Unfortunately, when I try to check for the open port at http://www.canyouseeme.org/, I get a timeout - as in, the port isn’t open.
I’m wondering if my firewall rules (that I also found around here somewhere a couple months back when I first got this router) are interfering with the attempt to forward port 8096?
[admin@MikroTik] > /ip firewall filter print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Disallow weird packets
chain=input action=drop connection-state=invalid log=no log-prefix=""
1 ;;; Allow LAN access to the router itself
chain=input action=accept connection-state=new in-interface=bridge-local log=no log-prefix=""
2 ;;; ^^ that originated from LAN
chain=input action=accept connection-state=established log=no log-prefix=""
3 ;;; ^^ that originated from LAN
chain=input action=accept connection-state=related log=no log-prefix=""
4 ;;; Allow ping ICMP from anywhere
chain=input action=accept protocol=icmp log=no log-prefix=""
5 ;;; Disallow anything else
chain=input action=drop log=no log-prefix=""
6 ;;; Disallow weird packets
chain=forward action=drop connection-state=invalid log=no log-prefix=""
7 ;;; Allow LAN access to move through the router
chain=forward action=accept connection-state=new in-interface=bridge-local log=no log-prefix=""
8 ;;; ^^ that originated from LAN
chain=forward action=accept connection-state=established log=no log-prefix=""
9 ;;; ^^ that originated from LAN
chain=forward action=accept connection-state=related log=no log-prefix=""
10 ;;; Disallow anything else
chain=forward action=drop log=no log-prefix=""
This advice is useless, because DST-NAT occurs before ‘forward’ chain firewall rules.
Look at packet flow diagram: http://wiki.mikrotik.com/wiki/Manual:Packet_Flow
Remove this part of your DST-NAT rule:
This is a great advise, since it won’t work without an accepted forward. If you look at the diagram, you will see that because[/] dst-nat occurs before routing, the packet gets new dest address and then is considered a forward packet during the route decision phase, and follows the forward path, including the forward filter chain
Another point to clarify to the TS is that the accept rule should be before any other forward rules in the chain, otherwise it will have no effect
No, packet is directly send to host specified in DST-NAT ‘to-addresses’ parameter.
I have a plenty of routers in customers’ offices and lot of DST-NAT rules.
They work properly without ‘allow’ rule in ‘forward’ chain.
Looks like firewall behaviour could be a question of opinion. Unfortunately my experience is that without explicit accepting rule in forward chain no packets are forwarded just because I have general drop on the end of each chain. Dst natted packets including. If the counters are not rising during the access test, there is firewall configuration error or just the packets didn’t reach the routers port from some reason. Many isps say something but do other things. Maybe they are not blocking anything, just do a nat too…
It is, but I don’t see where that’s getting me. I have a few things running right now, so there’s literally hundreds of connections to my PC (along with several each to my mobile and my wife’s laptop).