NAT Reflection mode for port forwards : enable(pure NAT)
Enable NAT Reflection for 1:1 NAT :check
Enable automatic outbound NAT for Reflection:check
test ok
===
but when I add a floating rule to limit bandwidth,NAT reflection failed。
this rule set In/Out :
On Sat, Dec 5, 2015 at 10:38 PM, Jarno Elonen wrote:
> I'm trying to build a firewall, which NATs LAN-->WAN, and DMZ-->WAN, but
> routes LAN-->DMZ.
> The problem is, LAN-->DMZ currently only works if I add a NAT between them.
>
Problem solved. Turns out this was an asymmetric
We have recently been the target of DDoS attacks. The same interface is
targeted each time. Is there any way we can shut down this interface
automatically when this happens? Is there a way to maybe set a threshold
for traffic and, when it reaches that threshold, automatically shut the
interface