Hello to all,
I’ve tried some research on the forum and tried to find responses but with no succes. So I came here to gather the help of you guys experts.
On my router I’ve setup a port with a physical connection to a NIC of my server dedicated to VMs that are exposed to the internet (DMZ). All the VMs are on a separated network and can access the internet. The VM that is actualy in the DMZ is my webserver.
So I’ve added the port forwarding and masquerade in the NAT rules to be able to access my webserver from the internet and from my network, that work fine.
I’ve also added firewall rules based on this thread ( Buying - RB1100AHx4 Dude Edition - Questions about Firewall ) to have a basic security.
The thing that I want to do now is to block the access from this DMZ to my LAN (I’ve been able to open a ssh access on one of my servers on the LAN side from the webserver in the DMZ) but still been able to do so from the LAN to the DMZ.
I’ve tried to log all the rules in the firewall and NAT but can’t see any trace of my ssh connection between my 2 servers. Here are the export of the rules I have :
/ip firewall filter
add action=accept chain=input comment="accept connexion from 69 for winbox" dst-port=8291 protocol=tcp src-address=192.168.69.0/24
add action=accept chain=input connection-state=established,related,untracked log=yes log-prefix=Main_
add action=drop chain=input connection-state=invalid
add action=accept chain=input in-interface-list=LAN log=yes log-prefix=ICMP_ protocol=icmp
add action=accept chain=input dst-address=127.0.0.1 log=yes log-prefix=Loop_
add action=drop chain=input in-interface-list=!LAN
add action=accept chain=forward comment="in IPsec" ipsec-policy=in,ipsec
add action=accept chain=forward comment="out IPsec" ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward connection-state=established,related hw-offload=yes log=yes log-prefix=Fasttrack_
add action=accept chain=forward connection-state=established,related,untracked log=yes log-prefix=Main_
add action=drop chain=forward connection-state=invalid
add action=drop chain=forward connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
And the NAT rules
/ip firewall nat
add action=accept chain=srcnat dst-address=192.168.69.0/24 src-address=192.168.70.0/24
add action=dst-nat chain=dstnat dst-address-list=WAN-IP dst-port=80,443 protocol=tcp to-addresses=192.168.71.31
add action=masquerade chain=srcnat dst-address=192.168.71.0/24 src-address=192.168.69.0/24
add action=masquerade chain=srcnat dst-address=192.168.71.0/24 log=yes log-prefix=NAT_ src-address=192.168.70.0/24
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface-list=WAN
Any idea where the connection passes through ?
Thx a lot for your help
Have a nice day
Clair

