Yes, sure can. If I’m understanding what you want to do is to limit all Internet access so that it all goes thru the VPN, then it should be fairly straightfoward. Not exactly the typical setup, but certainly do-able.
If my understanding of what you want is correct, the additional rules will be something like this.
There are two separate network conditions that have to handled. One is for your LAN, so your PC can talk to your router. The other is restricting what leaves your PC, so that only traffic goes over the VPN.
One potential problem here, is that there isn’t a switch to flip (VPN on, do this. VPN off, do that). To do that kind of switching is to set up different CFP configurations. Different rule sets, and you’d have to do the switch manually. The details are in CFP, Miscellaneous → Manage My Configurations. Online help can give more details.
For the LAN traffic to and from your router, you’ll need a network zone defintion for MyLAN. You probably already have one, that CFP detected when it was installed. With that zone defined, you get these two rules:
Action: Allow
Protocol: IP
Direction: In/Out
Source Address: Zone[MyLAN]
Destination Address: Zone[MyLAN]
IP Details: Any
Action: Allow
Protocol: IP
Direction: In/Out
Source Address: Zone[MyLAN]
Destination Address: Zone[Multicast] Where zone is address range 224.0.0.0 thru 239.255.255.255
IP Details: Any
If you notice, these rules look exactly like the rules for the VPN. Just the network zone is different.
Now to restrict your PC to avoid talking to the Internet. There are some things needed from the Internet, so that at a minimum you can connect to the VPN server. So we need to punch some holes in the rules. To do that, we need to define a set of “Needed Ports”. Click Firewall → Common Tasks, My Ports, and Add a new set, called “Needed Ports”. Then add these ports
53 - needed for Internet name lookup
80 - web browser, so you can get to the outside world for help
443 - web browser secure connections
1723 - the VPN tunnel port, used by the PPTP protocol
You may need more, but we’ll find that out from the CFP logs. If the log says a needed port got blocked, just add that port number to the list of needed ports. But you need at least these to start with.
Action: Allow
Protocol: TCP/UDP (both TCP and UDP protocols need to be set, not just one or the other)
Direction: Out
Source Address: Zone[MyLAN]
Destination Address: Any
Source Port: Any
Destination Port: a set of ports: “Needed Ports”
Action: Block
Protocol: TCP/UDP (both TCP and UDP protocols need to be set, not just one or the other)
Direction: Out
Source Address: Zone[MyLAN]
Destination Address: Any
Source Port: Any
Destination Port: Any
Note the order of these two rules. Let out what we want, and block everything else. The direction is Out, because we’re catching traffic outbound from your PC. If things are being blocked and you get a problem, change the Block rule to an Allow rule, and that should get you reconnected. That’s a hazard with a block-all type rule.
Because things sometimes don’t work quite right, some server somewhere may need to tell your PC that “we’re down, try again later”. These are ICMP error messages. There are a lot of these, but only a few that we need to be concerned with. Since the rules for these are all the same, except for the detail, I’ll give a template:
Action: Allow
Protocol: ICMP
Direction: In - since it is from some server out somewhere
Source Address: Any
Destination Address: Any
ICMP Detail:
And the detail is “Port Unreachable”, “Host Unreachable”, “Time Exceeded”, “Fragmentation Needed”, and “Net Unreachable”. That’s 5 rules.
That’s 9 rules in all: 2 for the router, 2 to restrict your PC, and 5 for the error messages.
Does that do what you’re wanting to do?