Hello Guys,
I’m just moving from watchguard to Mikrotik solution, and I have bunch of ports that I need to open and make the forwarding.
I used the NAT section on Firewall tab, I filled everything that I needed to make it work, as you can see attached here.
When I change from watchguard to mikrotik some packets go through and others doesn’t, and It can’t be like this obviously.
Is there anything else that I should do that i’m not doing?
Thank you
Regards
Yuri

It’s hard to say without seeing the config.
But did you open the ports in the firewall too?
Yes, I did, some packets works fine, but others just drop, and they are at the same port.
can you post the export for the firewall?
/ip firewall export compact
Sure:
add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=tcp
add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=udp
add action=accept chain=forward dst-port=1999 protocol=tcp
add action=accept chain=input dst-port=3000 protocol=tcp
/ip firewall mangle
add action=accept chain=prerouting comment=“=====================” disabled=yes
dst-address=192.168.1.0/24 src-address=192.168.1.0/24
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=GVT150
new-connection-mark=ISP_1 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Vivo100
new-connection-mark=ISP_2 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Mundivox16
new-connection-mark=ISP_3 passthrough=yes
add action=jump chain=prerouting connection-mark=no-mark disabled=yes
in-interface=LAN jump-target=policy_routing
add action=mark-routing chain=prerouting connection-mark=ISP_1 disabled=yes
new-routing-mark=Link1_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=output comment=“==============================”
connection-mark=ISP_1 disabled=yes new-routing-mark=Link1_route
passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/0
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/1
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/2
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/3
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/4
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/5
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/6
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/7
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/8
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/9
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/10
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/11
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/12
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/13
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/14
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/15
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/16
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_3 passthrough=yes per-connection-classifier=
both-addresses:17/17
/ip firewall nat
add action=masquerade chain=srcnat src-address=192.168.1.0/24
add action=dst-nat chain=dstnat comment=“Porta de Acesso ao DGuard” dst-port=
3000 log=yes protocol=tcp to-addresses=192.168.1.65 to-ports=3000
add action=dst-nat chain=dstnat disabled=yes dst-port=6666 protocol=tcp
to-addresses=192.168.1.31 to-ports=3389
add action=dst-nat chain=dstnat disabled=yes dst-port=5900 protocol=tcp
to-addresses=192.168.1.89 to-ports=5900
add action=dst-nat chain=dstnat disabled=yes dst-port=9876 protocol=udp
to-addresses=192.168.1.64 to-ports=9876
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=tcp
to-addresses=192.168.1.250
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=udp
to-addresses=192.168.1.250 to-ports=9874
add action=dst-nat chain=dstnat disabled=yes dst-port=3777 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=37777
add action=dst-nat chain=dstnat disabled=yes dst-port=1999 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=2000
add action=dst-nat chain=dstnat disabled=yes dst-port=8600 protocol=tcp
to-addresses=192.168.1.65 to-ports=8600
add action=dst-nat chain=dstnat disabled=yes dst-port=8601 protocol=tcp
to-addresses=192.168.1.65 to-ports=8601
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Vivo100 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 log=yes protocol=tcp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Vivo100 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=GVT150 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Mundivox16 protocol=tcp to-addresses=
192.168.1.36 to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 protocol=udp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=tcp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=tcp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=10060 protocol=tcp to-addresses=192.168.1.36 to-ports=10060
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=udp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=udp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=udp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 protocol=udp to-addresses=192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 in-interface=Vivo100 log=yes protocol=tcp
to-addresses=192.168.1.36 to-ports=9879
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=tcp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
20000-25000 protocol=udp to-addresses=192.168.1.64 to-ports=20000-25000
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=masquerade chain=srcnat disabled=yes out-interface=Vivo100
add action=masquerade chain=srcnat disabled=yes out-interface=GVT150
add action=masquerade chain=srcnat disabled=yes out-interface=Mundivox16
add action=dst-nat chain=dstnat disabled=yes dst-port=554 protocol=udp
to-addresses=192.168.1.102 to-ports=554
/ip firewall service-port
set ftp disabled=yes
PS: I know they are all disabled, because i’m testing only one porrt, port 3000
Sure:
add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=tcp
add action=accept chain=forward dst-port=
3000,9874,9875,9876,9879,9090,2000,37777 protocol=udp
add action=accept chain=forward dst-port=1999 protocol=tcp
add action=accept chain=input dst-port=3000 protocol=tcp
/ip firewall mangle
add action=accept chain=prerouting comment=“=====================” disabled=yes
dst-address=192.168.1.0/24 src-address=192.168.1.0/24
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=GVT150
new-connection-mark=ISP_1 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Vivo100
new-connection-mark=ISP_2 passthrough=yes
add action=mark-connection chain=prerouting comment=“=======================”
connection-mark=no-mark disabled=yes in-interface=Mundivox16
new-connection-mark=ISP_3 passthrough=yes
add action=jump chain=prerouting connection-mark=no-mark disabled=yes
in-interface=LAN jump-target=policy_routing
add action=mark-routing chain=prerouting connection-mark=ISP_1 disabled=yes
new-routing-mark=Link1_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=prerouting connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes src-address=192.168.1.0/24
add action=mark-routing chain=output comment=“==============================”
connection-mark=ISP_1 disabled=yes new-routing-mark=Link1_route
passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_2 disabled=yes
new-routing-mark=Link2_route passthrough=yes
add action=mark-routing chain=output connection-mark=ISP_3 disabled=yes
new-routing-mark=Link3_route passthrough=yes
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/0
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/1
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/2
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/3
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/4
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/5
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/6
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/7
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/8
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_1 passthrough=yes per-connection-classifier=
both-addresses:17/9
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/10
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/11
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/12
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/13
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/14
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/15
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_2 passthrough=yes per-connection-classifier=
both-addresses:17/16
add action=mark-connection chain=policy_routing disabled=yes dst-address-type=
!local new-connection-mark=ISP_3 passthrough=yes per-connection-classifier=
both-addresses:17/17
/ip firewall nat
add action=masquerade chain=srcnat src-address=192.168.1.0/24
add action=dst-nat chain=dstnat comment=“Porta de Acesso ao DGuard” dst-port=
3000 log=yes protocol=tcp to-addresses=192.168.1.65 to-ports=3000
add action=dst-nat chain=dstnat disabled=yes dst-port=6666 protocol=tcp
to-addresses=192.168.1.31 to-ports=3389
add action=dst-nat chain=dstnat disabled=yes dst-port=5900 protocol=tcp
to-addresses=192.168.1.89 to-ports=5900
add action=dst-nat chain=dstnat disabled=yes dst-port=9876 protocol=udp
to-addresses=192.168.1.64 to-ports=9876
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=tcp
to-addresses=192.168.1.250
add action=dst-nat chain=dstnat disabled=yes dst-port=9874 protocol=udp
to-addresses=192.168.1.250 to-ports=9874
add action=dst-nat chain=dstnat disabled=yes dst-port=3777 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=37777
add action=dst-nat chain=dstnat disabled=yes dst-port=1999 log=yes protocol=tcp
to-addresses=192.168.1.102 to-ports=2000
add action=dst-nat chain=dstnat disabled=yes dst-port=8600 protocol=tcp
to-addresses=192.168.1.65 to-ports=8600
add action=dst-nat chain=dstnat disabled=yes dst-port=8601 protocol=tcp
to-addresses=192.168.1.65 to-ports=8601
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Vivo100 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 log=yes protocol=tcp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Vivo100 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=GVT150 protocol=tcp to-addresses=192.168.1.36
to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9875 in-interface=Mundivox16 protocol=tcp to-addresses=
192.168.1.36 to-ports=9875
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9009 protocol=udp to-addresses=192.168.1.36 to-ports=9009
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=tcp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=tcp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=10060 protocol=tcp to-addresses=192.168.1.36 to-ports=10060
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=udp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9090 protocol=udp to-addresses=192.168.1.36 to-ports=9090
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9080 protocol=udp to-addresses=192.168.1.36 to-ports=9080
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 protocol=udp to-addresses=192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 in-interface=Vivo100 log=yes protocol=tcp
to-addresses=192.168.1.36 to-ports=9879
add action=accept chain=srcnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-address-type=“” dst-port=9879 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=GVT150 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=9879 in-interface=Mundivox16 log=yes protocol=tcp to-addresses=
192.168.1.36 to-ports=9879
add action=dst-nat chain=dstnat comment=“Portas Sigma (Alarme)” disabled=yes
dst-port=8085 protocol=tcp to-addresses=192.168.1.36 to-ports=8085
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5060 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
20000-25000 protocol=udp to-addresses=192.168.1.64 to-ports=20000-25000
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5001 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5090 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=udp to-addresses=192.168.1.64 to-ports=5060
add action=dst-nat chain=dstnat comment=“Portas PABX” disabled=yes dst-port=
5000 protocol=tcp to-addresses=192.168.1.64 to-ports=5060
add action=masquerade chain=srcnat disabled=yes out-interface=Vivo100
add action=masquerade chain=srcnat disabled=yes out-interface=GVT150
add action=masquerade chain=srcnat disabled=yes out-interface=Mundivox16
add action=dst-nat chain=dstnat disabled=yes dst-port=554 protocol=udp
to-addresses=192.168.1.102 to-ports=554
/ip firewall service-port
set ftp disabled=yes
PS: I know they are all disabled, because i’m testing only one porrt, port 3000