Merge remote-tracking branch 'origin/main'
This commit is contained in:
		
							
								
								
									
										20
									
								
								IT/RouterOS port forwarding.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										20
									
								
								IT/RouterOS port forwarding.md
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,20 @@ | ||||
| To port forward with RouterOS, you need allow the port through the firewall, *and* actually forward traffic | ||||
| # Allow through the firewall | ||||
| 1. Navigate to IP > Firewall from the sidebar, then go to the Filter Rules tab from the top | ||||
| 2. Select `Add New` to create a new rule | ||||
| 3. Set `Dst. Address` to the internal IP you want to allow traffic to | ||||
| 4. Set `Protocol` to `6 (tcp)` | ||||
| 5. Set `Dst. Port` to the port you want to allow traffic through | ||||
| 6. Set `In. Interface List` to `all` (I'm sure this isn't the most correct option), but it works | ||||
| 7. Set `Action` to `accept` | ||||
| 8. (Optionally) add a comment explaining what you're doing | ||||
| # Forward traffic | ||||
| 1. Navigate to IP > Firewall  from the sidebar, then go to the NAT tab from the top | ||||
| 2. Select `Add New` to create a new rule | ||||
| 3. Set `Chain` to `dstnat`, set `Protocol` to `6 (tcp)` | ||||
| 4. Set `Dst. Port` to the port you want to forward | ||||
| 5. Set `In. Interface List` to `WAN` | ||||
| 6. Set `Action` to `dst-nat` | ||||
| 7. Set `To Addresses` to the internal IP you want the traffic to go to | ||||
| 8. (Optionally) add a comment explaining what you're doing | ||||
|  | ||||
| @@ -53,4 +53,7 @@ arc@apollo-vm:/etc/nginx$ sudo ip addr show enX0 | ||||
| 
 | ||||
| The server now starts without issue. | ||||
| 
 | ||||
| After going through that headache, I now believe that we're back to square 1, and we have 2 IPs that both need to listen externally on 443.  | ||||
| After going through that headache, I now believe that we're back to square 1, and we have 2 IPs that both need to listen externally on 443.  | ||||
| 
 | ||||
| # Outcome | ||||
| I ended up spinning up a new openvpn server on TCP/3389 for RDP | ||||
		Reference in New Issue
	
	Block a user
	 zleyyij
					zleyyij