Using a RB450G (sw 6.43) in front of my home networks. Im on a cable connection where I get assigned a new Ip address once in a while. I have a dyn-dns service to follow me around.
One of the machines is a docker host with a bunch of web services on, all having individual public DNS records.
I would like these services accessible both from the outside world, but also from the inside.
For inside connections to your own servers (but for some strange reason want to use the public wan ip address) the typical answer is to use hairpin-nat.
There is another option i don’t quite understand but it has to do with routing the traffic… directly to the server.
/ip route rule
add action=lookup dst-address=<an IP not sure which one???> table= main???
In a separate thread somewhere around I read that one way would be:
activate /ip cloud set ddns-enabled=yes update-time=no (for time it is better to use ntp)
create a mypublicip firewall address.list with the .sn.mynetname.net dns name: /ip firewall address-list add address=[/ip cloud get dns-name] list=myip
use this address list in the firewall rules, substituting dst-address=88.77.66.55 → dst-address-list=mypublicip
You obviously could do the same with whatever dynamic dns you are using, instead… Works quite well in practice