The Mikrotik router is set up and works great. However, I am having a terrible time forwarding public addresses and ports to internal addresses and the corresponding ports.
My public NIC has multiple addresses. For example, I want to forward html traffic from public address 10.0.0.20, port 80 to internal address (our web server) 192.168.0 20 port 80, and FTP traffic from public address 10.0.0.5, ports 20 & 21 to internal address (our ftp server) 192.168.0.5 ports 20 & 21. I tried several filter combinations but traffic is not getting through. I must not be setting up the filters correctly.
You can find all necessary information here: http://www.mikrotik.com/docs/ros/2.9/ip/nat
you can use examples from this chapter, only add apropriate ports to dst-nat rules.
I have given the router an external IP address XXX.XXX.XXX.254/24 on the first port, stated the gateway XXX.XXX.XXX. 1 for the same port.
On the internal interface, I have given the IP of 10.8.0.254/16.
I have made all the internal elements point to 10.8.0.254 for their gateway.
I can ping yahoo.com and any machine on the internal network from within, but when I forward ports to a internal device, I see the traffic coming in on the External interface, but nothing on the internal firewall rules?
Should I be telling the router that 10.8.0.254 is the internal gateway for the network, and if so, how do I do that, as when I set this, it will not go active?
I am trying to set up openvpn where it would reside behind a firewall. So I choose to buy/use the ISP version of Mikrotik.
I had openvpn running on our network with a real world IP address. Now I have it behind a server with 5 (five) - 10/100 ether ports. I did this so I could have another port open just incase a config brought down the router/firewall.
We already have in place carrier class cisco routers in front of the mikrotik.
I have taken two of the real world IP addresses and assigned them to the mikrotik. One on ether1 (External), the other ether3 (External VPN). On the inside network, I also have two of the 5 ethernet ports assigned. Ether2 (Internal) and Ether4 (Internal VPN).
0 X S 10.8.0.0/16 10.8.0.254 u 0.0.0.0
1 DC 10.8.0.0/16 10.8.0.35 internal
2 ADC 10.8.0.0/16 10.8.0.1 Int VPN
3 ADC 209.120.218.0/24 209.120.218.254 core2
4 DC 209.120.218.0/24 209.120.218.89 Ext VPN
5 A S ;;; added by setup
0.0.0.0/0 r 209.120.218.1 core2