( I have edited the info below)
I would like to log on device (10.0.0.1) any activity using
/ip firewall nat
add action=dst-nat chain=dstnat comment=Server01 dst-address=(Public IP) dst-port=1111 protocol=tcp to-addresses=10.0.0.2 to-ports=22
On one of my radius servers I noticed a lot of failed login attempts - The failed login attempts cease when I disable the above nat rule!
May 30 14:02:03 Server01 sshd[10534]: Failed password for invalid user osm from 10.0.0.1 port 63881 ssh2
May 30 14:02:11 Server01 sshd[10546]: Failed password for invalid user css from 10.0.0.1 port 37854 ssh2
May 30 14:02:15 Server01 sshd[10553]: Failed password for invalid user taoj from 10.0.0.1 port 53222 ssh2
May 30 14:02:28 Server01 sshd[10592]: Failed password for invalid user training from 10.0.0.1 port 37326 ssh2
May 30 14:02:35 Server01 sshd[10617]: Failed password for invalid user odoo from 10.0.0.1 port 54818 ssh2
May 30 14:02:36 Server01 sshd[10620]: Failed password for nagios from 10.0.0.1 port 35296 ssh2
May 30 14:02:40 Server01 sshd[10632]: Failed password for invalid user vaishnavi from 10.0.0.1 port 39124 ssh2
May 30 14:02:51 Server01 sshd[10786]: Failed password for invalid user hduser from 10.0.0.1 port 52066 ssh2
May 30 14:02:59 Server01 sshd[10825]: Failed password for invalid user ubuntu from 10.0.0.1 port 44324 ssh2
May 30 14:03:05 Server01 sshd[10838]: Failed password for invalid user laijizheng from 10.0.0.1 port 44216 ssh2
May 30 14:03:11 Server01 sshd[10853]: Failed password for invalid user skrongren from 10.0.0.1 port 46834 ssh2