I thought, if the web-frontend of the switch in OPT1 is "answering" to a connection, that is started from the LAN, then this blocking rule does not apply (?)
As stated before, it doesn't work the same way as NAT does.
For sure, packets that have passed a rule on the outgoing network (e.g. LAN/OPT1) will not have to go through the rules of the destination network.
But now comes the important part: You are sending a packet/request from a client to your switch. The switch has to be able to answer to this request and this answer is just another packet. It's not handled differently by m0n0wall because it is a response. But because it's from another network you have to have rules for this scenario on both networks.
I'm sure there are many firewall guides that explain this much better than I can.
BTW2: Is it possible, that the problem has something to do with default gateways? How does m0n0wall handle them? My idea is, that not the rules are the reason for not working, but that the answering packets of the switch are sent to internet instead to lan?
You should have no problems with that as long as your clients and your switch have m0n0wall as their gateway.
Blocking is from Internet-PCs only to LAN, so incoming connections from LAN should not be blocked by this (?).
The last rule allows everything - primarily for internet access, but also incoming connections from LAN should be allowed by this (?)
The rule above (LAN to switch GUI 192.168.1.5) is for testing only. It shouldn't be neccessary because of the last rule.
Firewall rules are always for incoming packets from m0n0wall's perspective. This "LAN to 192.168.1.5" rule has no effect on incoming packets from LAN. For that you'd have to use the LAN tab.
It's important that you understand:
1. Packets from your client in OPT1 to your switch in LAN are handled on the OPT1 tab because they are incoming packets seen from m0n0wall's perspective on the OPT1 network.
2. Packets from your switch in LAN to your client in OPT1 are handled on the LAN tab because they are incoming packets seen from m0n0wall's perspective on the LAN network.
This means you have to have two rules but on different networks. One that allows packets to your switch and one that allows packets to your clients:
1. OPT1:
Proto | Source | Port | Destination | Port |
* | OPT1 network | * | <ip of your switch in LAN> | * |
2. LAN:
Proto | Source | Port | Destination | Port |
* | <ip of your switch in LAN> | * | OPT1 network | * |
And these rules have to be above any rule that would block these packets. In your case that means above your rejecting rules.
I hope this clears things up a bit.
I could explain it in German as well if you want me to.
Edit: The switch is in the LAN network... sorry.