face of dynamic DNS updates (short of a firewall reload) or more importantly in the face of services that use multiple servers so that one DNS name maps to potentially many IP addresses. Both problems may combine, as in the big cloud services, where doing a DNS lookup may give a different list of results from one minute to the next as the cloud continually reconfigures itself.
Combine that with your wish for “port 443,” which I feel safe in assuming means HTTPS, thus encryption, which means we can’t look inside the stream to find out where the user is trying to go. Search this forum for the many threads on blocking services like YouTube, Facebook, etc. This is not a trivial problem.
as well as associated subdomains.
If it’s a simple service with one IP per DNS subdomain name, you can list them one by one in your address list.
If the service uses a single IP address block, it would be more efficient to skip address lists and give the IP block in CIDR notation.
Either way, your rule isn’t doing a textual match on the URL. RouterOS firewall rules work on IP addresses at bottom, not on URLs, and even if they did, there’s no way to see the full URL in the face of encryption.
chain=input
>
All the above aside, you mean "forward" here, not "input". The input chain is for traffic destined for the router itself. (e.g. WinBox connections.) Traffic transiting the router is forwarded traffic.
\
\
<br>
> ```text
in-interface=nuroWAN
This is another likely error: as I read your problem, you’re trying to filter traffic going out the WAN interface, not in from it.
how could I have this rule apply to one IP rather than the entire network?
“src-address=192.168.88.99”