ok would you like to run a capture test like this?
tcpdump -i wan -w /tmp/capturesqmcakenfables.pcap
i delete that before
table ip masq {
map portmaps {
type inet_service : ipv4_addr
elements = { 1935 : 192.168.2.160, 3480 : 192.168.2.160, 3074 : 192.168.2.160, 3075 : 192.168.2.160, 3076 : 192.168.2.160, 3077 : 192.168.2.160, 3478 : 192.168.2.160, 3479 : 192.168.2.160, 9308 : 192.168.2.160, 3659 : 192.168.2.160 } # set these up to map ports to specific internal IPs
}
chain masqout {
type nat hook postrouting priority 0; policy accept;
oifname $wan masquerade
}
## this empty table is required to make the kernel do the unmasquerading
chain masqin {
type nat hook prerouting priority 0; policy accept;
iifname $wan dnat to tcp dport map @portmaps
iifname $wan dnat to udp dport map @portmaps
}
}
replace only by
iifname $wan protocol {udp,tcp} dnat to 192.168.1.101 #or whatever your console is```