Hi Guys! hope everybody is well.
So I’ve taken over for a guy that built up a rather complex ( complex for me anyway ) network with a client and i am struggling to actually figure the issue out here.
Company A requires certain traffic to go through 2 ports on the Mik coming from their application that users on the network run.
Now suddenly out of the blue, replication stopped and the isp is insisting that the issue is not on their side.
I can see the ports are open on the firewall however they are only getting traffic through port 3050 and not port 65198.yet the rules are exactly the same.
Im very new to mikrotik firewalls and there is quite a bit of routing happening on this device.
If somebody could help me out id be greatly in your debt.
My firewall looks like this:
add action=accept chain=input comment="Allow acces to the router from Lan Using an address list" src-address-list=Lan-List
add action=add-src-to-address-list address-list=port:2111 address-list-timeout=1m chain=input comment="1st Port knock" dst-port=2111 protocol=tcp
add action=add-src-to-address-list address-list="Secure Winbox" address-list-timeout=1m chain=input comment="2nd Port Knock" dst-port=1112 protocol=tcp src-address-list=port:2111
add action=accept chain=input comment="WINBOX Remote | With knocking and secure list" dst-port=8291 protocol=tcp src-address-list="Secure Winbox"
add action=accept chain=input comment="WINBOX Remote" disabled=yes dst-port=8291 in-interface-list=internet protocol=tcp
add action=accept chain=input comment="WINBOX from Local Network" dst-port=8291 in-interface=bridge1 protocol=tcp
add action=accept chain=input comment=SNMP dst-port=161 protocol=udp
add action=accept chain=forward comment="CompanyA" dst-port=65198,3050 in-interface-list=internet protocol=tcp
add action=accept chain=forward comment="CompanyA" disabled=yes dst-port=65198,3050 in-interface=bridge1 protocol=tcp
add action=accept chain=forward comment="CompanyA" dst-port=80 in-interface-list=internet protocol=tcp
add action=accept chain=forward comment="CompanyA" dst-port=443 in-interface-list=internet protocol=tcp
add action=accept chain=input disabled=yes in-interface-list=internet protocol=ipsec-esp
add action=accept chain=input comment=Ping protocol=icmp
add action=accept chain=forward comment="Allow connections from LAN" connection-state=new in-interface=bridge1
add action=accept chain=forward comment="Allow established Connections" connection-state=established
add action=accept chain=forward comment="Allow related connections" connection-state=related
add action=accept chain=input comment="Allow estblished and related connections to the router" connection-state=established,related
add action=accept chain=forward disabled=yes dst-address=192.168.13.145 in-interface=*11 out-interface=bridge1
add action=drop chain=forward comment="Drop all other traffic through the router"
add action=drop chain=forward comment="Drop all invaild connections" connection-state=invalid
add action=drop chain=input comment="Drop all other traffic to the router"
/ip firewall nat
add action=masquerade chain=srcnat dst-address=8.8.4.4 out-interface=sfp1
add action=masquerade chain=srcnat dst-address=192.168.68.0/24 out-interface=l2tp-DLSHOME
add action=masquerade chain=srcnat disabled=yes dst-address=192.168.1.1 out-interface=l2tp-CapeTown
add action=masquerade chain=srcnat disabled=yes dst-address=192.168.88.0/24 out-interface=ether5
add action=masquerade chain=srcnat disabled=yes dst-address=192.168.1.0/24 out-interface=l2tp-CapeTown
add action=masquerade chain=srcnat dst-address=192.168.69.40 out-interface=l2tp-ims
add action=masquerade chain=srcnat dst-address-list=VPN-Lan out-interface=l2tp-ims
add action=masquerade chain=srcnat dst-address=192.168.12.0/24 out-interface=ether4
add action=masquerade chain=srcnat out-interface=sfp1
add action=masquerade chain=srcnat out-interface=ether1
add action=dst-nat chain=dstnat comment="CompanyA" dst-port=65198 protocol=tcp to-addresses=192.168.13.144
add action=dst-nat chain=dstnat comment="CompanyA" disabled=yes dst-port=65198 in-interface=bridge1 protocol=tcp to-addresses=192.168.13.144
add action=dst-nat chain=dstnat comment="CompanyA" dst-port=80 in-interface-list=internet protocol=tcp to-addresses=192.168.13.144
add action=dst-nat chain=dstnat comment=Zycoo dst-port=8888 in-interface-list=internet protocol=tcp to-addresses=192.168.13.200 to-ports=8888
add action=dst-nat chain=dstnat comment=Zycoo dst-port=8888 protocol=tcp to-addresses=192.168.13.200 to-ports=8888
add action=dst-nat chain=dstnat comment="CompanyA" dst-port=443 in-interface-list=internet protocol=tcp to-addresses=192.168.13.144
add action=dst-nat chain=dstnat comment="CompanyA" dst-port=3050 in-interface-list=internet protocol=tcp to-addresses=192.168.13.144
add action=dst-nat chain=dstnat comment="CompanyA" disabled=yes dst-port=3050 in-interface=bridge1 protocol=tcp to-addresses=192.168.13.144
add action=dst-nat chain=dstnat comment=NVR dst-port=8080 in-interface-list=internet protocol=tcp to-addresses=192.168.13.159 to-ports=80