I am struggling to understand why I am getting DST NAT rule hits on traffic that is blocked by the firewall.
For example, with following config:
Code: Select all
/ip/firewall/filter/ add chain=forward src-address=100.100.100.100 dst-address=192.168.200.10 dst-port=22 protocol=tcp action=accept
/ip/firewall/filter/ add chain=forward in-interface=WAN action=drop
/ip/firewall/nat/add chain=dstnat dst-address=200.200.200.200 dst-port=22 protocol=tcp in-interface-list=WAN action=dst-nat to-addresses=192.168.200.10 to-ports=22
I tested it with random public IPs -> session does not get established (as it shouldn't, since there is a whitelist), but hit counter goes up.
Is this normal MT behavior? I would expect traffic getting blocked by the FW to not trigger any NAT activity.
Thank you.
Kind Regards
Gomo