I am trying to configure my internal hairpin so I can access my minecraft server through my web address (main two used ridiculoussmp.deppagaming.net (goes into minecraft game server) and repair.deppagaming.net (ssh portal into server itself for maintance)) I would like to be able to do these two without having to change from the web address to my internal ip for the server. The server is on it’s own dhcp server and ip pool (dhcp2 and pool1) used only for the server where as my machine is on my general dhcp server and ip pool (dhcp1 and dhcp_pool0). I have my hairpin nat as a srcnat from src 192.168.88.0/24 (general dhcp server) to dst 172.16.12.0/24 (server’s dhcp server) and set to masquerade. The server is static at 172.16.12.50 and when I set my port foward to have a dst. address they no longer work externally.
Below is my >export hide-sensitive file
@Znevna,
I didn’t know what to answer him…
if you look at the firewall there is no “drop” and has winbox open to the world, plus the cloud active and published here on the forum…
It’s too much, I even lost the want to suggest him to censor those things…
I’d say that having in-interface defined in the dst-nat rules prevents hairpin from working, as per the subject of this topic, that is the issue.
Regarding the rest of the security holes in the config, those are offtopic.
Id say your outta your cotton picking mind to make such a bold and WRONG claim.
Show me the firewall rule that allows dstnat ??
I cannot believe such ignorance from a usually good contributor. Many things are interrelated on the MT Config and therefore its never a good idea to ignore one part of the config when having issues overall. Best to go have my first cup of coffee today as I feel like tearing additional strips
My opinion of your basic acumen is dropping drastically…
However you do have a point in that we dont know what he needs.
If this is not a public facing router then perhaps he doesnt need any rules which is basically the current state of affairs.
If this is a public facing router, you should go directly to IT jail.
Like I’ve said above, the lack of security in his firewall is beyond the subject of this topic.
If you have something to say regarding the dst-nat rules, please do so.
You may not like it, but even though firewall filter may be “unfinished”, it does not break dstnat. The problem there is using in-interface(-list). If replacing those with dst-address= breaks outside access, then it’s probably NAT 1:1 or something and public address is not directly on this router.
Thats the difference between you/others and I. I have no psychopathic compulsion to help someone hang themselves (metaphorically), no instead I have the moral fortitude to lead them on a different path. Maybe tomorrow will be different and I wont give a phuck.
Sorry for the delayed response, I never received the email saying my post was posted.
Thank you for this, I have added these rules. I am still very much new to setting up my own router, and had a hard time finding instructions on setting up my own firewall, I have implemented all the rules above.
This unit is my main router, that is public to the internet. I accept I need to go to temporary IT Jail for this.
I will gladly admit I do not know everything and am willing to learn and grow.
HI MJ, no need, you are in NEW LEARNERS SAFE HAVEN. Lots of time for newbies, been there, still there sometimes.
The only person going to jail is Znevna for happily letting you go down in flames without any warning… He deserves a good bout of gastroenteritis!
Glad you fixed things up, and will have another look, once you post your config.
Do you get a fixed IP or is it a dynamic IP?
If you are hosting anything you will be doomed to hacking attempts which is never fun, so my advice is to at least use source address list entries for your destination nat rules.
If you dont know all the external users coming in, well thats asking for trouble. There is no reason why folks cannot provide you with
a. their static public IP
b. their dyndns name which the MT router will resolve for you to IP address (many free providers out there to get one so no excuses).
If this is strictly for you to access the server and it could be from any site, then suggest wireguard into the router and then access the server).