Hello All,
I am new here, please assist / advise or point me in the right direction.
hoping ZeroByte can assist / help.
I have a public ddns hostname, i have a script that binds the hostname to my dynamically assigned WAN IP.
ISSUE: I am able to access port 4003 from externally example:
http://MYDDNSHOSTNAME:4003 it works perfectly, when i do it internally, it also does work, and i can see the "Hairpin NAT for LOCAL Traffic" does accumale packets.
Is my sharepoint server just dead ? because for some reason it continues to timeout
note: adsl router is configured in bridged mode
note: i am aware that TPOT honeypot service can cause all ports to be used by the TPOT service - I have temporarily turned off the VM.
mikrotik eth1 goes to adsl router
mikrotik eth2 goes to LAN (bridged wlan+lan to have 1 dhcp server serving both LAN and WLAN)
my WAN interface = pppoe namely "MWEB"
mikrotik IP 10.0.0.1
network 10.0.0.0/24
/ip firewall nat print
[admin@Franna-RB2011UiAS-2HnD] > ip firewall nat print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; ZZZ - NAT MWEB Traffic
chain=srcnat action=masquerade out-interface=MWEB log=no log-prefix=""
1 ;;; ZZZ - Hairpin NAT for LOCAL Traffic
chain=srcnat action=masquerade src-address=10.0.0.0/24 dst-address=10.0.0.0/24 dst-address-type="" out-interface=WLAN-LAN Bridge log=no
log-prefix=""
2 ;;; ZZZ - HP Aruba WEB GUI
chain=dstnat action=dst-nat to-addresses=10.0.0.5 to-ports=80 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=4003
log=no log-prefix=""
3 ;;; ZZZ - RDP Port Connection - Francois-PC
chain=dstnat action=dst-nat to-addresses=10.0.0.20 to-ports=3389 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=4001
log=no log-prefix=""
4 ;;; test multiple hops
chain=dstnat action=dst-nat to-addresses=10.0.0.5 to-ports=80 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=5555
log=no log-prefix=""
5 ;;; ZZZ - RDP Port Connection - Franna-WS
chain=dstnat action=dst-nat to-addresses=10.0.0.21 to-ports=3389 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=4002
log=no log-prefix=""
6 ;;; ZZZ - VM - SharePoint - RDP
chain=dstnat action=dst-nat to-addresses=10.0.0.7 to-ports=3389 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=4004
log=no log-prefix=""
7 ;;; ZZZ - VM - SharePoint WEB
chain=dstnat action=dst-nat to-addresses=10.0.0.17 to-ports=80 protocol=tcp dst-address-type=local dst-port=4005 log=no log-prefix=""
8 ;;; ZZZ - VM - IIS Server
chain=dstnat action=dst-nat to-addresses=10.0.0.16 to-ports=80 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=4007
log=no log-prefix=""
9 ;;; ZZZ -TeamSpeak - Connection
chain=dstnat action=dst-nat to-addresses=10.0.0.25 to-ports=9987 protocol=udp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=9987
log=no log-prefix=""
10 ;;; ZZZ - TeamSpeak - FileTransfer
chain=dstnat action=dst-nat to-addresses=10.0.0.25 to-ports=30033 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local
dst-port=30033 log=no log-prefix=""
11 ;;; TPOT - Glastopf - TCP Port 80
chain=dstnat action=dst-nat to-addresses=10.0.0.54 to-ports=80 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=80
log=no log-prefix=""
12 ;;; TPOT - Dionaea - TCP Port 42
chain=dstnat action=dst-nat to-addresses=10.0.0.54 to-ports=42 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=42
log=no log-prefix=""
13 ;;; TPOT - Dionaea - TCP Port 135
chain=dstnat action=dst-nat to-addresses=10.0.0.54 to-ports=135 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=135
log=no log-prefix=""
14 ;;; TPOT - Dionaea - TCP Port 443
chain=dstnat action=dst-nat to-addresses=10.0.0.54 to-ports=443 protocol=tcp dst-address=!10.0.0.0/24 dst-address-type=local dst-port=443
/ip firewall filter print
[admin@Franna-RB2011UiAS-2HnD] /ip firewall filter> print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; Drop ICMP
chain=input action=drop protocol=icmp log=no log-prefix=""
1 X ;;; Drop ALL Traffic --FROM-- Blacklisted IP's (blacklist)
chain=input action=drop src-address-list=blacklist log=no log-prefix=""
2 X ;;; Drop ALL Traffic --TO-- Blacklisted IP's (blacklist)
chain=forward action=drop dst-address-list=blacklist log=no log-prefix=""
3 ;;; Drop WAN Invalid Connections
chain=input action=drop connection-state=invalid protocol=tcp log=no log-prefix=""
4 ;;; Drop LAN Invalid Connections
chain=forward action=drop connection-state=invalid protocol=tcp log=no log-prefix=""
5 ;;; Accept Established Connection Packets
chain=input action=accept connection-state=established log=no log-prefix=""
6 ;;; Allow Related Connections
chain=forward action=accept connection-state=related log=no log-prefix=""
7 ;;; Deny DNS Request - UDP
chain=imput action=drop connection-state=new protocol=udp in-interface=MWEB dst-port=53 log=no log-prefix=""
8 ;;; Deny DNS Request - TCP
chain=imput action=drop connection-state=new protocol=tcp in-interface=MWEB dst-port=53 log=no log-prefix=""
9 ;;; Net unreachable
chain=icmp action=accept protocol=icmp icmp-options=3:0 log=no log-prefix=""
10 ;;; Host unreachable
chain=icmp action=accept protocol=icmp icmp-options=3:1 log=no log-prefix=""
11 ;;; Host unreachable fragmentation required
chain=icmp action=accept protocol=icmp icmp-options=3:4 log=no log-prefix=""
12 ;;; Detect and drop port scan connections
chain=input action=drop protocol=tcp psd=21,3s,3,1 log=no log-prefix=""
13 ;;; Allow source quench
chain=icmp action=accept protocol=icmp icmp-options=4:0 log=no log-prefix=""
14 ;;; Echo reply
chain=icmp action=accept protocol=icmp icmp-options=0:0 log=no log-prefix=""
15 ;;; Allow echo request
chain=icmp action=accept protocol=icmp icmp-options=8:0 log=no log-prefix=""
16 ;;; Allow time exceed
chain=icmp action=accept protocol=icmp icmp-options=11:0 log=no log-prefix=""
17 ;;; Allow parameter bad
chain=icmp action=accept protocol=icmp icmp-options=12:0 log=no log-prefix=""
18 ;;; Deny all other types
chain=icmp action=drop log=no log-prefix=""
19 ;;; Generic Routing Encapsulation (GRE)
chain=input action=accept protocol=gre log=no log-prefix=""
20 ;;; PPTP
chain=input action=accept protocol=tcp dst-port=1723 log=no log-prefix=""
21 ;;; SSH - Failure logon Stage 1
chain=input action=add-src-to-address-list connection-state=new protocol=tcp address-list=ssh_stage1 address-list-timeout=1m dst-port=4000
log=no log-prefix=""
22 ;;; SSH - Failure logon Stage 2
chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage1 address-list=ssh_stage2
address-list-timeout=1m dst-port=4000 log=no log-prefix=""
23 ;;; SSH - Failure logon Stage 3
chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage2 address-list=ssh_stage3
address-list-timeout=1m dst-port=4000 log=no log-prefix=""
24 ;;; SSH - Added to Blacklist
chain=input action=add-src-to-address-list connection-state=new protocol=tcp src-address-list=ssh_stage3 address-list=blacklist
address-list-timeout=1w3d dst-port=4000 log=no log-prefix=""
25 ;;; FTP Login Rate 10/Min
chain=output action=accept protocol=tcp content=530 Login incorrect dst-limit=1/1m,9,dst-address/1m log=no log-prefix=""
26 ;;; Deny NFS
chain=udp action=drop protocol=udp dst-port=2049 log=no log-prefix=""
27 ;;; Detect DoS attack
chain=input action=add-src-to-address-list connection-limit=10,32 protocol=tcp address-list=blacklist address-list-timeout=1d log=no
log-prefix=""
28 ;;; Deny TFTP
chain=tcp action=drop protocol=tcp dst-port=69 log=no log-prefix=""
29 ;;; Deny RPC portmapper
chain=tcp action=drop protocol=tcp dst-port=111 log=no log-prefix=""
30 ;;; Deny NBT
chain=tcp action=drop protocol=tcp dst-port=137-139 log=no log-prefix=""
31 ;;; Deny CIFS
chain=tcp action=drop protocol=tcp dst-port=445 log=no log-prefix=""
32 ;;; Deny NFS
chain=tcp action=drop protocol=tcp dst-port=2049 log=no log-prefix=""
33 ;;; Deny NetBus
chain=tcp action=drop protocol=tcp dst-port=12345-12346 log=no log-prefix=""
34 ;;; Deny NetBus
chain=tcp action=drop protocol=tcp dst-port=20034 log=no log-prefix=""
35 ;;; Deny Back Oriffice
chain=tcp action=drop protocol=tcp dst-port=3133 log=no log-prefix=""
36 ;;; Deny DHCP
chain=tcp action=drop protocol=tcp dst-port=67-68 log=no log-prefix=""
37 ;;; Deny RPC portmapper
chain=tcp action=drop protocol=tcp dst-port=135 log=no log-prefix=""
38 ;;; Deny TFTP
chain=udp action=drop protocol=udp dst-port=69 log=no log-prefix=""
39 ;;; Deny PRC portmapper
chain=udp action=drop protocol=udp dst-port=111 log=no log-prefix=""
40 ;;; Deny PRC portmapper
chain=udp action=drop protocol=udp dst-port=135 log=no log-prefix=""
41 ;;; Deny NBT
chain=udp action=drop protocol=udp dst-port=137-139 log=no log-prefix=""
42 ;;; Deny Back Oriffice
chain=udp action=drop protocol=udp dst-port=3133 log=no log-prefix=""
43 X ;;; Block Facebook
chain=forward action=drop layer7-protocol=Block Facebook log=no log-prefix=""
44 X ;;; Block Youtube
chain=forward action=drop layer7-protocol=Block Youtube log=no log-prefix=""
Please advise if this is correct or not, this might be completely off!
Please let me know what filter rules doesn't make sense / unnecessary
Thanks in advance wonderful people, please explain nicely because i feel like a retard, i just don't get why some of my services works and others don't.
Regards,
Brillo