Hard to tell, since no sign of troubleshooting is shown.
This dnat address must be active on outside, so original request will enter the router (verify using tcpdump)
Then on LAN, packet should be answered to same VRRP member.
Version: VyOS 1.4-rolling-202111072034
Release train: sagitta
Built by: [email protected]
Built on: Sun 07 Nov 2021 20:34 UTC
Build UUID: a365b87c-083c-4f88-a821-697a86d7f05e
Build commit ID: 7fc087b255aca9
You know, I’m start thinking that problem possible with firewall, directly when i remove it from INput of interface NAT starts working, but I have rule that should gave access to NAT.
show firewall name ISP-IN rule 60
action accept
description LIP
destination {
port 39781-39788
}
protocol tcp
show nat destination rule 47
description "LIP-M"
destination {
address VRRPIP
port 39787
}
inbound-interface any
protocol tcp
translation {
address 11.11.13.191
port 9786
}
@hexes .
This config, almost copied from yours but simplified, is working as expected:
NAT Rules:
vyos@vyos# run show config comm | grep "nat destination"
set nat destination rule 47 destination address '192.168.122.133' #Virtual IP address of VRRP
set nat destination rule 47 destination port '39787'
set nat destination rule 47 inbound-interface 'any'
set nat destination rule 47 protocol 'tcp'
set nat destination rule 47 translation address '10.1.1.2'
set nat destination rule 47 translation port '9786'
Firewall config:
vyos@vyos# run show config comm | grep firewall
set firewall name ISP-IN default-action 'drop'
set firewall name ISP-IN rule 60 action 'accept'
set firewall name ISP-IN rule 60 destination port '9786,39781-39788'
set firewall name ISP-IN rule 60 protocol 'tcp'
set interfaces ethernet eth0 firewall in name 'ISP-IN'
Counters on NAT and firewall get increased properly:
vyos@vyos# run show firewall name ISP-IN statistics
-----------------------------
Rulesets Information
-----------------------------
IPv4 Firewall "ISP-IN":
Active on (eth0,IN)
rule packets bytes action source destination
---- ------- ----- ------ ------ -----------
60 19 4.21K ACCEPT 0.0.0.0/0 0.0.0.0/0
10000 9 540 DROP 0.0.0.0/0 0.0.0.0/0
[edit]
vyos@vyos# run show nat destination statistics
rule pkts bytes interface
---- ---- ----- ---------
47 1 60 192.168.122.133
Were you able to trace why when you enable your firewall this stops working?
Why does rule 60 output show VRRP-IP in dest column? Rule 60 doesn’t specify dest target IP. And if it did, it should match on LAN IP as firewall comes after dNAT