I have removed the duplicate entries and adjusted them accordingly. Now there is traffic on the 10000-20000 rule.
But unfortunately I still don’t have any sound
172.16.2.20 is my Fritzbox with Expost Host. So it is only used as a modem.
Here is the log:
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28721->172.16.2.20:5061, len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28721->172.16.2.20:5061, len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28721->172.16.2.20:5061, len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28721->192.168.155.5:5061, NAT 80.187.64.160:28721->(172.16.2.20:5061->192.168.
155.5:5061), len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28721->192.168.155.5:5061, NAT 80.187.64.160:28721->(172.16.2.20:5061->192.168.
155.5:5061), len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28721->192.168.155.5:5061, NAT 80.187.64.160:28721->(172.16.2.20:5061->192.168.
155.5:5061), len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28739->172.16.2.20:5222, len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28739->172.16.2.20:5222, len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28739->172.16.2.20:5222, len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28739->192.168.155.5:5222, NAT 80.187.64.160:28739->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28739->192.168.155.5:5222, NAT 80.187.64.160:28739->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28739->192.168.155.5:5222, NAT 80.187.64.160:28739->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28741->172.16.2.20:5222, len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28741->172.16.2.20:5222, len 60
13:39:37 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28741->172.16.2.20:5222, len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28741->192.168.155.5:5222, NAT 80.187.64.160:28741->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28741->192.168.155.5:5222, NAT 80.187.64.160:28741->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:37 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:28741->192.168.155.5:5222, NAT 80.187.64.160:28741->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:47 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto UDP, 3.124.97.151:32099->172.16.2.20:11016, len 48
13:39:47 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto UDP, 3.124.97.151:32099->172.16.2.20:11016, len 48
13:39:47 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto UDP, 3.124.97.151:32099->172.16.2.20:11016, len 48
13:39:47 firewall,info RTP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto UDP, 3.124.97.151:32099->192.168.155.5:11016, NAT 3.124.97.151:32099->(172.16.2.20:11016->192.168.155.5:1
1016), len 48
13:39:47 firewall,info RTP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto UDP, 3.124.97.151:32099->192.168.155.5:11016, NAT 3.124.97.151:32099->(172.16.2.20:11016->192.168.155.5:1
1016), len 48
13:39:47 firewall,info RTP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto UDP, 3.124.97.151:32099->192.168.155.5:11016, NAT 3.124.97.151:32099->(172.16.2.20:11016->192.168.155.5:1
1016), len 48
13:39:49 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (ACK,PSH), 80.187.64.160:28739->172.16.2.20:5222, len 71
13:39:49 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (ACK,PSH), 80.187.64.160:28739->172.16.2.20:5222, len 71
13:39:49 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (ACK,PSH), 80.187.64.160:28739->172.16.2.20:5222, len 71
13:39:49 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (ACK,PSH), 80.187.64.160:28739->192.168.155.5:5222, NAT 80.187.64.160:28739->(172.16.2.20:5222->192.
168.155.5:5222), len 71
13:39:49 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (ACK,PSH), 80.187.64.160:28739->192.168.155.5:5222, NAT 80.187.64.160:28739->(172.16.2.20:5222->192.
168.155.5:5222), len 71
13:39:49 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (ACK,PSH), 80.187.64.160:28739->192.168.155.5:5222, NAT 80.187.64.160:28739->(172.16.2.20:5222->192.
168.155.5:5222), len 71
13:39:52 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:29330->172.16.2.20:5222, len 60
13:39:52 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:29330->172.16.2.20:5222, len 60
13:39:52 firewall,info VOIP_NAT dstnat: in:WAN1 out:(unknown 0), connection-state:new src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:29330->172.16.2.20:5222, len 60
13:39:52 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:29330->192.168.155.5:5222, NAT 80.187.64.160:29330->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:52 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:29330->192.168.155.5:5222, NAT 80.187.64.160:29330->(172.16.2.20:5222->192.168.
155.5:5222), len 60
13:39:52 firewall,info VOIP forward: in:WAN1 out:VLAN_100, connection-state:new,dnat src-mac c8:0e:14:7d:88:b4, proto TCP (SYN), 80.187.64.160:29330->192.168.155.5:5222, NAT 80.187.64.160:29330->(172.16.2.20:5222->192.168.
155.5:5222), len 60
/ip firewall connection tracking
set enabled=yes udp-timeout=10s
/ip firewall filter
add action=accept chain=input comment="Allow established and related connections" connection-state=established,related
add action=accept chain=forward comment="Allow established and related connections" connection-state=established,related
add action=accept chain=input comment="Allow Ping from local networks" protocol=icmp src-address-list=local
add action=accept chain=input comment="Allow DNS only from local networks" dst-port=53 protocol=udp src-address-list=local
add action=add-src-to-address-list address-list=ssh_stage1 address-list-timeout=5m chain=input comment="SSH First attempt" connection-state=new dst-port=31133 protocol=tcp
add action=add-src-to-address-list address-list=ssh_stage2 address-list-timeout=15m chain=input comment="SSH Second attempt" connection-state=new dst-port=31133 protocol=tcp
add action=add-src-to-address-list address-list=ssh_stage3 address-list-timeout=1h chain=input comment="SSH Third attempt" connection-state=new dst-port=31133 protocol=tcp
add action=accept chain=input comment="Allow SSH from non-blacklisted sources and only from local networks" dst-port=31133 protocol=tcp src-address-list=local
add action=add-src-to-address-list address-list=winbox_stage1 address-list-timeout=5m chain=input comment="Winbox First attempt" connection-state=new dst-port=8291 protocol=tcp
add action=add-src-to-address-list address-list=winbox_stage2 address-list-timeout=15m chain=input comment="Winbox Second attempt" connection-state=new dst-port=8291 protocol=tcp
add action=add-src-to-address-list address-list=winbox_stage3 address-list-timeout=1h chain=input comment="Winbox Third attempt" connection-state=new dst-port=8291 protocol=tcp
add action=accept chain=input comment="Allow Winbox from non-blacklisted sources and only from local networks" dst-port=8291 protocol=tcp src-address-list=local
add action=accept chain=input comment="Allow HTTPS_ROUTER_Intern" dst-port=1443 protocol=tcp src-address-list=local
add action=accept chain=input comment="Allow SNMP" dst-port=161 protocol=udp src-address-list=local
add action=accept chain=input comment="Allow Wireguard" dst-port=45003,55003 in-interface-list=WAN protocol=udp
add action=accept chain=forward comment="Allow Wireguard to VLAN_100" dst-address=!10.45.250.0/24 in-interface=wg0 out-interface=VLAN_100
add action=accept chain=forward comment="Allow VLAN_100 to Wireguard" dst-address=!10.45.250.0/24 in-interface=VLAN_100 out-interface=wg0
add action=accept chain=forward comment="Allow IOT to Firma" dst-address-list=Firma src-address-list=IOT
add action=accept chain=forward comment="Allow Firma to IOT" dst-address-list=IOT src-address-list=Firma
add action=drop chain=input comment="Drop invalid packets" connection-state=invalid
add action=drop chain=input comment="Drop all other input traffic"
add action=accept chain=forward comment="Allow RTP (VoIP) traffic" connection-nat-state="" dst-address=192.168.155.5 dst-port=10000-20000 protocol=udp
add action=accept chain=forward comment=Phone connection-nat-state="" dst-address=192.168.155.5 dst-port=5060 log=yes log-prefix=5060 protocol=tcp
add action=accept chain=forward comment=Phone connection-nat-state="" dst-address=192.168.155.5 dst-port=5060 log=yes log-prefix=5060 protocol=udp
add action=accept chain=forward comment=Phone connection-nat-state="" dst-address=192.168.155.5 dst-port=5061 log=yes log-prefix=5061 protocol=tcp
add action=accept chain=forward comment=Phone connection-nat-state="" dst-address=192.168.155.5 dst-port=5222 log=yes log-prefix=5061 protocol=tcp
add action=accept chain=forward comment="Allow Camera" connection-nat-state=dstnat dst-address=172.16.1.10 dst-port=4311 protocol=tcp
add action=accept chain=forward comment="Accept other dst-nat connections" connection-nat-state=dstnat
add action=drop chain=forward comment="Drop invalid packets" connection-state=invalid disabled=yes
add action=drop chain=forward comment="Drop all other forward traffic" disabled=yes
/ip firewall nat
add action=dst-nat chain=dstnat comment=Opensense dst-port=443 in-interface=WAN1 protocol=tcp to-addresses=192.168.252.253 to-ports=443
add action=dst-nat chain=dstnat comment=Starface dst-port=5222 in-interface=WAN1 protocol=tcp to-addresses=192.168.155.5 to-ports=5222
add action=dst-nat chain=dstnat comment=Starface dst-port=5061 in-interface=WAN1 protocol=tcp to-addresses=192.168.155.5 to-ports=5061
add action=dst-nat chain=dstnat comment=Starface dst-port=5060 in-interface=WAN1 protocol=udp to-addresses=192.168.155.5 to-ports=5060
add action=dst-nat chain=dstnat comment="Starface RTP" dst-port=10000-20000 in-interface=WAN1 log=yes log-prefix=RTPNAT protocol=udp to-addresses=192.168.155.5
add action=dst-nat chain=dstnat comment="Cloud Backup" dst-port=45225 in-interface=WAN1 protocol=tcp to-addresses=192.168.155.65 to-ports=22
add action=dst-nat chain=dstnat comment=Camera dst-port=4311 in-interface=WAN1 protocol=tcp to-addresses=172.16.1.10 to-ports=4311
add action=masquerade chain=srcnat comment="Masquerade Outgoing Traffic on WAN1" out-interface=WAN1
add action=masquerade chain=srcnat comment="Masquerade Outgoing Traffic on WAN2" out-interface=WAN2
/ip firewall service-port
set sip disabled=yes