The router is set up very similar to defaults, except
- DNS and DHCP are disabled (both are on pihole)
- ether5 is my WAN interface, as I wanted to power the router from a switch on my lan via POE
- port forwarding NAT rules have been added
Other than than the Firewall filter rules are the default ones.
When trying to access forwarded services (80,443,etc) from within the LAN the forwarding takes me to the router (ex. webfig on 80) and not to the IP I have forwarded to.
The port forwarding works as expected when the request actually originates from the outside (tested from mobile connection), but not when it originates from LAN.
Any suggestions on how I, from the LAN, can access the forwarded services from my WAN address as though I was coming from externally?
Config:
# dec/02/2020 09:21:32 by RouterOS 6.47.8
#
# model = RB760iGS
/interface bridge
add admin-mac=48:8F:5A:D9:47:80 auto-mac=no name=bridge
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=flash/hotspot
/interface bridge port
add bridge=bridge interface=ether1
add bridge=bridge interface=ether2
add bridge=bridge interface=ether3
add bridge=bridge interface=ether4
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add interface=bridge list=LAN
add interface=ether5 list=WAN
/ip address
add address=192.168.10.1/24 interface=bridge network=192.168.10.0
/ip dhcp-client
add disabled=no interface=ether5
/ip firewall filter
add action=accept chain=input comment=\
"defconf: accept established,related,untracked" connection-state=\
established,related,untracked
add action=drop chain=input comment="defconf: drop invalid" connection-state=\
invalid
add action=accept chain=input comment="defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment=\
"defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1
add action=drop chain=input comment="defconf: drop all not coming from LAN" \
in-interface-list=!LAN
add action=accept chain=forward comment="defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=forward comment="defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=fasttrack-connection chain=forward comment="defconf: fasttrack" \
connection-state=established,related
add action=accept chain=forward comment=\
"defconf: accept established,related, untracked" connection-state=\
established,related,untracked
add action=drop chain=forward comment="defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment="defconf: drop all from WAN not DSTNATed" \
connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat ipsec-policy=out,none out-interface-list=WAN
add action=dst-nat chain=dstnat comment=HTTP dst-port=80 in-interface-list=WAN \
protocol=tcp to-addresses=192.168.10.2 to-ports=80
add action=dst-nat chain=dstnat comment=HTTPS dst-port=443 in-interface-list=\
WAN protocol=tcp to-addresses=192.168.10.2 to-ports=443
add action=dst-nat chain=dstnat comment=RDP-desktop dst-port=3390 \
in-interface-list=WAN protocol=tcp to-addresses=192.168.10.4 to-ports=3389
add action=dst-nat chain=dstnat comment=Minecraft dst-port=25565-25569 \
in-interface-list=WAN protocol=tcp to-addresses=192.168.10.2 to-ports=\
25565-25569
add action=dst-nat chain=dstnat comment=Minecraft dst-port=25565-25569 \
in-interface-list=WAN protocol=udp to-addresses=192.168.10.2 to-ports=\
25565-25569
add action=dst-nat chain=dstnat dst-port=45454 in-interface-list=WAN protocol=\
tcp to-addresses=192.168.10.2 to-ports=45454
add action=dst-nat chain=dstnat dst-port=45454 in-interface-list=WAN protocol=\
udp to-addresses=192.168.10.2 to-ports=45454
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www disabled=yes port=8000
set ssh disabled=yes
set www-ssl port=4343
set api disabled=yes
set api-ssl disabled=yes
/system clock
set time-zone-name=America/Los_Angeles
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN