Set up a dstnat rule (one of many) to forward port XXXX from the WAN to port 22 on a specific host on the wLAN. Using an android phone (with Termux) to ssh to the public IP of the MikroTik-gw. Torch and Packet sniffer on this router can see packet arriving with dst port XXXX. Can't find a packet directed to the host after that. Monitored the bridge looking for the IP and any with dst port 22--nothing. Disabled FastTrack f/w rule. Added rules to three chains in attempt to accept packets. Suggestions solicited.
Thanks in advance.
The export file:
Thanks in advance.
The export file:
Code:
# mar/29/2024 14:13:50 by RouterOS 6.49.10# software id = 52xxx## model = RouterBOARD 952Ui-///# serial number = 71AF////interface wirelessset [ find default-name=wlan1 ] band=2ghz-b/g/n channel-width=20/40mhz-XX \ disabled=no distance=indoors frequency=auto installation=indoor mode=\ ap-bridge ssid=/// wireless-protocol=802.11 wps-mode=disabledset [ find default-name=wlan2 ] band=5ghz-a/n/ac channel-width=\ 20/40/80mhz-XXXX disabled=no distance=indoors frequency=auto \ installation=indoor mode=ap-bridge ssid=/// wireless-protocol=\ 802.11 wps-mode=disabled/interface bridgeadd admin-mac=B8:69:F4:1D:6B:C0 auto-mac=no comment=defconf name=bridge/interface listadd comment=defconf name=WANadd comment=defconf name=LAN/interface wireless security-profilesset [ find default=yes ] authentication-types=wpa2-psk mode=dynamic-keys \ supplicant-identity=M/// wpa2-pre-shared-key=xxx/ip pooladd name=default-dhcp ranges=192.168.88.10-192.168.88.254add name=pool10 ranges=10.10.10.10-10.10.10.19/ip dhcp-serveradd address-pool=default-dhcp disabled=no interface=bridge name=defconfadd address-pool=pool10 disabled=no interface=ether3 name=server10/interface bridge portadd bridge=bridge comment=defconf interface=ether2add bridge=bridge comment=defconf disabled=yes interface=ether3add bridge=bridge comment=defconf interface=ether4add bridge=bridge comment=defconf interface=ether5add bridge=bridge comment=defconf interface=wlan1add bridge=bridge comment=defconf interface=wlan2/ip neighbor discovery-settingsset discover-interface-list=LAN/interface list memberadd comment=defconf interface=bridge list=LANadd comment=defconf interface=ether1 list=WANadd interface=ether3 list=LAN/ip addressadd address=192.168.88.1/24 comment=defconf interface=bridge network=\ 192.168.88.0add address=10.10.10.1/24 interface=ether3 network=10.10.10.0/ip dhcp-clientadd comment=defconf disabled=no interface=ether1/ip dhcp-server leaseadd address=192.168.88.245 mac-address=1C:6F:65:21:95:8C server=defconfadd address=192.168.88.239 client-id=1:14:cb:19:97:d6:ba mac-address=\ 14:CB:19:97:D6:BA server=defconfadd address=10.10.10.10 client-id=1:b8:69:///:aa mac-address=\ B8:69:F4:47:5D:AA server=server10add address=192.168.88.228 mac-address=B0:A4:/// server=defconfadd address=192.168.88.249 client-id=1:14:4f:8a:c7:36:a2 mac-address=\ 14:4F:8A:/// server=defconf/ip dhcp-server networkadd address=10.10.10.0/24 gateway=10.10.10.10 netmask=24add address=192.168.88.0/24 comment=defconf dns-server=192.168.88.1 gateway=\ 192.168.88.1/ip dnsset allow-remote-requests=yes/ip dns staticadd address=192.168.88.1 comment=defconf name=router.lan/ip firewall filteradd action=accept chain=input comment="defconf: accept dstnat" \ connection-nat-state=dstnat in-interface=all-ethernetadd action=accept chain=input comment="accept icmpt" in-interface=\ all-ethernet protocol=icmpadd action=accept chain=input comment="accept tcp" in-interface=all-ethernet \ protocol=tcpadd action=accept chain=input comment=\ "defconf: accept established,related,untracked" connection-state=\ established,related,untrackedadd action=drop chain=input comment="defconf: drop invalid" connection-state=\ invalidadd action=accept chain=input comment=\ "defconf: accept to local loopback (for CAPsMAN)" dst-address=127.0.0.1add action=drop chain=input comment="defconf: drop all not coming from LAN" \ in-interface-list=!LANadd action=accept chain=forward comment="defconf: accept in ipsec policy" \ ipsec-policy=in,ipsecadd action=accept chain=forward comment="defconf: accept out ipsec policy" \ ipsec-policy=out,ipsecadd action=fasttrack-connection chain=forward comment="defconf: fasttrack" \ connection-state=established,related disabled=yesadd action=accept chain=forward comment=\ "defconf: accept established,related, untracked" connection-state=\ established,related,untrackedadd action=accept chain=forward comment=" accept new " connection-state=newadd action=drop chain=forward comment="defconf: drop invalid" \ connection-state=invalidadd action=drop chain=forward comment=\ "defconf: drop all from WAN not DSTNATed" connection-nat-state=!dstnat \ connection-state=new in-interface-list=WANadd action=accept chain=output connection-nat-state=dstnat dst-port=22 \ protocol=tcp/ip firewall natadd action=masquerade chain=srcnat comment="defconf: masquerade" \ ipsec-policy=out,none out-interface-list=WANadd action=dst-nat chain=dstnat dst-port=YYYY protocol=tcp to-addresses=\ 192.168.55.247 to-ports=2222add action=dst-nat chain=dstnat dst-port=ZZZZ in-interface=all-ethernet \ protocol=tcp to-addresses=192.168.55.228 to-ports=22/ip routeadd distance=1 dst-address=192.168.55.0/24 gateway=10.10.10.10/ip serviceset ssh address=0.0.0.0/0/system clockset time-zone-name=America/New_York/system identityset name=MikroTik-gw/tool mac-serverset allowed-interface-list=LAN/tool mac-server mac-winboxset allowed-interface-list=LAN/tool snifferset filter-interface=bridge filter-operator-between-entries=and filter-port=\ ssh
Statistics: Posted by ckonsultor — Fri Mar 29, 2024 9:03 pm