My MikroTik is reachable on 192.168.10.1 for ssh and web, the LAN is 192.168.10.0/24
Clients connecting from the internet via MikroTik’s VPN are getting an IP from 192.168.89.0/24
I’d like to make 192.168.10.1 reachable on 22/tcp, 80 and 443 tcp from 192.168.89.0/24, how can I do it? As of now I can ping 192.168.10.1 when on VPN but can’t connect via desired ports.
/ip route print
Flags: X - disabled, A - active, D - dynamic, C - connect, S - static, r - rip, b - bgp, o - ospf, m - mme, B - blackhole, U - unreachable, P - prohibit
# DST-ADDRESS PREF-SRC GATEWAY DISTANCE
0 ADS 0.0.0.0/0 192.168.1.1 1
1 ADC 192.168.1.0/24 192.168.1.11 ether1 0
2 ADC 192.168.10.0/24 192.168.10.1 bridgeVLAN10 0
3 ADC 192.168.89.10/32 192.168.89.1 <l2tp-ppp.. 0
Apart from the valid answer to post your config, in the default firewall rules only LAN interfaces are allowed to access through whatever.
Is your VPN interface part of the LAN list ?
Alternative (since some VPN interfaces have dynamic nature): change the relevant firewall rule from accepting only LAN to accept when it’s not WAN. This way your VPN interfaces will also be allowed.
add action=drop chain=input comment="defconf: drop all not coming from LAN" disabled=yes in-interface-list=!LAN
add action=accept chain=input comment="accept all not coming from WAN" in-interface-list=!WAN
Now it works! Yay, thank you!
Yes, safe mode is awesome, ty!
add action=drop chain=input comment="defconf: drop all not coming from LAN" disabled=yes in-interface-list=!LAN
add action=accept chain=input comment="accept all not coming from WAN" disabled=yes in-interface-list=!WAN
add action=drop chain=input comment="drop all coming from WAN" in-interface-list=WAN
The first two lines are going to be deleted, just pasting here to show the change