Greetings,
When I enable logging for packets that are dropped in the input chain, I get flooded with entries that look like this:
input: in:Public DSL out:(none), src-mac 00:0f:cc:89:18:24, proto TCP (SYN,ACK), 72.246.103.18:80->75.54.4.45:2897, len 48
input: in:Public DSL out:(none), src-mac 00:0f:cc:89:18:24, proto TCP (RST), 66.135.217.231:80->75.54.4.45:3521, len 40
input: in:Public DSL out:(none), src-mac 00:0f:cc:89:18:24, proto TCP (SYN,ACK), 68.180.207.182:80->75.54.4.45:3641, len 44
input: in:Public DSL out:(none), src-mac 00:0f:cc:89:18:24, proto TCP (SYN,ACK), 68.180.207.182:80->75.54.4.45:3643, len 44
input: in:Public DSL out:(none), src-mac 00:0f:cc:89:18:24, proto TCP (SYN,ACK), 72.247.242.178:80->75.54.4.45:1378, len 48
input: in:Public DSL out:(none), src-mac 00:0f:cc:89:18:24, proto TCP (SYN,ACK), 68.180.195.221:80->75.54.4.45:3639, len 48
These appear to be responses from external servers to HTTP requests made by people on our back network.
As far as I understand, these responses should be processed by the FORWARD and not the INPUT chain. It almost seems to me like our RouterBoard is not realizing that these responses are related to a SNAT'd HTTP request.
Any suggestions for troubleshooting this?