I’m positive it is making it through NAT as I am able to see the RST FLAG on the target machine when running a packet capture on the destination host.
The running config is posted below. This is all lab so the IP’s are harmless.
The question I have though is it possible that VYOS is intercepting the SSH port 22 traffic since it is also listening on port 22? I haven’t tested that theory but I guess I can once I am in front of my lab.
Again thank for any and all responses.
[color=#ff3333] show config[/color]
[color=#ff3333]interfaces {[/color]
[color=#ff3333] ethernet eth3 {[/color]
[color=#ff3333] address 10.1.1.250/32[/color]
[color=#ff3333] address 10.1.1.250/24[/color]
[color=#ff3333] description OUTSIDE[/color]
[color=#ff3333] duplex auto[/color]
[color=#ff3333] hw-id 00:0c:29:dc:59:ad[/color]
[color=#ff3333] smp_affinity auto[/color]
[color=#ff3333] speed auto[/color]
[color=#ff3333] }[/color]
[color=#ff3333] ethernet eth4 {[/color]
[color=#ff3333] address 192.168.50.1/24[/color]
[color=#ff3333] description PFsense[/color]
[color=#ff3333] duplex auto[/color]
[color=#ff3333] hw-id 00:0c:29:dc:59:b7[/color]
[color=#ff3333] smp_affinity auto[/color]
[color=#ff3333] speed auto[/color]
[color=#ff3333] }[/color]
[color=#ff3333] ethernet eth5 {[/color]
[color=#ff3333] address 192.168.51.1/24[/color]
[color=#ff3333] description CheckPointR80.10[/color]
[color=#ff3333] duplex auto[/color]
[color=#ff3333] hw-id 00:0c:29:dc:59:c1[/color]
[color=#ff3333] smp_affinity auto[/color]
[color=#ff3333] speed auto[/color]
[color=#ff3333] }[/color]
[color=#ff3333] loopback lo {[/color]
[color=#ff3333] }[/color]
[color=#ff3333]}[/color]
[color=#ff3333]nat {[/color]
[color=#ff3333] destination {[/color]
[color=#ff3333] }[/color]
[color=#ff3333] source {[/color]
[color=#ff3333] }[/color]
[color=#ff3333]}[/color]
[color=#ff3333]service {[/color]
[color=#ff3333] dns {[/color]
[color=#ff3333] forwarding {[/color]
[color=#ff3333] cache-size 150[/color]
[color=#ff3333] listen-on eth3[/color]
[color=#ff3333] name-server 10.1.1.15[/color]
[color=#ff3333] }[/color]
[color=#ff3333] }[/color]
[color=#ff3333] ssh {[/color]
[color=#ff3333] port 22[/color]
[color=#ff3333] }[/color]
[color=#ff3333]}[/color]
[color=#ff3333]system {[/color]
[color=#ff3333] config-management {[/color]
[color=#ff3333] commit-revisions 20[/color]
[color=#ff3333] }[/color]
[color=#ff3333] console {[/color]
[color=#ff3333] }[/color]
[color=#ff3333] domain-name TestLabRouter.Local[/color]
[color=#ff3333] gateway-address 10.1.1.1[/color]
[color=#ff3333] host-name PacketRouter[/color]
[color=#ff3333] login {[/color]
[color=#ff3333] user vyos {[/color]
[color=#ff3333] authentication {[/color]
[color=#ff3333] encrypted-password ****************[/color]
[color=#ff3333] plaintext-password ****************[/color]
[color=#ff3333] }[/color]
[color=#ff3333]}[/color]
[color=#ff3333] level admin[/color]
[color=#ff3333] }[/color]
[color=#ff3333] }[/color]
[color=#ff3333] name-server 10.1.1.15[/color]
[color=#ff3333] ntp {[/color]
[color=#ff3333] server 0.pool.ntp.org {[/color]
[color=#ff3333] }[/color]
[color=#ff3333] server 1.pool.ntp.org {[/color]
[color=#ff3333] }[/color]
[color=#ff3333] server 2.pool.ntp.org {[/color]
[color=#ff3333] }[/color]
[color=#ff3333] }[/color]
[color=#ff3333] package {[/color]
[color=#ff3333] auto-sync 1[/color]
[color=#ff3333] repository community {[/color]
[color=#ff3333] components main[/color]
[color=#ff3333] distribution helium[/color]
[color=#ff3333] password ****************[/color]
[color=#ff3333] url http://packages.vyos.net/vyos[/color]
[color=#ff3333] username “”[/color]
[color=#ff3333] }[/color]
[color=#ff3333] }[/color]
[color=#ff3333] syslog {[/color]
[color=#ff3333] global {[/color]
[color=#ff3333] facility all {[/color]
[color=#ff3333] level notice[/color]
[color=#ff3333] }[/color]
[color=#ff3333] facility protocols {[/color]
[color=#ff3333] level debug[/color]
[color=#ff3333] }[/color]
[color=#ff3333] }[/color]
[color=#ff3333] }[/color]
[color=#ff3333] time-zone UTC[/color]
[color=#ff3333]} [/color]