This is done as described in the wiki article cited.
Example:
<WAN address>:8080 ( source )
192.168.0.5:<service port> ( destination )
<service port> = 80 for HTTP or what ever the webserver is listening to.
Protocol:
Choose a protocol, TCP for HTTP
Source port: = Blank, This is the port the client was using to talk to you.
Destination port: = 80
External port (NAT): 8080
For the other servers define similar rules.
To be sure define the rule position as a low number ( 1,2,3, … ). The rules are checked in increasing order. Therefore it may be possible that hits first and deactivates the port forward rule(s).
Based on this then the IP you are using to access the server from is part of the IP set for an ISP or Hosting Company that also provides IP’s to Hostile activities such as criminals, malware providers etc.
You can also check and confirm if the Public IP you are using is in the drop list with the following:-
In the console run the command
location lookup public-ip
Using a known hostile ip the following info came back
[root@ipfire]# location lookup 147.78.102.37
147.78.102.37:
Network : 147.78.102.0/24
Country : Netherlands
Autonomous System : AS51396 - Pfcloud UG
Hostile Network safe to drop: yes
You can then confirm that the specified Network, which includes your public IP is in the drop list by running the following command, replacing the known hostile Network with the Network that your public IP is part of.
This shows that the hostile network has been found in the drop list.
If the network that your public IP is part of is not in the drop list then the console will just return to the cursor with no network info provided. For example:-
[root@ipfire]# location lookup 81.3.27.38
81.3.27.38:
Network : 81.3.0.0/18
Country : Germany
Autonomous System : AS24679 - kyberio GmbH