The issue: We have a webpage - subpage.webpage.com which is working from the internet - this page is running on our internal server. We use a Watchguard Firewall which routes this traffic to the webpage with a port attached - 9000 (subpage.webpage.com:9000) - this work great from the internet. We would like to access this page from our Intranet, but can not get it to work unless we setup a host file on each computer to route it. Being that we have over 800 computers i would like to find a way to do it with the mikrotik if possible. We do not use the firewall on the mikrotik right now. Our DNS server is also internal. We have a range of public IP’s form our ISP, and we use one of them for the traffic to this Webpage on the watchguard. also our lan is a different subnet then the Websever.
Watchguard Firewall
ether0 - 111.111.111.1/29 - Internet (external)
ether1 - 222.222.0.0/16 - LAN (trusted)
ether2 - 333.333.333.0/24 - Server network (trusted)
ether3 - 444.444.444.1/30 - SIP Network for Phones (External)
SNAT - 111.111.111.3 to 333.333.0.2:9000
Mikrotik
ether1 - 222.222.0.0/16 - LAN Subnet (This also has our internal DNS)
ether7 - 333.333.333.0/24 - Server Subnet (This subnet is used for other internal servers that the LAN is able to reach)
ether1 thru ether10 are all used for different subnets - ether1 being the default
From internet webpage works great.
From LAN, only works if there is a Host file with: “333.333.333.2 subpage.webpage.com”
Don’t want to manage host files - can i do this with the microtik so internal PC’s can reach this website?
they will get the 111.111.111.3/29 - This domain is hosted via a third party and we forward the request to our internal server where the webserver resides.
Sounds like you need to implement hairpin NAT on watchguard … I’m not sure how to do it there but essentially you have to add SRC NAT rule which replaces src-address for packets originating from internal networks and targeting the DST NATed server. Without it, the internal server sees client IP address, sends reply to it bypassing watchguard (who is supposed to do inverse of DST-NAT on return packets). This makes clients mighty confused.