Port forward 514 to 5514 does not work

Latest response

Hi

In my firewall configuration i have this:

public (active)
  target: default
  icmp-block-inversion: no
  interfaces: lo VLAN3030
  sources: 
  services: ssh dhcpv6-client
  ports: 9200/tcp 9300/tcp 5601/tcp 1026/tcp 1026/udp 514/tcp 514/udp 5514/tcp 5514/udp 5600/tcp 9600/tcp 6514/udp 6514/tcp
  protocols: 
  masquerade: yes
  forward-ports: port=514:proto=udp:toport=5514:toaddr=
    port=514:proto=tcp:toport=5514:toaddr=
    port=514:proto=udp:toport=5514:toaddr=127.0.0.1
    port=514:proto=tcp:toport=5514:toaddr=127.0.0.1
  source-ports: 
  icmp-blocks: 
  rich rules:

But i don't have information from port 5514 only by the 514, you can see with this command:

tcpdump -n -i VLAN3030 dst port 514 2>&1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on VLAN3030, link-type EN10MB (Ethernet), capture size 262144 bytes
13:13:07.239538 IP 10.1.6.93.21375 > 10.1.6.28.syslog: SYSLOG mail.info, length: 108
13:13:07.239595 IP 10.1.6.93.21375 > 10.1.6.28.syslog: SYSLOG mail.info, length: 76
13:13:07.239740 IP 10.1.6.93.21375 > 10.1.6.28.syslog: SYSLOG mail.info, length: 66
13:13:07.239941 IP 10.1.6.93.21375 > 10.1.6.28.syslog: SYSLOG mail.info, length: 107
13:13:07.258275 IP 10.1.6.93.21375 > 10.1.6.28.syslog: SYSLOG mail.info, length: 73
tcpdump -n -i VLAN3030 dst port 5514 2>&1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on VLAN3030, link-type EN10MB (Ethernet), capture size 262144 bytes
^C
0 packets captured
0 packets received by filter
0 packets dropped by kernel

Responses