Hi Guys
I am using Mikrotik 3.23 on a RB450 with three interfaces enabled. WAN1, WAN2 and LOCAL
LOCAL ip = 192.168.10.254 and connected to a ISA server (forefront threat management gateway) whose ip is 192.168.10.1
WAN1 ip is 192.168.11.1 and connects to a adsl modem with ip = 192.168.11.254
WAN2 ip is 196.30.94.12 and is connected to a adsl router so its an external ip (5 available)
I have two nat rules setup for both wan ports, but I have noticed I could also create 1 nat (masquerade) rule and set the interface to !LOCAL
Is this better than having two nat rules?
I also mangle traffic so I can choose which gateway - reading the manuals I cant find the best way to do it. I see in most examples you first do a connection mark, then using that connection mark you do a packet mark. with that approach you tick passthrough in the first rule so the second one take effect but no passthrough on the second one. I understand that but I dont know how to route through different gateways without doing a routing mark - I can't find any docs on whether you must first do the routing mark, or first do a connection mark etc.
Could someone advice me the best approach eg: First do a connection mark, then packet mark, then routing mark... or maybe I got it totally wrong.
What I also notice is that not all packets are marked - when I examine the connections in the firewall I can see other connections to the same dst port I specified in mangle. eg I create a mangle rule for dst port = 443 , in interface = local , action = mark connection, chain = prerouting but I see other connections popping up all the time destined for 443 but without the connection mark.
Again - am I doing it correct, I have tried the anyport option, and I seem to be marking more of them that way. Should I choose the interface the traffic arrives on or leave it for all interfaces. I need to access the ISA server using ssl from the web and I can get that right. I know how to do the inbound nat to the isa server wan nic, but this breaks when I forward all unknown traffic through wan2 and try to enter using ssl from WAN1
I create a new routing mark - ssl-route , the add a route that routes all traffic with that mark through WAN1 so from inside the ISA server ssl traffic goes out on WAN1
i do similar for DNS, FTP, and some other protocals. Inbound VPN is also working through the Mikrotik to the ISA server.
I create one final routing mark for all other outbound traffic and that breaks everyting if I route it through a different WAN (wan2)- when I say breaks everything I am only referring to access from outside. From inside to outside everything always works.
I've tried so many different configs, using either prerouting, or forward , passthrough , no passthrough, dst port, src port, any port, etc in so many different setups I can't remember all I have tired. Can anyone post a config of a stable system - I can figure it out from there....
Thanks in advance
Regards
Basil