Hi there, the setup looks good until we hit the fw filter rules. So lets clean those up.
Will be posting here once I start looking at it closely.
Okay, unplug your router from the internet immediately as I see no protection from the internet…
I would put back in place all the default firewall rules FIRST.
None of the forward rules you have are any good (serve no purpose). and should be removed and replaced with the default fw rules.
Once done we can tackle port forward using the proper area, the dst-nat rules.
The format for the rules will be basically
add chain=dst-nat action=dstnat protocol =(tcp or udp), dst-port=xxxxx in-interface-list=WAN
source-address-list=aceptar to-addresses=LANIPofServer to-ports=(only required if port translating)
If a web server is open to more than one external WANIP use a source address list such as acceptar, if you have only a single external WANIP requiring access, you can
simply state it as 'src-address= ’
Use ‘in-interface-list=WAN’ vice ether1
You can also use instead, dst-address-list=External_WAN
Where External_Wan is defined by the address of the IP Cloud of the MT
(enable IP Cloud and copy DNS name into the address part of the address list entry)
+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
You will have to add which rules also need ‘src-address-list=aceptar’ OR ANY address lists with two or more external users,
or any single only external users with 'src-address= ’
add action=dst-nat chain=dstnat comment=“web claranet” connection-type="
dst-port=443 in-interface-list=WAN protocol=tcp to-addresses=172.26.0.200
add action=dst-nat chain=dstnat comment=“SIP Telsone” dst-port=5060-6000
in-interface-list=WAN protocol=udp to-addresses=172.26.0.200
add action=dst-nat chain=dstnat comment=RTP-Telsome dst-port=10000-50000
in-interface-list=WAN protocol=udp to-addresses=172.26.0.200
add action=dst-nat chain=dstnat comment=“SSH PBX” dst-port=22 in-interface-list=WAN
protocol=tcp to-addresses=172.26.0.200
add action=dst-nat chain=dstnat comment=Camaras dst-port=80 in-interface-list+WAN
protocol=tcp to-addresses=172.26.0.251 to-ports=80
add action=dst-nat chain=dstnat comment=“Camaras 2 tcp” dst-port=8000-8003
in-interface-list=WAN protocol=tcp to-addresses=172.26.0.251
add action=dst-nat chain=dstnat comment=“Camaras 2 udp” dst-port=8000-8003
in-interface-list=WAN protocol=udp to-addresses=172.26.0.251
add action=dst-nat chain=dstnat comment=ftp_nas dst-port=21 in-interface-list=WAN
protocol=tcp to-addresses=172.26.0.253
This rule is concerning as there is no protocol or dst port and have not seen such an open door to a server???
add action=dst-nat chain=dstnat comment=“DMZ HOST” in-interface=ether1
to-addresses=172.26.0.200