Correct, you will need to remove the LAN forwarding from the VPN zone in order to make the LAN network unreachable from the VPN. To do so, edit the openvpn → LAN zone, and at the bottom you’ll see a field Allow forward to destination zones. Remove LAN from this field.
Since you want to still be able to access the RUTX08 GUI, I suggest setting the INPUT chain to Accept. This way you should be able to access the RUTX08 using it’s VPN tunnel IP address, but not the LAN network.
Let me know if any additional information is needed!
The Input/Output/Forward flags symbolize the following as per the WebUI:
Input - Default policy for traffic entering the zone. So if this flag is set to Accept, you’d be able to reach the WebUI of the device using it’s WAN IP address:
However, the packets to the LAN zone will be rejected (don’t forget that a static route is needed on the uplink router):
Output - Default policy for traffic originating from and leaving the zone. This is quite self explanatory - packets from other zones (that can forward to WAN zone) are allowed to exit via this zone, usually, to the internet.
Forward - Default policy for traffic forwarded between the networks belonging to the zone. Let’s say you have multiple networks assigned to the WAN zone (e.g. two wired WANs configured for Failover). Setting this flag to Accept will simply allow to forward the packets between these WAN networks.
Now for the LAN zone to be reachable from WAN, you need to allow WAN zone to forward ALL packets with destination address within the LAN zone to the LAN network. Coming back to my Input chain example, without WAN → LAN forwarding, from WAN I will not be able to reach my PC in LAN:
Is mainly correct. Points 1 and 2 are very similar, but is none of these are satisfied, and if a firewall rule is not available, then the packet will be rejected (different than dropped).