I’m Client1 and have a server running on 192.168.20.68. I want to allow traffic on my external IP 81.168.57.219 44158 routers throught to the LAN side .68 box.
The firewall log looks like it should be working but portchecker.co says otherwise.
forward: in:pppoe-out1 out:bridge, src-mac 64:d1:54:cc:b9:7d, proto TCP (ACK,PSH), 178.244.216.138:44158->192.168.20.68:44158, NAT 178.244.216.138:44158->(81.168.57.219:44158->192.168.20.68:44158), len 179
netcat doesnt see it either.
➜ ~ nc -zv 81.168.57.219 44158
nc: connectx to 81.168.57.219 port 44158 (tcp) failed: Connection refused
You can see that it’s passing through router, so check the server (192.168.20.68), if there’s really something listening on port 44158, it’s not blocked by server’s firewall, etc.
hey 404, can you explain more what you mean? I wont know what external IP is trying to connect to me, so cant whitelist them individually. Can it be wild carded?
I’m no expert but it seems wireshark sees no traffic to the 192.168.20.68 address in question. Remember there’s 2 routers here so both firewalls / NAT setups have to work.
You don’t need to do anything with first router, it only passes public address to second one using PPPoE and you excluded traffic to it from firewall filter.
It’s not in your export, but you must have had it before to get the log in first (together with another rule in forward chain). You can make sure that it’s really going to server using:
You already have one covering traffic to internet, and this one masquerades all other traffic passing through router, so e.g. server would see all traffic from internet with 192.168.20.1 as source.