
I also get from the Azure side to my Local network but not reversed.Ĭode: Select all /tool sniffer> quick interface=br_Azure ip-protocol=icmp ip-address=172.17.5.5 However, I have set up a routing table on Azure.

The gateway on the vm is an Azure gateway registered.

Code: Select all /ip firewall filter> printįlags: X - disabled, I - invalid, D - dynamicĬhain=forward action=accept connection-state=established,related log=no log-prefix=""Ĭhain=forward action=drop connection-state=invalid log=no log-prefix=""Ĭhain=input action=accept protocol=tcp in-interface=ether1 dst-port=8291 log=no log-prefix=""Ĭhain=input action=accept protocol=tcp in-interface=ether1 dst-port=31194 log=no log-prefix=""Ĥ X Input Mikrotik Managment P:500,1701,4500Ĭhain=input action=accept protocol=udp in-interface=ether1 dst-port=500,1701,4500 log=no log-prefix=""ĥ chain=input action=accept protocol=ipsec-esp in-interface=ether1 log=no log-prefix=""Ħ chain=forward action=accept protocol=tcp dst-address=10.100.124.207 dst-port=443 log=no log-prefix=""Ĭhain=forward action=accept src-address=10.99.1.0/24 log=no log-prefix=""Ĭhain=input action=drop in-interface=ether1 log=no /ip firewall nat> printĠ X chain=srcnat action=accept src-address=10.99.1.0/24 dst-address=172.17.5.0/24 log=no log-prefix=""ġ chain=srcnat action=masquerade src-address=172.17.5.0/24 log=no log-prefix=""Ģ chain=dstnat action=dst-nat to-addresses=10.100.124.207 to-ports=443 protocol=tcp in-interface=ether1 dst-port=443 log=no log-prefix=""ģ chain=dstnat action=dst-nat to-addresses=10.100.124.6 to-ports=3000 protocol=tcp in-interface=ether1 dst-port=3000 log=no log-prefix=""
