I was going crazy trying to figure out why when I was setting up port forwarding just like the wiki was showing that I could sometimes remote ssh in and other times the connection was refused until on a whim I decided to look at my fail2ban log.
I use fail2ban on the only computer I allow external ssh connections to and I noticed that all the connection attempts were coming from 192.168.0.1 which is the IP assigned to my CRS125 but I'm pretty sure the are break-in attemps from external IP's.
Well no WONDER I had intermittent problems remoting in. The question is why?!?!
RouterOS 6.31
Code: Select all
[admin@MikroTik] > /ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 chain=srcnat action=masquerade out-interface=ether1-master-local log=no
log-prefix=""
1 chain=dstnat action=dst-nat to-addresses=192.168.0.2 protocol=tcp
dst-address=75.64.26.0/23 in-interface=ether1-master-local dst-port=22
log=yes log-prefix=""
Richard