I am hosting a website on the 10.0.0.2 address (10.0.0.3 is the NAS). The Mikrotik router is not connected directly to the public ip, there is another one before it, and that one forwards to the Mikrotik (the first router is operated by ISP). The connection doesn’t go through and I was trying to find out why. I found out that when I try to connect to router (I use the outside address of the Mikrotik router - 192.168.10.37) on the 80 port it doesn’t forward to 10.0.0.2.
# jan/31/2023 10:44:55 by RouterOS 6.48.6
# software id = G7W0-D915
#
# model = RB750Gr3
# serial number = CC210F44AB7A
/interface bridge
add admin-mac=DC:2C:6E:E9:F2:B1 auto-mac=no comment=defconf name=bridge
/caps-man datapath
add bridge=bridge name=datapath1
/caps-man security
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=ucitel
add authentication-types=wpa-psk,wpa2-psk encryption=aes-ccm name=zak
/caps-man configuration
add country="czech republic" datapath=datapath1 datapath.bridge=bridge name=\
ucitele_cfg security=ucitel ssid=ZS_Novosedly
add country="czech republic" datapath=datapath1 datapath.bridge=bridge name=\
zaci_cfg security=zak ssid=ZSN-zaci
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip pool
add name=dhcp ranges=10.0.0.10-10.0.0.250
/ip dhcp-server
add address-pool=dhcp disabled=no interface=bridge name=defconf
/queue tree
add max-limit=5M name=AP1-5G-zaci
add max-limit=5M name=AP1-2.4G-zaci
/caps-man manager
set enabled=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface=bridge
/caps-man provisioning
add action=create-dynamic-enabled master-configuration=ucitele_cfg \
slave-configurations=zaci_cfg
/interface bridge port
add bridge=bridge comment=defconf interface=ether2
add bridge=bridge comment=defconf interface=ether3
add bridge=bridge comment=defconf interface=ether4
add bridge=bridge comment=defconf interface=ether5
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ether1 list=WAN
/ip address
add address=10.0.0.1/24 comment=defconf interface=bridge network=10.0.0.0
/ip dhcp-client
add comment=defconf disabled=no interface=ether1
/ip dhcp-server lease
add address=10.0.0.253 mac-address=CC:2D:21:0F:18:50
add address=10.0.0.3 disabled=yes mac-address=00:11:32:48:CC:39
add address=10.0.0.3 mac-address=00:11:32:48:CC:3A
add address=10.0.0.2 mac-address=D8:5E:D3:AD:AC:F7
add address=10.0.0.254 mac-address=CC:2D:21:0F:19:00
add address=10.0.0.252 comment="ta ne 5. trida" mac-address=18:FD:74:6B:6F:7D
add address=10.0.0.251 comment="5. trida" mac-address=18:FD:74:6B:83:A5
/ip dhcp-server network
add address=10.0.0.0/24 comment=defconf gateway=10.0.0.1 netmask=24
/ip dns
set allow-remote-requests=yes
/ip dns static
add address=10.0.0.1 comment=defconf name=router.lan
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
disabled=yes in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" \
connection-state=invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" \
ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat comment=http-server dst-address=192.168.10.37 \
dst-port=80 protocol=tcp to-addresses=10.0.0.2 to-ports=80
add action=dst-nat chain=dstnat comment=https-server dst-address=\
192.168.10.37 dst-port=443 protocol=tcp to-addresses=10.0.0.2 to-ports=\
443
add action=dst-nat chain=dstnat comment=DSM-http dst-address-type=local \
dst-port=5000 protocol=tcp to-addresses=10.0.0.3 to-ports=5000
add action=dst-nat chain=dstnat comment=DSM-https dst-address-type=local \
dst-port=5001 protocol=tcp to-addresses=10.0.0.3 to-ports=5001
add action=dst-nat chain=dstnat comment=NAS-http dst-address-type=local \
dst-port=5005 protocol=tcp to-addresses=10.0.0.3 to-ports=5005
add action=dst-nat chain=dstnat comment=NAS-https dst-address-type=local \
dst-port=5006 protocol=tcp to-addresses=10.0.0.3 to-ports=5006
/ip route
add disabled=yes distance=1 gateway=192.168.10.3
/system clock
set time-zone-name=Europe/Prague
/system identity
set name=RouterOS
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN