Changes

Line 260: Line 260:  
While the New port forward section provides the possibility to add port forwarding rules fast, it does not contain all possible configuration options to customize a rule. In order to create a more complicated rule, add one using the New port forward section and click the button that looks like a pencil [[File:Networking_rutx_trb14x_manual_edit_button_v1.png|20px]] next to it:
 
While the New port forward section provides the possibility to add port forwarding rules fast, it does not contain all possible configuration options to customize a rule. In order to create a more complicated rule, add one using the New port forward section and click the button that looks like a pencil [[File:Networking_rutx_trb14x_manual_edit_button_v1.png|20px]] next to it:
   −
[[File:Networking_rutos_manual_firewall_port_forwards_edit_button.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_firewall_port_forwards_edit_button_v2.png|border|class=tlt-border]]
   −
You will be redirected to that rule's configuration page:
+
You will be redirected to that rule's configuration general settings page:
   −
[[File:Networking_rutos_manual_firewall_port_forwards_configuration.png|border|class=tlt-border]]
+
[[File:Networking_rutos_manual_firewall_port_forwards_configuration_v2.png|border|class=tlt-border]]
    
<table class="nd-mantable">
 
<table class="nd-mantable">
Line 291: Line 291:  
         <td>firewall zone name; default: <b>wan</b></td>
 
         <td>firewall zone name; default: <b>wan</b></td>
 
         <td>The zone to which the third party will be connecting. (Same thing as "External zone" in the New port forward section.)</td>
 
         <td>The zone to which the third party will be connecting. (Same thing as "External zone" in the New port forward section.)</td>
 +
    </tr>
 +
    <tr>
 +
        <td>External port</td>
 +
        <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
 +
        <td>Port number(s) to which hosts will be connecting.<br>The rule will apply only to hosts that connect to the port number(s) specified in this field. Leave empty to make the rule skip external port matching.</td>
 +
    </tr>
 +
    <tr>
 +
        <td>Internal zone</td>
 +
        <td>firewall zone name; default: <b>lan</b></td>
 +
        <td>The zone to which the incoming connection will be redirected.</td>
 +
    </tr>
 +
    <tr>
 +
        <td>Internal IP address</td>
 +
        <td>Device LAN IP; default: <b>Device LAN IP</b></td>
 +
        <td>The IP address to which the incoming connection will be redirected.</td>
 +
    </tr>
 +
    <tr>
 +
        <td>Internal port</td>
 +
        <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
 +
        <td>The port number to which the incoming connection will be redirected.</td>
 +
    </tr>
 +
</table>
 +
 +
Advanced settings:
 +
 +
[[File:Networking rutos manual firewall port forwards configuration advanced.png|border|class=tlt-border]]
 +
 +
<table class="nd-mantable">
 +
    <tr>
 +
        <th>Field</th>
 +
        <th>Value</th>
 +
        <th>Description</th>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 305: Line 337:  
         <td>Source port</td>
 
         <td>Source port</td>
 
         <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
 
         <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
         <td>Port number(s) used by the connecting host.<br>The rule will match the source port used by the connecting host with the port number(s) specified in this field. Leave empty to make the rule skip source port matching.<td>
+
         <td>Port number(s) used by the connecting host.<br>The rule will match the source port used by the connecting host with the port number(s) specified in this field. Leave empty to make the rule skip source port matching.</td>
 
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>
Line 311: Line 343:  
         <td>ip | ip/netmask; default: <b>any</b></td>
 
         <td>ip | ip/netmask; default: <b>any</b></td>
 
         <td>IP address or network segment to which hosts will be connecting.<br>The rule will apply only to hosts that connect to IP addresses specified in this field.<br>To specify a subnet instead of one IP, add a forward slash followed by the netmask length after the network indication (for example, <i>10.0.0.0/8</i>).</td>
 
         <td>IP address or network segment to which hosts will be connecting.<br>The rule will apply only to hosts that connect to IP addresses specified in this field.<br>To specify a subnet instead of one IP, add a forward slash followed by the netmask length after the network indication (for example, <i>10.0.0.0/8</i>).</td>
    </tr>
  −
    <tr>
  −
        <td>External port</td>
  −
        <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
  −
        <td>Port number(s) to which hosts will be connecting.<br>The rule will apply only to hosts that connect to the port number(s) specified in this field. Leave empty to make the rule skip external port matching.<td>
  −
    </tr>
  −
    <tr>
  −
        <td>Internal zone</td>
  −
        <td>firewall zone name; default: <b>lan</b></td>
  −
        <td>The zone to which the incoming connection will be redirected.</td>
  −
    </tr>
  −
    <tr>
  −
        <td>Internal IP address</td>
  −
        <td>ip; default: <b>none</b></td>
  −
        <td>The IP address to which the incoming connection will be redirected.</td>
  −
    </tr>
  −
    <tr>
  −
        <td>Internal port</td>
  −
        <td>integer [0..65535] | range of integers [0..65534] - [1..65535] | port inversion [!0..!65535]; default: <b>none</b></td>
  −
        <td>The port number to which the incoming connection will be redirected.</td>
   
     </tr>
 
     </tr>
 
     <tr>
 
     <tr>