69.70.160.27 49 X 68.70.160.27 3389 192.168.25.11 3389 UDP ;;; RDP (.11 router will forward to Ivan's Home PC 192.168.1.29) 50 68.70.160.27 3389 192.168.25.11 3389 TCP ;;; RDP (.11 router will forward to Ivan's Home PC 192.168.1.29) 55 68.70.160.27 22333 192.168.25.19 22 TCP ;;; SSH 8 68.70.160.27 25 192.168.25.19 25 TCP ;;; SMTP-port 56 68.70.160.27 55555 192.168.25.19 80 TCP ;;; HTTP 9 68.70.160.27 110 192.168.25.19 110 TCP ;;; POP3-port 11 68.70.160.27 143 192.168.25.19 143 TCP ;;; IMAP2-port 13 68.70.160.27 465 192.168.25.19 465 TCP ;;; secure_SMTP-port 12 68.70.160.27 587 192.168.25.19 587 TCP ;;; SMTP-port 10 68.70.160.27 993 192.168.25.19 993 TCP ;;; IMAPs-port 53 68.70.160.27 22222 192.168.25.97 22 TCP ;;; SSH 6 68.70.160.27 53 192.168.25.97 53 TCP ;;; DNS-port 7 68.70.160.27 53 192.168.25.97 53 UDP ;;; DNS-port 58 68.70.160.27 25192 192.168.25.192 5900 TCP ;;; VNC for Martin miner PC 57 68.70.160.27 25193 192.168.25.193 5900 TCP ;;; VNC for Martin miner PC 5 68.70.160.27 22122 192.168.25.207 22 TCP ;;; SSH TEST for AmSys103-Pi 42 X 68.70.160.27 80 192.168.25.207 80 TCP ;;; http for mesh page 44 X 68.70.160.27 3306 192.168.25.207 3306 TCP ;;; mysql 46 X 68.70.160.27 3306 192.168.25.207 3306 UDP ;;; mysql 51 X 68.70.160.27 3389 192.168.25.207 3389 TCP ;;; RDP 16 68.70.160.27 14456 192.168.25.207 14456 UDP ;;; nfsen port for Nobel2 test 17 68.70.160.27 14457 192.168.25.207 4457 UDP ;;; nfsen port for Des Buttes test 20 68.70.160.27 14458 192.168.25.207 4458 UDP ;;; nfsen port for Durenleau test 23 68.70.160.27 14460 192.168.25.207 14460 UDP ;;; nfsen port for St Janvier test 25 68.70.160.27 14461 192.168.25.207 4461 UDP ;;; nfsen port for Durham Sud test 30 68.70.160.27 14465 192.168.25.207 4465 UDP ;;; nfsen port for Cantine test 32 68.70.160.27 14466 192.168.25.207 4466 UDP ;;; nfsen port for Nobel test 34 68.70.160.27 14467 192.168.25.207 4467 UDP ;;; nfsen port for Bouchette test 38 68.70.160.27 14469 192.168.25.207 4469 UDP ;;; nfsen port for Girouette test 36 68.70.160.27 14468 192.168.25.207 4468 UDP ;;; nfsen port for Jean-Guy test 40 68.70.160.27 14470 192.168.25.207 4470 UDP ;;; nfsen port for Vivaldi test 52 X 68.70.160.27 21021 192.168.25.254 21 TCP ;;; FTP 4 68.70.160.27 22022 192.168.25.254 22 TCP ;;; SSH 41 68.70.160.27 80 192.168.25.254 80 TCP ;;; http for mesh page 47 68.70.160.27 123 192.168.25.254 123 TCP ;;; ntp 48 68.70.160.27 123 192.168.25.254 123 UDP ;;; ntp 54 X 68.70.160.27 443 192.168.25.254 443 TCP ;;; GoDaddy SSL certificate 43 68.70.160.27 3306 192.168.25.254 3306 TCP ;;; mysql 45 68.70.160.27 3306 192.168.25.254 3306 UDP ;;; mysql 14 X 68.70.160.27 5900 192.168.25.254 5900 TCP ;;; VNC-port 15 68.70.160.27 4456 192.168.25.254 4456 UDP ;;; nfsen port for Nobel2 18 68.70.160.27 4457 192.168.25.254 14456 UDP ;;; nfsen port for Des Buttes 19 68.70.160.27 4458 192.168.25.254 4458 UDP ;;; nfsen port for Duranleau 21 X 68.70.160.27 4459 192.168.25.254 4459 UDP ;;; nfsen port for Tourigny 22 68.70.160.27 4460 192.168.25.254 4460 UDP ;;; nfsen port for St Janvier 24 68.70.160.27 4461 192.168.25.254 4461 UDP ;;; nfsen port for Durham Sud 26 X 68.70.160.27 4462 192.168.25.254 4462 UDP ;;; nfsen port for Vanhai test 27 X 68.70.160.27 4463 192.168.25.254 4463 UDP ;;; nfsen port for Acres 28 X 68.70.160.27 4464 192.168.25.254 4464 UDP ;;; nfsen port for Avianor 29 68.70.160.27 4465 192.168.25.254 4465 UDP ;;; nfsen port for Cantine 31 68.70.160.27 4466 192.168.25.254 4466 UDP ;;; nfsen port for Nobel 33 68.70.160.27 4467 192.168.25.254 4467 UDP ;;; nfsen port for Bouchette 35 68.70.160.27 4468 192.168.25.254 4468 UDP ;;; nfsen port for Jean-Guy 37 68.70.160.27 4469 192.168.25.254 4469 UDP ;;; nfsen port for Girouette 39 68.70.160.27 4470 192.168.25.254 4470 UDP ;;; nfsen port for Vivaldi =============================== [admin@Router504G Kirkland-Videotron] /ip firewall nat> print Flags: X - disabled, I - invalid, D - dynamic 0 ;;; sysadminpxy chain=dstnat action=redirect to-ports=8080 protocol=tcp src-address-list=!Ok dst-port=80 1 chain=srcnat action=src-nat to-addresses=69.70.160.27 src-address=192.168.25.254 dst-address-list=!doNOTmasq log-prefix="" 2 ;;; TEST for AmSys103-Pi dev chain=srcnat action=src-nat to-addresses=69.70.160.27 src-address=192.168.1.207 dst-address-list=!doNOTmasq log-prefix="" 3 ;;; global Masquerade to Internet chain=srcnat action=masquerade out-interface=ether1 log-prefix="" 4 ;;; re-map Server 192.168.25.254 SSH port 22 from public port 22022 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=22 protocol=tcp dst-address=69.70.160.27 dst-port=22022 log-prefix="" 5 ;;; TEST for AmSys103-Pi : re-map Server 192.168.1.207 SSH port 22 from public port 22122 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=22 protocol=tcp dst-address=69.70.160.27 dst-port=22122 log-prefix="" 6 ;;; TCP forward DNS-port to Server 192.168.25.97 chain=dstnat action=dst-nat to-addresses=192.168.25.97 to-ports=53 protocol=tcp dst-address=69.70.160.27 dst-port=53 log-prefix="" 7 ;;; UDP forward DNS-port to Server 192.168.25.97 chain=dstnat action=dst-nat to-addresses=192.168.25.97 to-ports=53 protocol=udp dst-address=69.70.160.27 dst-port=53 log-prefix="" 8 ;;; forward SMTP-port to Server 192.168.25.19 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=25 protocol=tcp dst-address=69.70.160.27 dst-port=25 log-prefix="" 9 ;;; forward POP3-port to Server 192.168.25.19 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=110 protocol=tcp dst-address=69.70.160.27 dst-port=110 log-prefix="" 10 ;;; forward IMAPs-port to Server 192.168.25.19 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=993 protocol=tcp dst-address=69.70.160.27 dst-port=993 log-prefix="" 11 ;;; forward IMAP2-port to Server 192.168.25.19 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=143 protocol=tcp dst-address=69.70.160.27 dst-port=143 log-prefix="" 12 ;;; forward encrypt.SMTP-port to Server 192.168.25.19 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=587 protocol=tcp dst-address=69.70.160.27 dst-port=587 log-prefix="" 13 ;;; forward secure_SMTP-port to Server 192.168.25.19 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=465 protocol=tcp dst-address=69.70.160.27 dst-port=465 log-prefix="" 14 X ;;; forward VNC-port to Server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=5900 protocol=tcp dst-address=69.70.160.27 dst-port=5900 log-prefix="" 15 ;;; nfsen port for Nobel2 == NOC in nfsen config to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4456 protocol=udp dst-address=69.70.160.27 dst-port=4456 log-prefix="" 16 ;;; TEST nfsen port for Nobel2 == NOC in nfsen config to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=14456 protocol=udp dst-address=69.70.160.27 dst-port=14456 log-prefix="" 17 ;;; TEST for AmSys103-Pi : nfsen port 4470 for Des Buttes redirect to NOC server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4457 protocol=udp dst-address=69.70.160.27 dst-port=14457 log-prefix="" 18 ;;; nfsen port for leblanc_desButtes to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4457 protocol=udp dst-address=69.70.160.27 dst-port=4457 log-prefix="" 19 ;;; nfsen port for Duranleau to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4458 protocol=udp dst-address=69.70.160.27 dst-port=4458 log-prefix="" 20 ;;; TEST for AmSys103-Pi : nfsen port for Duranleau to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4458 protocol=udp dst-address=69.70.160.27 dst-port=14458 log-prefix="" 21 X ;;; nfsen port for Tourigny to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4459 protocol=udp dst-address=69.70.160.27 dst-port=4459 log-prefix="" 22 ;;; nfsen port for stjanvier to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4460 protocol=udp dst-address=69.70.160.27 dst-port=4460 log-prefix="" 23 ;;; TEST nfsen port for stjanvier to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4460 protocol=udp dst-address=69.70.160.27 dst-port=14460 log-prefix="" 24 ;;; nfsen port for durhamsud to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4461 protocol=udp dst-address=69.70.160.27 dst-port=4461 log-prefix="" 25 ;;; TEST for AmSys103-Pi : nfsen port for durhamsud to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4461 protocol=udp dst-address=69.70.160.27 dst-port=14461 log-prefix="" 26 X ;;; nfsen port for vanhaitest to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4462 protocol=udp dst-address=69.70.160.27 dst-port=4462 log-prefix="" 27 X ;;; nfsen port for Acres to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4463 protocol=udp dst-address=69.70.160.27 dst-port=4463 log-prefix="" 28 X ;;; nfsen port forward for Avianor to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4464 protocol=udp dst-address=69.70.160.27 dst-port=4464 log-prefix="" 29 ;;; nfsen port for cantine to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4465 protocol=udp dst-address=69.70.160.27 dst-port=4465 log-prefix="" 30 ;;; TEST for AmSys103-Pi : nfsen port for cantine to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4465 protocol=udp dst-address=69.70.160.27 dst-port=14465 log-prefix="" 31 ;;; nfsen port for rue Nobel Mirabel to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4466 protocol=udp dst-address=69.70.160.27 dst-port=4466 log-prefix="" 32 ;;; TEST for AmSys103-Pi : nfsen port for rue Nobel Mirabel to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4466 protocol=udp dst-address=69.70.160.27 dst-port=14466 log-prefix="" 33 ;;; nfsen port for Bouchette to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4467 protocol=udp dst-address=69.70.160.27 dst-port=4467 log-prefix="" 34 ;;; TEST for AmSys103-Pi : nfsen port for Bouchette to server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4467 protocol=udp dst-address=69.70.160.27 dst-port=14467 log-prefix="" 35 ;;; Port forward 4468 to 192.168.25.254 for St Jean-Guy VPN chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4468 protocol=udp dst-address=69.70.160.27 dst-port=4468 log-prefix="" 36 ;;; TEST for AmSys103-Pi : Port forward 4468 to 192.168.1.207 for St Jean-Guy VPN chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4468 protocol=udp dst-address=69.70.160.27 dst-port=14468 log-prefix="" 37 ;;; nfsen port forward for 4469 Girouette chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4469 protocol=udp dst-address=69.70.160.27 dst-port=4469 log-prefix="" 38 ;;; TEST for AmSys103-Pi : nfsen port forward for 4469 Girouette to 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4469 protocol=udp dst-address=69.70.160.27 dst-port=14469 log-prefix="" 39 ;;; nfsen port 4470 for Vivaldi redirect to NOC server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=4470 protocol=udp dst-address=69.70.160.27 dst-port=4470 log-prefix="" 40 ;;; TEST for AmSys103-Pi : nfsen port 4470 for Vivaldi redirect to NOC server 192.168.1.207 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=4470 protocol=udp dst-address=69.70.160.27 dst-port=14470 log-prefix="" 41 ;;; http (80) port forwaring to server 192.168.25.254 needed for mesh page chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=80 protocol=tcp dst-address=69.70.160.27 dst-port=80 log-prefix="" 42 X ;;; TEST for AmSys103-Pi : http (80) port forwaring to server 192.168.25.254 needed for mesh page chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=80 protocol=tcp dst-address=69.70.160.27 dst-port=80 log-prefix="" 43 ;;; mysql forwarding to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=3306 protocol=tcp dst-address=69.70.160.27 dst-port=3306 log-prefix="" 44 X ;;; TEST for AmSys103-Pi : mysql forwarding to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=3306 protocol=tcp dst-address=69.70.160.27 dst-port=3306 log-prefix="" 45 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=3306 protocol=udp dst-address=69.70.160.27 dst-port=3306 log-prefix="" 46 X ;;; TEST for AmSys103-Pi chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=3306 protocol=udp dst-address=69.70.160.27 dst-port=3306 log-prefix="" 47 ;;; opening tcp/udp 123 for ntp protocol # 280-281 to server 192.168.25.254 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=123 protocol=tcp dst-address=69.70.160.27 dst-port=123 log-prefix="" 48 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=123 protocol=udp dst-address=69.70.160.27 dst-port=123 log-prefix="" 49 X ;;; For Remote desktop to router 192.168.25.11 (.11 router will forward to Ivan's Home PC 192.168.1.29) chain=dstnat action=dst-nat to-addresses=192.168.25.11 to-ports=3389 protocol=udp dst-address=69.70.160.27 dst-port=3389 log-prefix="" 50 chain=dstnat action=dst-nat to-addresses=192.168.25.11 to-ports=3389 protocol=tcp dst-address=69.70.160.27 dst-port=3389 log-prefix="" 51 X ;;; TEST for AmSys103-Pi chain=dstnat action=dst-nat to-addresses=192.168.1.207 to-ports=3389 protocol=tcp dst-address=69.70.160.27 dst-port=3389 log-prefix="" 52 X ;;; re-map 192.168.25.254 Server FTP port 21 from public port 21021 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=21 protocol=tcp dst-address=69.70.160.27 dst-port=21021 log-prefix="" 53 ;;; re-map 192.168.25.97 Server SSH port 22 from public port 22222 --- Read-Only server, need Ivan for any file updates chain=dstnat action=dst-nat to-addresses=192.168.25.97 to-ports=22 protocol=tcp dst-address=69.70.160.27 dst-port=22222 log-prefix="" 54 X ;;; to enable GoDaddy SSL certificate to server 192.168.25.254 2012-02-27 chain=dstnat action=dst-nat to-addresses=192.168.25.254 to-ports=443 protocol=tcp dst-address=69.70.160.27 dst-port=443 log-prefix="" 55 ;;; map outside SSH 69.70.160.27:22333 to 192.168.25.19:22 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=22 protocol=tcp dst-address=69.70.160.27 dst-port=22333 log-prefix="" 56 ;;; For squirrelmail 69.70.160.27:55555 ---->192.168.25.19:80 chain=dstnat action=dst-nat to-addresses=192.168.25.19 to-ports=80 protocol=tcp dst-address=69.70.160.27 dst-port=55555 log-prefix="" 57 ;;; Allow VNC connection from 69.70.160.27: 25193 to 192.168.25.193:5900 chain=dstnat action=dst-nat to-addresses=192.168.25.193 to-ports=5900 protocol=tcp dst-address=69.70.160.27 dst-port=25193 log=no log-prefix="" 58 ;;; Allow VNC connection from 69.70.160.27: 25192 to 192.168.25.192:5900 chain=dstnat action=dst-nat to-addresses=192.168.25.192 to-ports=5900 protocol=tcp dst-address=69.70.160.27 src-address-list="" dst-port=25192 log=no log-prefix="" [admin@Router504G Kirkland-Videotron] /ip firewall nat> 69.70.160.26 : 69.70.160.28 : 69.70.160.29 [admin@Router504G Kirkland-Videotron] /ip firewall nat> print Flags: X - disabled, I - invalid, D - dynamic ========================= 1 X 68.70.160.28 22 192.168.1.3 22 TCP ;;; SSH 2 X 68.70.160.26 22022 192.168.1.5 22 TCP ;;; SSH 3 X 68.70.160.26 22005 192.168.1.5 22 TCP ;;; SSH & SFTP 4 68.70.160.26 50080 192.168.1.5 80 TCP ;;; HTTP 5 68.70.160.26 25 192.168.1.5 25 TCP ;;; SMTP 6 68.70.160.26 110 192.168.1.5 110 TCP ;;; POP 7 68.70.160.26 143 192.168.1.5 143 TCP ;;; public IMAP 8 68.70.160.26 465 192.168.1.5 465 TCP ;;; Secure / Encrypted SMTP 9 68.70.160.26 587 192.168.1.5 587 TCP ;;; Secure / Encrypted SMTP 10 68.70.160.26 993 192.168.1.5 993 TCP ;;; public IMAP 11 68.70.160.26 80 192.168.1.7 80 TCP ;;; HTTP Websites amerisys.com, ruralconnection.ca 12 68.70.160.26 21 192.168.1.7 21 TCP ;;; FTP 13 68.70.160.26 22007 192.168.1.7 22 TCP ;;; SSH & SFTP 14 X 68.70.160.26 64080 192.168.1.7 80 TCP ;;; HTTP PI server for ISB Corp tests 2013-08-22 by i_reede 15 68.70.160.26 65080 192.168.1.8 80 TCP ;;; HTTP Music Website 16 68.70.160.26 65021 192.168.1.8 21 TCP ;;; FTP 17 68.70.160.26 65022 192.168.1.8 22 TCP ;;; SSH 18 X 68.70.160.26 63080 192.168.1.8 80 TCP ;;; HTTP 19 X 68.70.160.26 3389 192.168.1.33 3389 TCP ;;; RDP 20 X 68.70.160.26 63389 192.168.1.33 3389 UDP ;;; RDP 21 68.70.160.26 33389 192.168.1.43 3389 TCP ;;; RDP Luben PC 22 68.70.160.26 33389 192.168.1.43 3389 UDP ;;; RDP Luben PC 23 X 68.70.160.26 61022 192.168.1.61 22 TCP ;;; SSH 24 X 68.70.160.26 22222 192.168.1.95 22 TCP ;;; SSH 25 68.70.160.26 53 192.168.1.95 53 TCP ;;; DNS passthru "Network Solutions" and "GoDaddy" domain DNS records are changed 26 68.70.160.26 53 192.168.1.95 53 UDP ;;; DNS 27 X 68.70.160.26 873 192.168.1.5 873 TCP ;;; ??? 28 68.70.160.26 & 28 53 192.168.1.253 53 TCP ;;; DNS 29 68.70.160.26 & 28 53 192.168.1.253 53 UDP ;;; DNS 30 X 68.70.160.26 44200 192.168.44.200 80 TCP ;;; Port forward for Equipment on network 44 31 X 68.70.160.26 44100 192.168.44.100 80 TCP ;;; Port forward for Equipment on network 44 32 68.70.160.26 59022 192.168.1.59 22 TCP ;;; SSH 33 68.70.160.26 59080 192.168.1.59 80 TCP ;;; HTTP LCB Music Website Library 34 68.70.160.26 18080 192.168.1.18 80 TCP ;;; HTTP WhiteSpacePro Radio 35 68.70.160.29 80 192.168.1.205 80 TCP ;;; HTTP LCB web site 36 68.70.160.29 22205 192.168.1.205 22 TCP ;;; SSH 37 68.70.160.26 59888 192.168.1.59 80 TCP ;;; HTTP LCB Music Website Library 38 68.70.160.28 22102 192.168.1.102 22 TCP ;;; SSH Sinfonia 39 68.70.160.28 80 192.168.1.102 80 TCP ;;; HTTP Sinfonia 40 X 68.70.160.26 30022 192.168.1.3 22 TCP ;;; SSH / SFTP 41 X 37.44.212.177 all ??? 3333 TCP ;;; Bitcoin 42 68.70.160.26 65076 192.168.1.76 80 TCP ;;; HTTP Tarantula 3d printer 43 X 68.70.160.26 59053 192.168.1.33 5900 TCP ;;; VNC 44 68.70.160.26 22180 192.168.1.180 22180 TCP ;;; Joanne's Laptop server ========================= [admin@Router147] /ip firewall nat> print Flags: X - disabled, I - invalid, D - dynamic 0 ;;; Global Masquerade chain=srcnat action=masquerade out-interface=ether1 1 X ;;; Port Forward from 69.70.160.28:22 -->192.168.1.3:22 (SSH & SFTP) DISABLE WHEN NOT IN USE chain=dstnat action=dst-nat to-addresses=192.168.1.3 to-ports=22 protocol=tcp dst-address=69.70.160.28 dst-port=22 2 X ;;; ;;; Forward public requests to 69.70.160.26:22022 to 192.168.1.5:22 ( SSH) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=22022 3 X ;;; ;;; Forward public requests to 69.70.160.26:22005 to 192.168.1.5:22 (SSH & SFTP) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=22005 4 ;;; Forward public requests to 69.70.160.26:50080 to 192.168.1.5:80 (WWW request to AmSys5 via port 50080) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=50080 5 ;;; Forward public requests to 69.70.160.26:25 to 192.168.1.5:25 (SMTP) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=25 protocol=tcp dst-address=69.70.160.26 dst-port=25 6 ;;; Forward public requests to 69.70.160.26:110 to 192.168.1.5:110 (POP) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=110 protocol=tcp dst-address=69.70.160.26 dst-port=110 7 ;;; Forward public requests to 69.70.160.26:143 to 192.168.1.5:143 (IMAP public) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=143 protocol=tcp dst-address=69.70.160.26 dst-port=143 8 ;;; Forward public requests to 69.70.160.26:465 to 192.168.1.5:465 (Secure / Encrypted SMTP) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=465 protocol=tcp dst-address=69.70.160.26 dst-port=465 9 ;;; Forward public requests to 69.70.160.26:587 to 192.168.1.5:587 (Secure / Encrypted SMTP) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=587 protocol=tcp dst-address=69.70.160.26 dst-port=587 10 ;;; Forward public requests to 69.70.160.26:993 to 192.168.1.5:993 (IMAP public) chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=993 protocol=tcp dst-address=69.70.160.26 dst-port=993 11 ;;; Forward public requests to 69.70.160.26:80 to 192.168.1.7:80 (Websites amerisys.com, ruralconnection.ca) chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=80 12 ;;; Forward FTP - public port 21 to 192.168.1.7:21 chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=21 protocol=tcp dst-address=69.70.160.26 dst-port=21 13 ;;; ;;; Forward public requests to 69.70.160.26:22007 to 192.168.1.7:22 (SSH & SFTP) chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=22007 14 X ;;; Forward public requests to 69.70.160.26:64080 to 192.168.1.7:80 (PI HTTP server for ISB Corp tests 2013-08-22 by i_reede) chain=dstnat action=dst-nat to-addresses=192.168.1.7 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=64080 15 ;;; Forward public requests on 69.70.160.26:65080 to AmSys8 192.168.1.8:80 (HTTP Music Website) chain=dstnat action=dst-nat to-addresses=192.168.1.8 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=65080 16 ;;; Forward public requests on 69.70.160.26:65021 to AmSys8 192.168.1.8:21 chain=dstnat action=dst-nat to-addresses=192.168.1.8 to-ports=21 protocol=tcp dst-address=69.70.160.26 dst-port=65021 17 ;;; Forward public requests on 69.70.160.26:65022 to AmSys8 192.168.1.8:22 (SSH) chain=dstnat action=dst-nat to-addresses=192.168.1.8 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=65022 18 X ;;; Forward public requests on port 69.70.16026:63080 to PI server 192.168.1.8:80 (HTTP) for iconectiv tests 2013-08-23 by i_reede chain=dstnat action=dst-nat to-addresses=192.168.1.8 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=63080 19 X ;;; Forward Remote desktop public port 3389 to Ivan's machine 192.168.1.33:3389 chain=dstnat action=dst-nat to-addresses=192.168.1.33 to-ports=3389 protocol=tcp dst-address=69.70.160.26 dst-port=63389 20 X chain=dstnat action=dst-nat to-addresses=192.168.1.33 to-ports=3389 protocol=udp dst-address=69.70.160.26 dst-port=63389 21 ;;; Forward remote desktop from 69.70.160.26:33389 to Luben's machine 192.168.1.43:3389 chain=dstnat action=dst-nat to-addresses=192.168.1.43 to-ports=3389 protocol=tcp dst-address=69.70.160.26 dst-port=33389 22 chain=dstnat action=dst-nat to-addresses=192.168.1.43 to-ports=3389 protocol=udp dst-address=69.70.160.26 dst-port=33389 23 X ;;; Forward public requests on 69.70.160.26:61022 to 192.168.1.61:22 (SSH) chain=dstnat action=dst-nat to-addresses=192.168.1.61 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=61022 24 X ;;; Forward public requests on 69.70.160.26:22222 to SSH 192.168.1.95:22 --- Read-Only server, need Ivan for any file updates chain=dstnat action=dst-nat to-addresses=192.168.1.95 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=22222 25 ;;; rules 7-8 DNS passthru 192.168.1.95 "Network Solutions" and "GoDaddy" domain DNS records are changed chain=dstnat action=dst-nat to-addresses=192.168.1.95 to-ports=53 protocol=tcp dst-address=69.70.160.26 dst-port=53 chain=dstnat action=dst-nat to-addresses=192.168.1.95 to-ports=53 protocol=tcp dst-address=69.70.160.26 dst-port=53 26 chain=dstnat action=dst-nat to-addresses=192.168.1.95 to-ports=53 protocol=udp dst-address=69.70.160.26 dst-port=53 27 X chain=dstnat action=dst-nat to-addresses=192.168.1.5 to-ports=873 protocol=tcp dst-address=69.70.160.26 dst-port=873 28 ;;; DNS TCP requests to 69.70.160.26 or 69.70.160.28 to 192.168.1.253 chain=dstnat action=dst-nat to-addresses=192.168.1.253 to-ports=53 protocol=tcp dst-port=53 29 ;;; DNS UDP requests to 69.70.160.26 or 69.70.160.28 to 192.168.1.253 chain=dstnat action=dst-nat to-addresses=192.168.1.253 to-ports=53 protocol=udp dst-port=53 30 X ;;; Port forward for Equipment on network 44 chain=dstnat action=dst-nat to-addresses=192.168.44.200 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=44200 31 X chain=dstnat action=dst-nat to-addresses=192.168.44.100 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=44100 32 ;;; forward resquests to 69.70.160.26 port 59022 to 192.168.1.59 chain=dstnat action=dst-nat to-addresses=192.168.1.59 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=59022 33 ;;; Forward public requests on 69.70.160.26:59080 to AmSys59 192.168.1.59:80 (LCB Music Website) chain=dstnat action=dst-nat to-addresses=192.168.1.205 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=59080 34 ;;; Forward public requests on 69.70.160.26:18080 to AmSys18 192.168.1.18:80 (WhiteSpacePro Radio) chain=dstnat action=dst-nat to-addresses=192.168.1.18 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=18080 35 ;;; forward LCB Web site 69.70.160.29:80 to 192.168.1.205:80 chain=dstnat action=dst-nat to-addresses=192.168.1.205 to-ports=80 protocol=tcp dst-address=69.70.160.29 dst-port=80 36 ;;; forward LCB FTP to 69.70.160.29:22205 to 192.168.1.205:22 chain=dstnat action=dst-nat to-addresses=192.168.1.205 to-ports=22 protocol=tcp dst-address=69.70.160.29 dst-port=22205 37 chain=dstnat action=dst-nat to-addresses=192.168.1.59 to-ports=80 protocol=tcp dst-address=69.70.160.26 dst-port=59888 38 ;;; forward Sinfonia requests to 69.70.160.28 port 22102 to 192.168.1.102 port 22 chain=dstnat action=dst-nat to-addresses=192.168.1.102 to-ports=22 protocol=tcp dst-address=69.70.160.28 dst-port=22102 39 ;;; forward Sinfonia Web site forward 69.70.160.28:80 to 192.168.1.102:80 chain=dstnat action=dst-nat to-addresses=192.168.1.102 to-ports=80 protocol=tcp dst-address=69.70.160.28 dst-port=80 40 X ;;; Redirect inbound SSH / SFTP traffic on 69.70.160.26:30022 to 192.168.1.3:22 chain=dstnat action=dst-nat to-addresses=192.168.1.3 to-ports=22 protocol=tcp dst-address=69.70.160.26 dst-port=30022 41 X chain=dstnat action=dst-nat to-addresses=37.44.212.177 to-ports=3333 protocol=tcp dst-address-list=Bitcoin 42 ;;; Forward public requests on 69.70.160.26:65076 to AmSys76 192.168.1.76:80 (3d printer tarantula) chain=dstnat action=dst-nat to-addresses=192.168.1.76 to-ports=80 protocol=tcp dst-address=60.70.160.26 dst-port=65076 43 X ;;; Forward TightVNC 69.70.160.26:59033 to Ivan's machine 192.168.1.33:5900 chain=dstnat action=dst-nat to-addresses=192.168.1.33 to-ports=5900 protocol=tcp dst-address=69.70.160.26 dst-port=59033 44 ;;; forward public 69.70.160.26:22180 OpenRA game on Joanne's Laptop 192.168.1.180 port 22180 chain=dstnat action=dst-nat to-addresses=192.168.1.180 to-ports=22180 protocol=tcp dst-address=69.70.160.26 dst-port=22180 [admin@Router147] /ip firewall nat>