You have to allow forwarding of ingress packets to those local address in your firewall.
iirc, I don’t think it’s necessary to have the filter rules as dst-nat is processed prior to filter in packet flow.
The dst-nat rules themselves allow the forwarding of the packets.
Am I wrong??
Wouldn’t be the first time.
I have done this and still cannot connect. I can see in Winbox packets hitting this rule, but no connection. I will try the second idea in conjunction with the first tomorrow.
Should I be doing this a different way, like EoIP?
I mainly want to be able to manage my network from anywhere, but still have it secure from DOS/Brute Force, etc. The two ways I have been doing this with linsys type boxes is allowing remote management of the router and opening up port 3389 for RDP connections to my servers. I have been reading the manuals about EoIP, but it seems too limiting for the traveler. I have looked into VPN but the client side doesn’t seem very straight forward and I have not seen a good free client that will work with win xp, unless there is some built in solution I am unaware of.
You will be right if he doesn’t have a filter rule that drop everything not explicitly allowed. The #7 filter rule force a jump to customer chain if the in-interface is wan and rule #12 then drop the packet if does not match any prior rule. This is where his packets get dropped even after been processed and forwarded by dst-nat. Consequently, he must allow those packets in filter as described in my earlier post.
You’re wrong It’s not important which is first: dst-nat or masquerade. Masquerade can be only put in src-nat chain. So you are talking about two different chains which are processed separately.
I can reach port 3389. The other port, which is the winbox port, is not reachable from winbox. Is there some internal routing that needs to take place to allow the winbox port to go through or to the WAN interface?
This is the filter list in the Mikrotik. What about the nat list, does anything have to happen ther? I have two External ISP connecitons and wnat to forward them to various systems inside. Can I do it with the filter rules alone?
I have a rule to the port forwarding from my input interface with a destination port of 81 to an local address of 192.168.1.104, port 80. Packets are showing as going through the rule, but none of them are getting to the server (192.168.1.104) – nothing in server logs. Is there something else I must do to enable the natted packets to the local address?
I have another ISP/Interface on the MT. How can I do the same thing with packets coming into the other address? It works coming in the pppoe-out1 interface, but I would like to use another interface and do the same type of thing.
The router has an inside address of 192.168.1.254 and the webserver uses that as it’s default gateway.
What do I need to do to come in the other interface and do the same thing?