I had added the following under ip firewall nat:
Code:Select all
0 chain=srcnat action=masquerade src-address=192.168.1.0/24 out-interface=WAN 1 chain=dstnat action=dst-nat to-addresses=192.168.1.10 protocol=tcp in-interface=WAN dst-port=3389 2 chain=dstnat action=dst-nat to-addresses=192.168.1.1 to-ports=8291 protocol=tcp in-interface=WAN dst-port=8291
Code:Select all
0 ;;; Allow esatblished connections chain=input action=accept connection-state=established 1 ;;; Allow related connections chain=input action=accept connection-state=related 2 ;;; Drop invalid connections chain=input action=drop connection-state=invalid 3 ;;; Allow UDP chain=input action=accept protocol=udp 4 ;;; Allow ICMP chain=input action=accept protocol=icmp 5 ;;; Allow connection to router from local network chain=input action=accept in-interface=!WAN 6 ;;; Drop everything else chain=input action=drop 7 chain=forward action=jump jump-target=customer in-interface=WAN 8 ;;; Drop invalid connection packets chain=customer action=drop connection-state=invalid 9 ;;; Allow established connections chain=customer action=accept connection-state=established 10 ;;; Allow related connections chain=customer action=accept connection-state=related 11 ;;; Log dropped connections chain=customer action=log log-prefix="customer_drop" 12 ;;; Drop and log everything else chain=customer action=drop
Is there something i've setup incorrectly in the filter rules that is not allowing the nat rules to function?