Line 260: |
Line 260: |
| While the New port forward section provides the possibility to add port forwarding rules fast, it does not contain all possible configuration options to customize a rule. In order to create a more complicated rule, add one using the New port forward section and click the button that looks like a pencil [[File:Networking_rutx_trb14x_manual_edit_button_v1.png|20px]] next to it: | | While the New port forward section provides the possibility to add port forwarding rules fast, it does not contain all possible configuration options to customize a rule. In order to create a more complicated rule, add one using the New port forward section and click the button that looks like a pencil [[File:Networking_rutx_trb14x_manual_edit_button_v1.png|20px]] next to it: |
| | | |
− | [[File:Networking_rutos_manual_firewall_port_forwards_edit_button.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_firewall_port_forwards_edit_button_v2.png|border|class=tlt-border]] |
| | | |
− | You will be redirected to that rule's configuration page: | + | You will be redirected to that rule's configuration general settings page: |
| | | |
− | [[File:Networking_rutos_manual_firewall_port_forwards_configuration.png|border|class=tlt-border]] | + | [[File:Networking_rutos_manual_firewall_port_forwards_configuration_v2.png|border|class=tlt-border]] |
| | | |
| <table class="nd-mantable"> | | <table class="nd-mantable"> |
Line 291: |
Line 291: |
| <td>firewall zone name; default: <b>wan</b></td> | | <td>firewall zone name; default: <b>wan</b></td> |
| <td>The zone to which the third party will be connecting. (Same thing as "External zone" in the New port forward section.)</td> | | <td>The zone to which the third party will be connecting. (Same thing as "External zone" in the New port forward section.)</td> |
| + | </tr> |
| + | <tr> |
| + | <td>External port</td> |
| + | <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td> |
| + | <td>Port number(s) to which hosts will be connecting.<br>The rule will apply only to hosts that connect to the port number(s) specified in this field. Leave empty to make the rule skip external port matching.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Internal zone</td> |
| + | <td>firewall zone name; default: <b>lan</b></td> |
| + | <td>The zone to which the incoming connection will be redirected.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Internal IP address</td> |
| + | <td>Device LAN IP; default: <b>Device LAN IP</b></td> |
| + | <td>The IP address to which the incoming connection will be redirected.</td> |
| + | </tr> |
| + | <tr> |
| + | <td>Internal port</td> |
| + | <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td> |
| + | <td>The port number to which the incoming connection will be redirected.</td> |
| + | </tr> |
| + | </table> |
| + | |
| + | Advanced settings: |
| + | |
| + | [[File:Networking rutos manual firewall port forwards configuration advanced.png|border|class=tlt-border]] |
| + | |
| + | <table class="nd-mantable"> |
| + | <tr> |
| + | <th>Field</th> |
| + | <th>Value</th> |
| + | <th>Description</th> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 305: |
Line 337: |
| <td>Source port</td> | | <td>Source port</td> |
| <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td> | | <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td> |
− | <td>Port number(s) used by the connecting host.<br>The rule will match the source port used by the connecting host with the port number(s) specified in this field. Leave empty to make the rule skip source port matching.<td> | + | <td>Port number(s) used by the connecting host.<br>The rule will match the source port used by the connecting host with the port number(s) specified in this field. Leave empty to make the rule skip source port matching.</td> |
| </tr> | | </tr> |
| <tr> | | <tr> |
Line 311: |
Line 343: |
| <td>ip | ip/netmask; default: <b>any</b></td> | | <td>ip | ip/netmask; default: <b>any</b></td> |
| <td>IP address or network segment to which hosts will be connecting.<br>The rule will apply only to hosts that connect to IP addresses specified in this field.<br>To specify a subnet instead of one IP, add a forward slash followed by the netmask length after the network indication (for example, <i>10.0.0.0/8</i>).</td> | | <td>IP address or network segment to which hosts will be connecting.<br>The rule will apply only to hosts that connect to IP addresses specified in this field.<br>To specify a subnet instead of one IP, add a forward slash followed by the netmask length after the network indication (for example, <i>10.0.0.0/8</i>).</td> |
− | </tr>
| |
− | <tr>
| |
− | <td>External port</td>
| |
− | <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
| |
− | <td>Port number(s) to which hosts will be connecting.<br>The rule will apply only to hosts that connect to the port number(s) specified in this field. Leave empty to make the rule skip external port matching.<td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Internal zone</td>
| |
− | <td>firewall zone name; default: <b>lan</b></td>
| |
− | <td>The zone to which the incoming connection will be redirected.</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Internal IP address</td>
| |
− | <td>ip; default: <b>none</b></td>
| |
− | <td>The IP address to which the incoming connection will be redirected.</td>
| |
− | </tr>
| |
− | <tr>
| |
− | <td>Internal port</td>
| |
− | <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
| |
− | <td>The port number to which the incoming connection will be redirected.</td>
| |
| </tr> | | </tr> |
| <tr> | | <tr> |