Beginer question, how to open a port (8333 and 1833) to all in and out?
I try to add it to the fierwall role but still its blocking some.
Any -> Port 8333 ->Any stil blocking ????
Firstly, if you're "unblocking" an inbound port, simply unblocking it in the firewall is not enough for the application running internally on your network to receive the connection and data to follow.
Let's first start with your outbound rule, i assume that as you are trying to allow port 8333/tcp and 1833/tcp outbound that your firewall is currently in a DENY ALL except X,Y and Z mode? (aka, do not allow all outbound traffic except what i specify...)
Firstly, login to the UTM and navigate to the Network Protection & Firewall section, now delete any rule you have made in order to try to get port 8333 and 1833 working.
Now, follow these steps: 1) Click New Rule 2) In the Sources box, click the folder and drag in 'LAN (Network)' 3) In the Services Box, click the + button 4a) Give your first port a name (8333), for this example i will call it tcp_8333 4b) In the Destination Port box, enter in 8333 4c) Click Save 5) Click the + button again 5a) Give your second port a name (1833), for this example i will call it tcp_1833 5b) In the Destination Port box, enter in 1833 5c) Click Save 6) Click the folder and drag in 'Any' 7) Press Save
It should look like so:
If you're hosting something in the internal network that requires inbound connections on port 8333 and 1833, then you will have to use DNAT (please dont use Generic Proxy, ugh!).
If this is the thing you need, please reply and i will provide a step by step way of doing that too [:)]
It is some more then just internal len and just the tow ports ports: TCP/UDP 18333 → 1:65535, TCP/UDP 1:65535 → 18333 TCP/UDP 8332:8335 → 1:65535 TCP/UDP 1:65535 → 8332:8335 TCP/UDP 3332:3333 → 1:65535 TCP/UDP 1:65535 → 3332:3333 All in a service group ('BitCoin')
its need to be accessble for every one on the internal net (3 or them) and also out on this port Internal len : 192.168.1.0/24 Bitcoin Len 192.168.2.0/24 NTL let: 192.168.0/24 - also going out to via NTL router (the ntl router (192.168.0.1) do not have fierwall and DMZ to the astaro on 192.168.0.3. (192.168.0.3 is the defaul gateway)
On the firewall it is like this (2 rules): Any - > Bitcoin ports -Internal len, Bitcoin len and NTL len Internal len, Bitcoin len and NTL len -> Bitcoin prots - Any