I am trying to port forward to 2 ports, 1212 and 1250 so that a customers software will connect externally to the server on 192.168.1.64
The REALLY frustrating thing is I configured it and tested the ports and they worked but now won't.
I have spoken to the ISP and they are not blocking it at all. I amntearing my hair out so please help
Config attached
Code: Select all
[admin@MikroTik] > export
# may/10/2022 16:20:40 by RouterOS 6.47.9
# software id = AH1F-487G
#
# model = RB760iGS
/interface bridge
add admin-mac=DC:2C:6E:01:61:AE auto-mac=no \
comment=defconf name=bridge
/interface vlan
add interface=ether1 name=ufb-vlan10 vlan-id=10
/interface list
add comment=defconf name=WAN
add comment=defconf name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=\
MikroTik
/ip hotspot profile
set [ find default=yes ] html-directory=\
flash/hotspot
/ip pool
add name=dhcp ranges=192.168.1.10-192.168.1.200
add name=dhcp_pool1 ranges=\
192.168.1.10-192.168.1.220
/ip dhcp-server
add address-pool=dhcp disabled=no interface=\
bridge name=defconf
/interface bridge port
add bridge=bridge comment=defconf interface=\
ether2
add bridge=bridge comment=defconf interface=\
ether3
add bridge=bridge comment=defconf interface=\
ether4
add bridge=bridge comment=defconf interface=\
ether5
add bridge=bridge comment=defconf interface=sfp1
/ip neighbor discovery-settings
set discover-interface-list=LAN
/interface list member
add comment=defconf interface=bridge list=LAN
add comment=defconf interface=ufb-vlan10 list=\
WAN
/ip address
add address=192.168.1.1/24 comment=defconf \
interface=ether2 network=192.168.1.0
/ip cloud
set ddns-enabled=yes
/ip dhcp-client
add comment=defconf disabled=no interface=\
ufb-vlan10
/ip dhcp-server network
add address=192.168.1.0/24 comment=defconf \
dns-server=103.212.xx.x,8.8.8.8 gateway=\
192.168.1.1 netmask=24
/ip dns static
add address=192.168.1.1 comment=defconf name=\
router.lan
/ip firewall address-list
add address=192.168.1.0/24 list=LAN
add address=103.212.xx.0/24 list=WAN
/ip firewall filter
add action=accept chain=forward comment=\
"defconf: accept out ipsec policy" \
ipsec-policy=out,ipsec
add action=accept chain=forward comment=\
"defconf: accept in ipsec policy" \
ipsec-policy=in,ipsec
add action=accept chain=input comment="defconf: a\
ccept established,related,untracked" \
connection-state=\
established,related,untracked
add action=accept chain=forward \
connection-state=established
add action=accept chain=forward \
connection-nat-state=dstnat \
connection-state=""
add action=accept chain=forward comment="defconf:\
\_accept established,related, untracked" \
connection-state=\
established,related,untracked
add action=accept chain=input comment=\
"defconf: accept ICMP" protocol=icmp
add action=accept chain=input comment="defconf: a\
ccept to local loopback (for CAPsMAN)" \
dst-address=127.0.0.1
add action=accept chain=input dst-port=8291 \
protocol=tcp
add action=fasttrack-connection chain=forward \
comment="defconf: fasttrack" \
connection-state=established,related
add action=drop chain=input comment=\
"defconf: drop invalid" connection-state=\
invalid
add action=drop chain=input comment=\
"defconf: drop all not coming from LAN" \
in-interface-list=LAN
add action=drop chain=forward comment=\
"defconf: drop invalid" connection-state=\
invalid
add action=drop chain=forward comment=\
"defconf: drop all from WAN not DSTNATed" \
connection-nat-state=!dstnat \
connection-state=new in-interface-list=WAN
add action=accept chain=forward comment=\
"allow port forwarding" \
connection-nat-state=dstnat \
connection-state=new in-interface-list=WAN
/ip firewall nat
add action=masquerade chain=srcnat comment=\
"defconf: masquerade" ipsec-policy=out,none \
out-interface-list=WAN
add action=dst-nat chain=dstnat comment=\
"Software allow from home" dst-port=1212 \
in-interface-list=WAN protocol=tcp \
to-addresses=192.168.1.64 to-ports=1212
add action=dst-nat chain=dstnat comment=\
"Software allow from home" dst-port=1212 \
in-interface-list=WAN protocol=udp \
to-addresses=192.168.1.64 to-ports=1212
add action=dst-nat chain=dstnat comment=\
"Software allow from home SSL" disabled=yes \
dst-port=8443 in-interface-list=WAN \
protocol=udp to-addresses=192.168.1.64 \
to-ports=1212
add action=dst-nat chain=dstnat comment=\
"Software allow from home" dst-port=1250 \
in-interface-list=WAN protocol=tcp \
to-addresses=192.168.1.64 to-ports=1250
add action=dst-nat chain=dstnat comment=\
"Software allow from home SSL" disabled=yes \
dst-port=8443 in-interface-list=WAN \
protocol=tcp to-addresses=192.168.1.64 \
to-ports=1250
add action=dst-nat chain=dstnat comment=\
"Software allow from home" dst-port=1250 \
in-interface-list=WAN protocol=udp \
to-addresses=192.168.1.64 to-ports=1250
add action=dst-nat chain=dstnat disabled=yes \
dst-address=139.5.166.151 to-addresses=\
192.168.1.64
/ip service
set telnet disabled=yes
set ftp disabled=yes
set www address=192.168.1.0/24
set ssh address=192.168.1.0/24
set www-ssl disabled=no
set api disabled=yes
set winbox address=192.168.1.0/24
set api-ssl disabled=yes
/system clock
set time-zone-name=Pacific/Auckland
/tool mac-server
set allowed-interface-list=LAN
/tool mac-server mac-winbox
set allowed-interface-list=LAN