Am I missing someting in the firewall rule, or not using the correct interface, porting incorrectly, or?
Hard to say without you posting the actual rules you configured. Also post how you bypassed the APs in the Hotspot.
Generally speaking it would be a better idea to separate the customer address space and the management access space. If your APs support VLANs that shouldn't be very hard to do.
Here's the few rules I created.
Flags: X - disabled, I - invalid, D - dynamic
0 X ;;; place hotspot rules here
chain=unused-hs-chain action=passthrough
1 ;;; Rocket AP
chain=dstnat action=dst-nat to-addresses=192.168.88.98 to-ports=80 protocol=tcp
dst-address=98.173.*.28 dst-port=8098
2 ;;; NSM5 (Mast)
chain=dstnat action=dst-nat to-addresses=192.168.88.97 to-ports=80 protocol=tcp
dst-address=98.173.*.28 dst-port=8097
3 ;;; Added by webbox
chain=srcnat action=masquerade out-interface=ether1-gateway
4 ;;; Bullet
(Want to SSH into this AP)
chain=dstnat action=dst-nat to-addresses=192.168.88.99 to-ports=80 protocol=tcp
dst-address=98.173.*.28 dst-port=8099
------------------------------------------------
Bypass rules;
Flags: X - disabled, P - bypassed, B - blocked
# MAC-ADDRESS ADDRESS TO-ADDRESS SERVER
0 P ;;; Dlink router
(DHCP disabled)
00:1C:F0:F2:12:52 192.168.88.2 192.168.88.2 hotspot1
1 P ;;; Bullet
(This is the AP I'm trying to SSH into)
00:15:6D:F0:21:F2 192.168.88.99 192.168.88.99 hotspot1
2 P ;;; Rocket
00:15:6D:E6:D8:50 192.168.88.98 192.168.88.98 hotspot1
3 P ;;; NSM5
00:15:6D:DE:FE:A5 192.168.88.97 192.168.88.97 hotspot1