NAT on CCR1016 Not working

Hello Guys,

I’m just moving from watchguard to Mikrotik solution, and I have bunch of ports that I need to open and make the forwarding.

I used the NAT section on Firewall tab, I filled everything that I needed to make it work, as you can see attached here.

When I change from watchguard to mikrotik some packets go through and others doesn’t, and It can’t be like this obviously.

Is there anything else that I should do that i’m not doing?

Thank you

Regards

Yuri
print nat.PNG

It’s hard to say without seeing the config.
But did you open the ports in the firewall too?

Yes, I did, some packets works fine, but others just drop, and they are at the same port.

can you post the export for the firewall?

/ip firewall export compact

Sure:

add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=tcp
add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=udp
add action=accept chain=forward dst-port=1999 protocol=tcp
add action=accept chain=input dst-port=3000 protocol=tcp
/ip firewall mangle
add action=accept chain=prerouting comment=“=====================” disabled=yes
dst-address=192.168.1.0/24 src-address=192.168.1.0/24
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=GVT150
new-connection-mark=ISP_1 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Vivo100
new-connection-mark=ISP_2 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Mundivox16
new-connection-mark=ISP_3 passthrough=yes
add action=jump chain=prerouting connection-mark=no-mark disabled=yes
in-interface=LAN jump-target=policy_routing
add action=mark-routing chain=prerouting connection-mark=ISP_1 disabled=yes
new-routing-mark=Link1_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=output comment=“==============================”
connection-mark=ISP_1 disabled=yes new-routing-mark=Link1_route
passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/0
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/1
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/2
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/3
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/4
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/5
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/6
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/7
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/8
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/9
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/10
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/11
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/12
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/13
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/14
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/15
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/16
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_3 passthrough=yes per-connection-classifier=
both-addresses:17/17
/ip firewall nat
add action=masquerade chain=srcnat src-address=192.168.1.0/24
add action=dst-nat chain=dstnat comment=“Porta de Acesso ao DGuard” dst-port=
3000 log=yes protocol=tcp to-addresses=192.168.1.65 to-ports=3000
add action=dst-nat chain=dstnat disabled=yes dst-port=6666 protocol=tcp
to-addresses=192.168.1.31 to-ports=3389
add action=dst-nat chain=dstnat disabled=yes dst-port=5900 protocol=tcp
to-addresses=192.168.1.89 to-ports=5900
add action=dst-nat chain=dstnat disabled=yes dst-port=9876 protocol=udp
to-addresses=192.168.1.64 to-ports=9876
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=tcp
to-addresses=192.168.1.250
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=udp
to-addresses=192.168.1.250 to-ports=9874
add action=dst-nat chain=dstnat disabled=yes dst-port=3777 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=37777
add action=dst-nat chain=dstnat disabled=yes dst-port=1999 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=2000
add action=dst-nat chain=dstnat disabled=yes dst-port=8600 protocol=tcp
to-addresses=192.168.1.65 to-ports=8600
add action=dst-nat chain=dstnat disabled=yes dst-port=8601 protocol=tcp
to-addresses=192.168.1.65 to-ports=8601
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Vivo100 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 log=yes protocol=tcp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Vivo100 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=GVT150 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Mundivox16 protocol=tcp to-addresses=
192.168.1.36 to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 protocol=udp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=tcp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=tcp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=10060 protocol=tcp to-addresses=192.168.1.36 to-ports=10060
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=udp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=udp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=udp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 protocol=udp to-addresses=192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 in-interface=Vivo100 log=yes protocol=tcp
to-addresses=192.168.1.36 to-ports=9879
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=tcp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
20000-25000 protocol=udp to-addresses=192.168.1.64 to-ports=20000-25000
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=masquerade chain=srcnat disabled=yes out-interface=Vivo100
add action=masquerade chain=srcnat disabled=yes out-interface=GVT150
add action=masquerade chain=srcnat disabled=yes out-interface=Mundivox16
add action=dst-nat chain=dstnat disabled=yes dst-port=554 protocol=udp
to-addresses=192.168.1.102 to-ports=554
/ip firewall service-port
set ftp disabled=yes


PS: I know they are all disabled, because i’m testing only one porrt, port 3000

Sure:

add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=tcp
add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=udp
add action=accept chain=forward dst-port=1999 protocol=tcp
add action=accept chain=input dst-port=3000 protocol=tcp
/ip firewall mangle
add action=accept chain=prerouting comment=“=====================” disabled=yes
dst-address=192.168.1.0/24 src-address=192.168.1.0/24
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=GVT150
new-connection-mark=ISP_1 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Vivo100
new-connection-mark=ISP_2 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Mundivox16
new-connection-mark=ISP_3 passthrough=yes
add action=jump chain=prerouting connection-mark=no-mark disabled=yes
in-interface=LAN jump-target=policy_routing
add action=mark-routing chain=prerouting connection-mark=ISP_1 disabled=yes
new-routing-mark=Link1_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=output comment=“==============================”
connection-mark=ISP_1 disabled=yes new-routing-mark=Link1_route
passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/0
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/1
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/2
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/3
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/4
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/5
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/6
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/7
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/8
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/9
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/10
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/11
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/12
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/13
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/14
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/15
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/16
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_3 passthrough=yes per-connection-classifier=
both-addresses:17/17
/ip firewall nat
add action=masquerade chain=srcnat src-address=192.168.1.0/24
add action=dst-nat chain=dstnat comment=“Porta de Acesso ao DGuard” dst-port=
3000 log=yes protocol=tcp to-addresses=192.168.1.65 to-ports=3000
add action=dst-nat chain=dstnat disabled=yes dst-port=6666 protocol=tcp
to-addresses=192.168.1.31 to-ports=3389
add action=dst-nat chain=dstnat disabled=yes dst-port=5900 protocol=tcp
to-addresses=192.168.1.89 to-ports=5900
add action=dst-nat chain=dstnat disabled=yes dst-port=9876 protocol=udp
to-addresses=192.168.1.64 to-ports=9876
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=tcp
to-addresses=192.168.1.250
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=udp
to-addresses=192.168.1.250 to-ports=9874
add action=dst-nat chain=dstnat disabled=yes dst-port=3777 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=37777
add action=dst-nat chain=dstnat disabled=yes dst-port=1999 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=2000
add action=dst-nat chain=dstnat disabled=yes dst-port=8600 protocol=tcp
to-addresses=192.168.1.65 to-ports=8600
add action=dst-nat chain=dstnat disabled=yes dst-port=8601 protocol=tcp
to-addresses=192.168.1.65 to-ports=8601
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Vivo100 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 log=yes protocol=tcp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Vivo100 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=GVT150 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Mundivox16 protocol=tcp to-addresses=
192.168.1.36 to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 protocol=udp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=tcp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=tcp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=10060 protocol=tcp to-addresses=192.168.1.36 to-ports=10060
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=udp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=udp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=udp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 protocol=udp to-addresses=192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 in-interface=Vivo100 log=yes protocol=tcp
to-addresses=192.168.1.36 to-ports=9879
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=tcp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
20000-25000 protocol=udp to-addresses=192.168.1.64 to-ports=20000-25000
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=masquerade chain=srcnat disabled=yes out-interface=Vivo100
add action=masquerade chain=srcnat disabled=yes out-interface=GVT150
add action=masquerade chain=srcnat disabled=yes out-interface=Mundivox16
add action=dst-nat chain=dstnat disabled=yes dst-port=554 protocol=udp
to-addresses=192.168.1.102 to-ports=554
/ip firewall service-port
set ftp disabled=yes


PS: I know they are all disabled, because i’m testing only one porrt, port 3000