I have a mail server (zimbra) running on local ip address.
The mail server external address (1.1.1.1 example) is configured in the mikrotik and it is with this rules:
1 ;;; Mail server DST_NAT
chain=dstnat action=dst-nat to-addresses=192.168.10.4
dst-address=1.1.1.1
Rule 0 is used for isp that blocks port 25
Rule 1 is to direct any kind of traffic from the external address to local mail server ip
I dont know why but rule number 1 is also masquerading and all request that reach the mail server are as if they came from my mikrotik firewall 192.168.10.1 and not from the original ip’s
Can anyone help? what should i change in order that whatever thats coming to 1.1.1.1 Will go to 192.168.10.4 with the original ip that it came from.
If you are asking why is it important its because of spam filtering lists.
That isn’t the right way to go about it. Tim has it exactly right: make two masquerade rules, one for each WAN interface, and specify them as out-interfaces. That is the correct way to implement source NAT, and solves your problem immediately.
That way only traffic leaving through the WAN interfaces gets masqueraded, which in turn also means that hosts on the inside that have traffic destination NATted to them see the IP address of the source as it entered the router.