Behind my AX86U I am monitoring a device via SNMP.
The SNMP manager initiates the communication by using a non-standard port.
So I created a forwarding rule that redirects the non-standard port to the internal device.
Something like this:
Example:
The service is running fine and I'm able to monitor the device.
However, I'm seeing some random attempts to access the device via SNMP, all with different global IPs.
The problem is that the SNMP manager uses a dynamic IP that changes from time to time, so I cannot set a fixed IP in the Source IP field.
I want to add a firewall rule in the router to allow access to the device only from the SNMP manager on some specific ports.
However, I cannot set a static IP in the firewall rule set and could not find an option to include the expected DDNS domain name.
Do you guys have any tips on how to include this rule or should I look for a more robust firewall option?
The SNMP manager initiates the communication by using a non-standard port.
So I created a forwarding rule that redirects the non-standard port to the internal device.
Something like this:
Code:
external [diff UDP port] -> internal [snmp UDP 161]
The service is running fine and I'm able to monitor the device.
However, I'm seeing some random attempts to access the device via SNMP, all with different global IPs.
The problem is that the SNMP manager uses a dynamic IP that changes from time to time, so I cannot set a fixed IP in the Source IP field.
I want to add a firewall rule in the router to allow access to the device only from the SNMP manager on some specific ports.
However, I cannot set a static IP in the firewall rule set and could not find an option to include the expected DDNS domain name.
Do you guys have any tips on how to include this rule or should I look for a more robust firewall option?