This is expected. Twingate isn’t acting as a firewall.
Your rule states that Twingate will not grant access to that resource using those protocols.
Your machine then goes to the next access method and likely succeeds.
Share the use-case in more detail. How would you want to use this in the real-world?