Hi,
I am new to work with mikrotik and I have a special question to real pros
I have installed 2 3CX servers in the same network.
3CX 1: 192.168.2.183
3CX 2: 192.168.2.182
My Firewall Config looks like this:
(PORTS FOR 3CX 1:)
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=5001 protocol=tcp dst-port=5001 in-interface-list=WAN comment="3CX Presence and Provisioning HTTPS"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=5060 protocol=udp dst-port=5060 in-interface-list=WAN comment="3CX SIP UDP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=5060 protocol=tcp dst-port=5060 in-interface-list=WAN comment="3CX SIP TCP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=5061 protocol=tcp dst-port=5061 in-interface-list=WAN comment="3CX SIP TLS"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=9000-10999 protocol=udp dst-port=9000-10999 in-interface-list=WAN comment="3CX Media UDP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=5090 protocol=tcp dst-port=5090 in-interface-list=WAN comment="3CX Tunnel TCP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.183 to-ports=5090 protocol=udp dst-port=5090 in-interface-list=WAN comment="3CX Tunnel UDP"
/ip firewall filter add chain=input action=accept connection-state=established comment="3CX"
/ip firewall filter add chain=input action=accept connection-state=related
/ip firewall filter add chain=forward action=accept connection-state=established
/ip firewall filter add chain=forward action=accept connection-state=related
/ip firewall filter add chain=forward action=drop connection-state=invalid
/ip firewall filter add chain=input action=drop in-interface=WAN
/ip firewall nat add chain=srcnat action=masquerade out-interface=WAN comment="3CX MASQ"
(PORTS FOR 3CX 2:)
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=5101 protocol=tcp dst-port=5101 in-interface-list=WAN comment="3CX-Test Presence and Provisioning HTTPS"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=5160 protocol=udp dst-port=5160 in-interface-list=WAN comment="3CX-Test SIP UDP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=5160 protocol=tcp dst-port=5160 in-interface-list=WAN comment="3CX-Test SIP TCP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=5161 protocol=tcp dst-port=5161 in-interface-list=WAN comment="3CX-Test SIP TLS"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=11000-12999 protocol=udp dst-port=11000-12999 in-interface-list=WAN comment="3CX-Test Media UDP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=5190 protocol=tcp dst-port=5190 in-interface-list=WAN comment="3CX-Test Tunnel TCP"
nat / ip防火墙添加链= = dst-nat t dstnat行动o-addresses=192.168.2.182 to-ports=5190 protocol=udp dst-port=5190 in-interface-list=WAN comment="3CX-Test Tunnel UDP"
everything works well except the firewall checker! It depends which rule regarding Media UDP is in front of the other. The first matching rule makes the configured server work. The other Server is getting error messages like "Full cone test failed" or "Mapping does not match [Port]. Mapping is [DifferentPort]"
No idea how to get this working?
bests, Christian