I just switched to a Mikrotik RB3011 from an Asus router. I have an unraid server and desktop behind a Mikrotik CRS305 which is bridged to the RB3011 which has a dsl modem in bridged mode connected to eth1. When I was still using the Asus router I had ports 80 and 443 forwarded to ports 180 and 1443 on the Unraid server ip 192.168.1.245 for the purpose of access to the outside world for services like Sonarr via letsencrypt and nginx. This was all working fine with the Asus router but I haven’t been able to get it working with my Mikrotik router. One of the subdomains I am trying to reach is sonarr.jerseyknoll.com. If I try to use https I receive the following error. This site can’t provide a secure connection sonarr.jerseyknoll.com uses an unsupported protocol.
ERR_SSL_VERSION_OR_CIPHER_MISMATCH. If I try to use HTTP I get the WebFig login page for my router. Please let me know what I can post to help troubleshoot. Thanks in advance.
/ip address print detail
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; defconf
address=192.168.88.1/24 network=192.168.88.0 interface=ether2
actual-interface=bridge
1 D address=72.161.250.66/32 network=72.161.250.1 interface=pppoe-out1
actual-interface=pppoe-out1
/ip route print detail
Flags: X - disabled, A - active, D - dynamic,
C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme,
B - blackhole, U - unreachable, P - prohibit
0 ADS dst-address=0.0.0.0/0 gateway=pppoe-out1
gateway-status=pppoe-out1 reachable distance=1 scope=30 target-scope=10
1 ADC dst-address=72.161.250.1/32 pref-src=72.161.250.66 gateway=pppoe-out1
gateway-status=pppoe-out1 reachable distance=0 scope=10
2 ADC dst-address=192.168.88.0/24 pref-src=192.168.88.1 gateway=bridge
gateway-status=bridge reachable distance=0 scope=10
/interface print detail
Flags: D - dynamic, X - disabled, R - running, S - slave
0 R name="ether1" default-name="ether1" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:23
last-link-up-time=aug/09/2019 16:58:37 link-downs=0
1 RS name="ether2" default-name="ether2" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:24
last-link-up-time=aug/09/2019 16:58:37 link-downs=0
2 S name="ether3" default-name="ether3" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:25 link-downs=0
3 S name="ether4" default-name="ether4" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:26 link-downs=0
4 S name="ether5" default-name="ether5" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:27 link-downs=0
5 S name="ether6" default-name="ether6" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:29 link-downs=0
6 RS name="ether7" default-name="ether7" type="ether" mtu=1500 actual-mtu=1500
l2mtu=1598 max-l2mtu=8156 mac-address=74:4D:28:30:C7:2A
/ip firewall export
# aug/09/2019 20:19:13 by RouterOS 6.45.3
# software id = W44L-WQN2
#
# model = RouterBOARD 3011UiAS
# serial number = 8EEE0A0F8170
/ip firewall filter
add action=accept chain=forward comment=PLEX dst-port=32400 in-interface=\
pppoe-out1 protocol=tcp
add action=accept chain=forward comment=PLEX dst-port=32400 in-interface=\
pppoe-out1 protocol=udp
add action=accept chain=forward dst-port=80 in-interface=pppoe-out1 protocol=\
tcp
add action=accept chain=forward dst-port=443 in-interface=pppoe-out1 protocol=\
tcp
add action=accept chain=forward comment="Allow Port Forwarding - DSTNAT" \
connection-nat-state=dstnat
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" \
connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=dst-nat chain=dstnat dst-port=32400 in-interface=pppoe-out1 \
protocol=tcp to-addresses=192.168.88.245 to-ports=32400
add action=dst-nat chain=dstnat dst-port=32400 in-interface=pppoe-out1 \
protocol=udp to-addresses=192.168.88.245 to-ports=32400
add action=dst-nat chain=dstnat comment=Letsencrypt dst-port=80 in-interface=\
pppoe-out1 protocol=tcp to-addresses=192.168.88.245 to-ports=180
add action=dst-nat chain=dstnat comment=Letsencrypt dst-port=443 in-interface=\
pppoe-out1 protocol=tcp to-addresses=192.168.88.245 to-ports=1443
add action=masquerade chain=srcnat comment="defconf: masquerade" ipsec-policy=\
out,none out-interface-list=WAN
