Hello, I have a network where the router is a RUT241, through which I access via VPN without issues. On this device, I have set up port forwarding for some devices to reach them remotely. This system works for all ports and devices except for a TSW202 and a TSW212. If I try to access port 80 or port 443, I receive the following error: Rejected request from RFC1918 IP to public server address.
I noticed that in the RUT241 settings, it is possible to select the option “Ignore private IPs on public interface” under System → Administration → Access Control → HTTPS. However, this option is not available in the same menu on the TSW202 (TSW212).
Is it possible to enable this option via the command line or resolve the issue in another way?
thanks!
The error you are encountering occurs because the port-forwarded device is in the LAN network, and you are trying to access it via its public IP from within the same LAN. This behavior is expected due to how NAT and routing are handled.
Could you try accessing the device remotely via the WAN interface instead? This should work as expected without any additional configuration changes.
Hello Martynas, my only way to access the network remotely is through the SIM connection of the RUT241. The RUT241 and TSW202 are connected to each other via the LAN port of the RUT241. I will be able to return to the site at the end of this week. For now, I can access the Web interface of the RUT241 via VPN, and I could access the interface of the TSW202 through a remote connection to a PC connected to that network. The VPN I use is Zerotier, and it is installed on the RUT241.
Hi, after running the command /etc/init.d/uhttpd restart following the first two commands, everything is now working! Thank you so much! To recap, the commands to run from the TSW202 CLI are:
uci set uhttpd.main.rfc1918_filter='0'
uci commit uhttpd
/etc/init.d/uhttpd restart
This procedure also worked for the TSW212 model. Do you think this feature will be integrated into the WebUI in the future, as it is for the RUT241?
Thank you again for the support.