What is the best way to block network traffic from external network?
My router hap ax3 (v.7.20.6).
A cable from provider is connected to router's ether1 port.
The provider connects/authorizes via an l2tp tunnel, interface name freedom-l2tp.
So, what's the best way to block traffic from external network in firewall:
indicate ether1 in in. interface
or
indicate freedom-l2tp in in. interface (the interface from provider's L2TP authentication).
If your aim is to firewall your internal network from the WAN then what problems did you find with the default rules? Is there something else you are trying to do?
Seems that you however need them. They are very compact set of rules. You rather should add new ones relaxing good "deny me from the world offence" settings.
Not really sure what traffic you want to block but from my understanding you want to know which is better? Selecting the interface Eth1 or the L2TP?
If you have the L2TP on Ether 1 then you should select in and L2TP. Its the same when you do port forwarding and you have a PPPoE config then you have to select that as your Interface.
Best practice is to create a Address List or on Interface list and work with your Firewall rules based of that.
It's partialy true. A lot of traffic could happen on WAN's (Eth1) interface L2 level, traffic that comes from other routers connected to same L2TP concentrator.
Default config already uses interface lists (WAN in particular). If actual WAN setup doesn't match default (which uses ether1 as interface carrying IP traffic), then it's most often enough to adjust WAN interface list membership. In @bagas's particular case the L2TMP interface freedom-l2tp should be added as this will be the "normal" interface carrying IP traffic. Due to reasons outlined by @BartoszP it is very wise to include to WAN interface list also all interface underlying the "normal" IP-carrying interface ... in this particular case ether1 (which is there already by default). Similarly, when ISP requires use of PPPoE, one has to add pppoe-out1 (or whatever it's named) to WAN interface list ... but also the physical (e.g. ether1) interface, supporting that PPPoE tunnel, as well. If ISP uses tagged VLAN to transport IP (or any other tunnel), then add the corresponding VLAN interface to WAN interface list as well.
If there is an L2TP tunnel connection from an Internet provider, then what is the point of adding an physical port ether1 to the WAN for filtration firewall?
If traffic filtering occurs on the L2TP tunnel connection.