We have a new RB3011UiAS, version 6.33.5
The networks is very simple: we have one fixed wan address, and the local network is 10.0.0.0/24
We sightly modified the default configuration:
- we allow smtp inbound connection on port 25, with dstnat. That’s all.
So the firewall opened outbound without restriction, for inbound only smtp allowed.
The NAT rules:
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; default configuration
chain=srcnat action=masquerade out-interface=ether1-gateway log=no log-prefix=“”
1 ;;; Port forwarding SMTP to email server
chain=dstnat action=dst-nat to-addresses=10.0.0.2 to-ports=25 protocol=tcp in-interface=ether1-gateway dst-port=25 log=no log-prefix=“”
The Filter rules:
0 D ;;; special dummy rule to show fasttrack counters
chain=forward
1 ;;; default configuration
chain=input action=accept protocol=icmp log=no log-prefix=“”
2 ;;; default configuration
chain=input action=accept connection-state=established,related log=no log-prefix=“”
3 ;;; default configuration
chain=input action=drop in-interface=ether1-gateway log=yes log-prefix=“dropped”
4 ;;; default configuration
chain=forward action=fasttrack-connection connection-state=established,related log=no log-prefix=“”
5 ;;; default configuration
chain=forward action=accept connection-state=established,related log=no log-prefix=“”
6 ;;; default configuration
chain=forward action=drop connection-state=invalid log=no log-prefix=“”
7 ;;; default configuration
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface=ether1-gateway log=no log-prefix=“”
The problems is that we see that filter rule 3. dropping some packets for a srcnat connection:
07:50:44 firewall,info dropped input: in:ether1-gateway out:(none), src-mac 00:25:2e:0e:33:77, proto TCP (ACK), 217.110.97.197:80->[our wan ip]:50609, len 40
07:52:15 firewall,info dropped input: in:ether1-gateway out:(none), src-mac 00:25:2e:0e:33:77, proto TCP (RST), 216.58.209.174:80->[our wan ip]:55436, len 40
All of the above dropped packets by the input chain is related to an existing legit srcnat connection.
I don’t understand this, what is wrong with rule 3? Why it drops incoming packets for a masquarde srcnat connection?