My NAT rules are pretty simple:
Code: Select all
/ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; defconf: masquerade
chain=srcnat action=masquerade out-interface-list=WAN ipsec-policy=out,none
1 chain=dstnat action=dst-nat to-addresses=y.y.y.y to-ports=80 protocol=tcp dst-address=x.x.x.x dst-port=80 log=no
log-prefix=""
2 chain=dstnat action=dst-nat to-addresses=y.y.y.y to-ports=443 protocol=tcp dst-address=x.x.x.x dst-port=443 log=no
log-prefix=""
Unfortunately the Torch tool does not show anything about how the traffic is "translated" by destnat, what the final destination port is and such.
Any ideas what could be going on here or how to debug this?