3 ;;; port Forward - Public to private server to ssp.salis-it.com
chain=dstnat action=dst-nat to-addresses=192.168.1.199 to-ports=80
protocol=tcp dst-address=196.219.31.41 in-interface=SWAN dst-port=80
4 ;;; port Forward - Public to private server to ssp.salis-it.com:8888 - Ad>
istration
chain=dstnat action=dst-nat to-addresses=192.168.1.199 to-ports=8888
protocol=tcp dst-address=196.219.31.41 in-interface=SWAN dst-port=8888
5 ;;; port Forward - Public to private server to intranet.salis-it.com:80
chain=dstnat action=dst-nat to-addresses=192.168.1.12 to-ports=80
protocol=tcp dst-address=196.219.31.39 in-interface=SWAN dst-port=80
6 X ;;; port Forward - Public to private server to intranet.salis-it.com:80 n>
working
chain=dstnat action=dst-nat to-addresses=192.168.1.12 to-ports=80
protocol=tcp dst-address=196.219.31.39 in-interface=SLAN dst-port=80
7 ;;; port Forward - Public to private server to Ftp
chain=dstnat action=dst-nat to-addresses=192.168.1.3 to-ports=21
protocol=tcp dst-address=196.219.31.37 in-interface=SWAN dst-port=21
8 ;;; port Forward - Public to private server to Mail.salis-it.com:80
chain=dstnat action=dst-nat to-addresses=192.168.1.1 to-ports=80
protocol=tcp dst-address=196.219.31.35 in-interface=SWAN dst-port=80
9 ;;; port Forward - Public to private server to vpn - 192.168.1.3
chain=dstnat action=dst-nat to-addresses=192.168.1.3 to-ports=1723
The dstnat rules should be matched with a srcnat rule. Did you look at my post on the other topic? Each dstnat has a matching srcnat. I see no srcnats or masquerades there at all.
An option is to change the www service port of your mikrotik router from 80 to some other port, i.e. 808.
/ip service set www address=0.0.0.0/0 disabled=no port=808
This will prevent the mikrotik router from hijacking all port 80 traffic. You can now access the inbuilt mikrotik http server on port 808 when the need arises.
if i disabled masqurade , there will not be any internet for the netwok ,so is there any solution to give internet to ppl after i disable the masqurade