Hello,
I have an EdgeRouter Pro with 3 network interfaces. eth0 is internet, eth1 is internal1, eth2 is another internal2.
The goal is to enable http://publicip:4401 from the outside Internet to reach internal2:443
I feel as if I followed all the instructions I've seen correctly. I even have other externa<->internal working (that have the same ports on both sides) yet this one is not.
Could you please help me out?
NOTE: I've sanitized the confirmation. The public IP address is 2.2.2.2 there are 2 internal ip addresses, the 10.10.10.12 is the one I'm trying to get working (nat 2).
NOTE #2: The other NAT rule (rule 1) works just fine.
NOTE #3: There is no blocking of anything by any ISP.
Here is the rule I created for the firewall (only allow from home to private ip port 443):
rule 23 {
action accept
description "R710 https port 4401 from home"
destination {
address 10.10.10.12
port 443
}
log disable
protocol tcp
source {
address 66.66.66.66
}
}
}
Here is the NAT rule I created to turn external 4401 into internal 443:
rule 2 {
description "R710 10.10.10.12"
destination {
address 2.2.2.2
port 4401
}
inbound-interface eth0
inside-address {
address 10.10.10.12
port 443
}
log enable
protocol tcp
type destination
}
Here is the entire config:
firewall {
all-ping enable
broadcast-ping disable
ipv6-receive-redirects disable
ipv6-src-route disable
ip-src-route disable
log-martians enable
name WAN_IN {
default-action drop
description "WAN to internal"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 21 {
action accept
description ssh
destination {
port 22
}
log disable
protocol tcp
source {
}
}
rule 22 {
action accept
description "mstsc to vmforsystem"
destination {
address 10.10.20.3
port 3389
}
log disable
protocol tcp_udp
source {
address 66.66.66.66
}
}
rule 23 {
action accept
description "R710 https port 4401 from home"
destination {
address 10.10.10.12
port 443
}
log disable
protocol tcp
source {
address 66.66.66.66
}
}
}
name WAN_LOCAL {
default-action drop
description "WAN to router"
rule 10 {
action accept
description "Allow established/related"
state {
established enable
related enable
}
}
rule 20 {
action drop
description "Drop invalid state"
state {
invalid enable
}
}
rule 21 {
action accept
description ssh
destination {
port 22
}
log disable
protocol tcp
source {
address 66.66.66.66
}
}
rule 22 {
action accept
description "Allow HTTPS from home"
destination {
port 443
}
protocol tcp
source {
address 66.66.66.66
}
}
}
receive-redirects disable
send-redirects enable
source-validation disable
syn-cookies enable
}
interfaces {
ethernet eth0 {
address 2.2.2.2/29
description Internet
duplex auto
firewall {
in {
name WAN_IN
}
local {
name WAN_LOCAL
}
}
speed auto
}
ethernet eth1 {
address 10.10.10.2/24
description "VLAN20 Mgmt"
duplex auto
speed auto
}
ethernet eth2 {
address 10.10.20.2/24
description "VLAN30 Firewall Public"
duplex auto
speed auto
}
ethernet eth3 {
duplex auto
speed auto
}
ethernet eth4 {
duplex auto
speed auto
}
ethernet eth5 {
duplex auto
speed auto
}
ethernet eth6 {
duplex auto
speed auto
}
ethernet eth7 {
duplex auto
speed auto
}
loopback lo {
}
}
port-forward {
auto-firewall enable
hairpin-nat enable
lan-interface eth2
lan-interface eth1
wan-interface eth0
}
service {
dns {
forwarding {
cache-size 150
listen-on eth1
listen-on eth2
}
}
gui {
https-port 443
}
nat {
rule 1 {
description "mstsc to vmforsystem"
destination {
address 2.2.2.2
port 3389
}
inbound-interface eth0
inside-address {
address 10.10.20.3
port 3389
}
log enable
protocol tcp_udp
type destination
}
rule 2 {
description "R710 10.10.10.12"
destination {
address 2.2.2.2
port 4401
}
inbound-interface eth0
inside-address {
address 10.10.10.12
port 443
}
log enable
protocol tcp
type destination
}
rule 5010 {
description "masquerade for WAN"
outbound-interface eth0
type masquerade
}
}
ssh {
port 22
protocol-version v2
}
}
system {
gateway-address 2.2.2.1
host-name ubnt
login {
user ubnt {
authentication {
encrypted-password ****************
}
level admin
}
}
name-server 8.8.8.8
ntp {
server 0.ubnt.pool.ntp.org {
}
server 1.ubnt.pool.ntp.org {
}
server 2.ubnt.pool.ntp.org {
}
server 3.ubnt.pool.ntp.org {
}
}
syslog {
global {
facility all {
level notice
}
facility protocols {
level debug
}
}
}
time-zone UTC
}
Thanks in advance!!