Common Problems

  1. NAT and firewall rules not correctly added (see Port Forwards)

Tip: Do NOT set a source portFirewall enabled on client machine

2. Firewall enabled on client machine

3. Client machine is not using AZTCO-FW as its default gateway

4. Client machine not actually listening on the port being forwarded

5. ISP or something upstream of AZTCO-FW is blocking the port being forwarded

6. Trying to test from inside the local network, need to test from an outside machine

7. Incorrect or missing Virtual IP configuration for additional public IP addressese

8. The AZTCO-FW router is not the border router. If there is something else between AZTCO-FW and the ISP, the port forwards and associated rules must be replicated there.

9. Forwarding ports to a server behind a Captive Portal. An IP bypass must be added both to and from the server’s IP in order for a port forward to work behind a Captive Portal.

10. If this is on a WAN that is not the default gateway, make sure there is a gateway chosen on this WAN interface, or the firewall rules for the port forward would not reply back via the correct gateway.

11. If this is on a WAN that is not the default gateway, ensure the traffic for the port forward is NOT passed in via Floating Rules or an Interface Group. Only rules present on the WAN’s interface tab under Firewall Rules will have the reply-to keyword to ensure the traffic responds properly via the expected gateway.

12. If this is on a WAN that is not the default gateway, make sure the firewall rule(s) allowing the traffic in do not have the box checked to disable reply-to.

13. If this is on a WAN that is not the default gateway, make sure the master reply-to disable switch is not checked under System > Advanced, on the Firewall/NAT tab.

14. WAN rules should NOT have a gateway set, so make sure that the rules for the port forward do NOT have a gateway configured on the actual rule.

15. If the traffic appears to be forwarding in to an unexpected device, it may be happening due to UPnP. Check Status > UPnP to see if an internal service has configured a port forward unexpectedly. If so, disable UPnP on either that device or on the firewall.