Hello
I have this situation
VPN client have IP 192.168.35.1
Webserver have IP 192.168.10.10
i have this rule
add action=accept chain=forward comment=“open port 80 for User10” dst-address=192.168.10.10 dst-port=80 log=yes protocol=tcp src-address=192.168.35.1
i have other rule for RDP Port for all users from VPN PPTP conections
and works fine
I can not find the reason why one rule fails and the other does not, i not have dnat
This is mi config
/ip firewall filter
add action=accept chain=input comment=“defconf: accept established,related,untracked” connection-state=established,related,untracked
add action=drop chain=input comment=“defconf: drop invalid” connection-state=invalid
add action=accept chain=input comment=“defconf: accept ICMP” protocol=icmp
add action=accept chain=input comment=“VPN 1723” dst-port=1723 protocol=tcp
add action=accept chain=input comment=“GRE VPN” dst-port=47 protocol=tcp
add action=accept chain=forward comment=“open port 80 for User10” dst-address=192.168.10.10 dst-port=80 log=yes protocol=tcp src-address=192.168.35.1
add action=accept chain=forward comment=“RDP VIA VPN” dst-port=3389 protocol=tcp src-address=192.168.35.0/24
add action=drop chain=forward comment=“VPN A LOCAL BLOQUEADO” dst-address=192.168.10.0/24 log=yes src-address=192.168.35.0/24
add action=drop chain=forward comment=“TRAFICO DE VPN A DMZ BLOQUEADO” dst-address=192.168.120.0/24 src-address=192.168.35.0/24
add action=drop chain=forward comment=“TRAFICO DMZ A LAN BLOQUEADO” dst-address=192.168.10.0/24 src-address=192.168.120.0/24
add action=drop chain=forward comment=“TRAFICO DE DMZ A VPN BLOQUEADO” dst-address=192.168.35.0/24 src-address=192.168.120.0/24
add action=drop chain=input comment=“defconf: drop all not coming from LAN” in-interface-list=!LAN
add action=accept chain=forward comment=“defconf: accept in ipsec policy” ipsec-policy=in,ipsec
add action=accept chain=forward comment=“defconf: accept out ipsec policy” ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment=“defconf: fasttrack” connection-state=established,related
add action=accept chain=forward comment=“defconf: accept established,related, untracked” connection-state=established,related,untracked
add action=drop chain=forward comment=“defconf: drop invalid” connection-state=invalid
add action=drop chain=forward comment=“defconf: drop all from WAN not DSTNATed” connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment=“defconf: masquerade” ipsec-policy=out,none out-interface-list=WAN
regards