External scans of my public IP on the port show it as closed and I'm unable to netcat to the port validating that the port is truly blocked. The counters are staying at zero for the NAT rule 1 and filter 6 below as well so the rules aren't even receiving any packets. I've tried disabling the fastrack rule as well to see if it was causing the issues with no success.
Based on what I have read from other posts, the wiki, and other websites this should work, it's starting to make me wonder if other parts of the router aren't configured properly and might impact port forwarding.
I've also moved the ordering around for the filter chain which didn't change anything.
What could I be missing? Do I need to provide more information from the router?
Code: Select all
# jul/16/2018 23:31:02 by RouterOS 6.42.6
# software id = CPAM-LK5T
# model = RouterBOARD 3011UiAS
[admin@mikrotik-rt1] /ip firewall> nat print
Flags: X - disabled, I - invalid, D - dynamic
0 ;;; SRCNAT MASQUERADE
chain=srcnat action=masquerade out-interface=ether1 log=no log-prefix="" ipsec-policy=out,none
1 ;;; MAKE PLEX EXTERNALLY AVAILABLE
chain=dstnat action=dst-nat to-addresses=192.168.1.2 to-ports=32400 protocol=tcp dst-address=PUBLIC_IP_ADDRESS in-interface=ether1 src-port=32400 log=yes
log-prefix=""
[admin@mikrotik-rt1] /ip firewall> filter print
Flags: X - disabled, I - invalid, D - dynamic
0 D ;;; special dummy rule to show fasttrack counters
chain=forward action=passthrough
1 ;;; ALLOW ESTABLISHED,RELATED TO ROUTER
chain=input action=accept connection-state=established,related log=no log-prefix=""
2 ;;; ALLOW LAN TO ROUTER
chain=input action=accept src-address-list=allowed_to_rt1 log=no log-prefix=""
3 ;;; ALLOW ICMP TO ROUTER
chain=input action=accept protocol=icmp log=no log-prefix=""
4 ;;; DROP ANYTHING ELSE TO THE ROUTER
chain=input action=drop log=no log-prefix=""
5 ;;; FastTrack
chain=forward action=fasttrack-connection connection-state=established,related
6 ;;; ALLOW PLEX SERVICE
chain=forward action=accept connection-state=established,related connection-nat-state=dstnat protocol=tcp in-interface=ether1 dst-port=32400 log=no
log-prefix=""
7 ;;; ALLOW ESTABLISHED,RELATED TO INTERNAL
chain=forward action=accept connection-state=established,related log=no log-prefix=""
8 ;;; DROP INVALID TO INTERNAL
chain=forward action=drop connection-state=invalid log=yes log-prefix="invalid"
9 ;;; DROP TO NON-PUBLIC ADDRESSES FROM LAN
chain=forward action=drop dst-address-list=NotPublic in-interface=bridge out-interface=!bridge log=yes log-prefix="!public_from_LAN"
10 ;;; DROP INCOMING PACKETS THAT ARE NOT NATTED
chain=forward action=drop connection-state=new connection-nat-state=!dstnat in-interface=ether1 log=yes log-prefix="!NAT"
11 ;;; DROP INCOMING FROM INTERNET WHICH IS NOT PUBLIC IP
chain=forward action=drop src-address-list=not_in_internet dst-address-list=NotPublic in-interface=ether1 log=yes log-prefix="!public"
12 ;;; DROP PACKETS FROM LAN THAT DO NOT HAVE LAN IPS
chain=forward action=drop src-address=!192.168.1.0/24 in-interface=bridge log=yes log-prefix="LAN_!LAN"