Ok just took out BEFW11S4 for WRT54G love it so far BUT.....

Discussion in 'Cisco/Linksys Wireless Routers' started by raerae28, Feb 22, 2005.

  1. raerae28

    raerae28 Network Guru Member

    I am trying to set up port forwarding like I had it before on the old router. Here is what I want to do...

    Take port 443 from the outside interface and forward it to Port 25, on the inside.

    I used to do this with the old router and I dont see this configuration option anymore. Basically all I am seeing is range stuff, when I want to go from port to port to specific ip address. not Start to End ports.

    Somebody correct me or help me please. Did the linksys chat thing and they couldnt help or didnt know how to help.

  2. Toxic

    Toxic Administrator Staff Member

  3. raerae28

    raerae28 Network Guru Member

    I thought so too right. But what I was to do would look like this


    Here is what the router gives me to set


    So where do I set the LAN side IP address of where I want the redirected port traffic to go? I think I am missing something or just not pumping on all cylinders today.

    All help is appreciated.
  4. Toxic

    Toxic Administrator Staff Member

    try now to port forward 22 or 25? to your dunno if this will work but it may do.
  5. raerae28

    raerae28 Network Guru Member

    The example differs from the screenshot but you can gather the missing settings that I am talking about. When you port Trigger are you just scattering the packets to any thing plugged into the LAN side of the linksys? It would seem like a bad thing to do.

    Can someone explain this or what it means.

  6. Toxic

    Toxic Administrator Staff Member

  7. raerae28

    raerae28 Network Guru Member

    naah that doesnt do it. The Port Forwarding page only does port RANGEs. Can this router do what I am trying to do? Can I do what is in the diagram?

  8. raerae28

    raerae28 Network Guru Member

    I need to do different ports on both sides of the router because I am coming from a place that will only let me do web traffic and I need to do that over a web port and have it redirected inside the router to the appropriate port to a specific ip address.
  9. bluedog

    bluedog Network Guru Member

    Also I think you can set some rules via IPtables,

    You could try searching these forums for "iptables" it may require a different firmware like Sveasoft Satori.

    I would answer more as I know what you are trying to do, but I don't know how to advise you to do it.

  10. vfoong

    vfoong Network Guru Member

    Hi I know this would be an easy alternative but why don't you just configure your server to listen for SSH on https port 443?
  11. raerae28

    raerae28 Network Guru Member

    Yeah that was my next solution. I just wanted to I guess tell myself that it was better to cloak it, when it doesnt really matter. You could still do a port scan and find it on any port.

  12. Toxic

    Toxic Administrator Staff Member

    try telneting the use

    iptables -h

    this will show a list of commands to get what you want
  13. Toxic

    Toxic Administrator Staff Member

    iptables v1.2.7a

    Usage: iptables -[AD] chain rule-specification [options]
    iptables -[RI] chain rulenum rule-specification [options]
    iptables -D chain rulenum [options]
    iptables -[LFZ] [chain] [options]
    iptables -[NX] chain
    iptables -E old-chain-name new-chain-name
    iptables -P chain target [options]
    iptables -h (print this help information)

    Either long or short options are allowed.
    --append -A chain Append to chain
    --delete -D chain Delete matching rule from chain
    --delete -D chain rulenum
    Delete rule rulenum (1 = first) from chain
    --insert -I chain [rulenum]
    Insert in chain as rulenum (default 1=first)
    --replace -R chain rulenum
    Replace rule rulenum (1 = first) in chain
    --list -L [chain] List the rules in a chain or all chains
    --flush -F [chain] Delete all rules in chain or all chains
    --zero -Z [chain] Zero counters in chain or all chains
    --new -N chain Create a new user-defined chain
    -X [chain] Delete a user-defined chain
    --policy -P chain target
    Change policy on chain to target
    -E old-chain new-chain
    Change chain name, (moving any references)
    --proto -p [!] proto protocol: by number or name, eg. `tcp'
    --source -s [!] address[/mask]
    source specification
    --destination -d [!] address[/mask]
    destination specification
    --in-interface -i [!] input name[+]
    network interface name ([+] for wildcard)
    --jump -j target
    target for rule (may load target extension)
    --match -m match
    extended match (may load extension)
    --numeric -n numeric output of addresses and ports
    --out-interface -o [!] output name[+]
    network interface name ([+] for wildcard)
    --table -t table table to manipulate (default: `filter')
    --verbose -v verbose mode
    --line-numbers print line numbers when listing
    --exact -x expand numbers (display exact values)
    [!] --fragment -f match second or further fragments only
    --modprobe=<command> try to insert modules using this command
    --set-counters PKTS BYTES set the counter during insert/append
    [!] --version -V print package version.
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.
    Dismiss Notice