/ip firewall nat
add action=src-nat chain=srcnat src-address=192.168.0.0/24 to-addresses=123.123.123.111
My problem is that other 123.123.123.xxx adresses can access 192.168.0.x IP Adresses directly. But they should only be able to access 123.123.123.111 and it's dst-nat entries (port forwards).
Here are the logs:
is OK, because NATed:
Code: Select all
firewall,info forward: in:ether2-wan1 out:ether5-lan, src-mac 00:0c:29:xx:xx:xx, proto TCP (ACK,PSH), 123.123.123.100:143->192.168.0.171:50681, NAT 123.123.123.100:143->(123.123.123.111:50681->192.168.0.171:50681), len 50
Code: Select all
firewall,info forward: in:ether2-wan1 out:ether5-lan, src-mac 00:1b:fc:xx:xx:xx, proto TCP (SYN), 123.123.123.101:49186->192.168.0.111:445, len 52
When I add a firewall rule "drop all from any to 192.168.0.x" in chain forward, I lose internet connection.
Any ideas?