-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Sunday, 2019-12-29 at 14:13 +0100, Carlos E. R. wrote: I found that the router was acting up as well. I had this for the ssh: Server External Protocol Internal Server IP Address name porttcp port ssh 30000 tcp 22 192.168.1.16 and I found on the log that incoming was allways from 192.168.1.1, the external address was not logged. So for the web server I added: Server External Protocol Internal Server IP Address name porttcp port web 500000 tcp 500000 192.168.1.16 And then I opened in the server firewall port 50000 to the router address, 192.168.1.1. And it worked, when I did this: cer@Telcontar:~> links http://DYN.DNS:50000 the connection came from the router. Then I noticed entries in the firewall log: <0.4> 2019-12-29T22:31:58.114698+01:00 Isengard kernel - - - [1413795.209090] SFW2-INext-DROP-DEFLT IN=eth0 OUT= MAC=4c:cc:6a:61:50:a1:f8:8e:85:64:78:f2:08:00 SRC=176.*.*.* DST=192.168.1.16 LEN=60 TOS=0x00 PREC=0x00 TTL=46 ID=25397 DF PROTO=TCP SPT=30838 DPT=50000 WINDOW=65535 RES=0x00 SYN URGP=0 OPT (0204055A0402080A05D6BC650000000001030 309) which were obviously outsiders. Maybe some of you guys testing? Or some unrelated people scanning and finding the port open? I don't know why the router is working differently now. Anyway, I had to open 50000 to the world. I may change to another port eventually ;-) - -- Cheers, Carlos E. R. (from openSUSE 15.1 x86_64 at Telcontar) -----BEGIN PGP SIGNATURE----- iHoEARECADoWIQQZEb51mJKK1KpcU/W1MxgcbY1H1QUCXgkjHRwccm9iaW4ubGlz dGFzQHRlbGVmb25pY2EubmV0AAoJELUzGBxtjUfVL50AoIlBJ7dHY5KHQEkascpp btxFV0mpAKCWaWskAACuNP6QbUjDIS1hUZgcBw== =tRuG -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org To contact the owner, e-mail: opensuse+owner@opensuse.org