So I’m helping a friend replace a stupid linksys router with a RB2011UAS-2Hnd-IN. They have a windows SBS server and two users who connect to that server through vpn. We set everything up with all the port forwards to the server including 1723. I think the port forward is fine because the other port forwards are fine. Since the vpn connection won’t work, I think I have to do something to forward gre too.
I’ve only used the web interface so far, so I’m looking for how to do it from the web interface.
I tried using nat like I would a port forward and just chose 47 for the protocal and left out the ports. That didn’t help.
Here’s how I have it set:
went to: ip, firewall, nat
set:
chain:dstnat, protocal:gre, in-interface:ether1-gateway, action:dst-nat, to addres: server
I tried to mess with the mangle menu from something someone else said, but that didn’t help either.
Under service ports pptp is enabled.
Can anyone help me pass gre through or suggest where else my issue might be? Thanks in advance!
I saw that when searching. I see you said to add:
“/ip firewall filter
add action=dst-nat chain=dstnat disabled=yes in-interface=ether1 protocol=gre
to-addresses=192.168.1.99
add action=dst-nat chain=dstnat disabled=yes dst-port=1723 in-interface=ether1
protocol=tcp to-addresses=192.168.1.99”
I have these already in my router:
/ip firewall nat
add action=dst-nat chain=dstnat dst-port=1723 in-interface=ether1-gateway \ protocol=udp to-addresses=192.168.16.3 to-ports=1723
add action=dst-nat chain=dstnat in-interface=ether1-gateway protocol=gre \ to-addresses=192.168.16.3
Are my two lines the same as yours? I see yours are under firewall filter. Does that make a difference? I don’t see an option for action=dst-nat under /ip firewall filter.
Your masquerade rules specifies the out-interface to your SFP port. Then on your dst-nat rules you specify your in-interface as ether1. If your WAN port is your SFP port then your dst-nat rules need to be using in-interface=ether1
I think you’re looking at a disabled masquerade rule. I have a disabled sfp1 one and an enabled ether1.
add action=masquerade chain=srcnat comment=“default configuration” disabled=\ yes out-interface=sfp1-gateway
add action=masquerade chain=srcnat comment=“default configuration” \ out-interface=ether1-gateway
So are my nat rules ok using ether1-gatway as the in-interface?