It sounds to me like there is either a bug you have hit or a typo in the rule that was applied.
What version are you running? And is the 10.0.1.0/24 network on a different interface? There seems to be a bug in some versions that don't apply rule changes correctly (so if this rule was originally a masquerade with out interface wan then it may be sticking like that until a reboot. Another issue is if that first rule applies to some traffic and you changed it remember to flush the conntrack table to clear any natting that came through before it And on the performance side (especially under DDOS attack) if this is your ISP edge router and you are natting traffic for your management range etc then get a separate small mikrotik to do that natting and give it a public IP in the range. Then you can turn off conntrack and avoid all packet reassembly in the router and avoid state exhaustion attacks against your infrastructure there. Especially once 6.30 is released (and stabilised) now providing VLAN fast path. Now I just looking forward to PPP encap fast path and fast track. For your issue. If you can provide the version and a sanitised export (for anything you can't / don't want to share) we can look and help. Regards Alexander Alexander Neilson Neilson Productions Ltd [email protected] 021 329 681 > On 4/07/2015, at 5:38 am, Ryan Spott <[email protected]> wrote: > > it is the only NAT rule I have. > I only want to NAT the 10. network > > I do NOT want to NAT the 216 network. > > ryan > > > > >> On Jul 3, 2015, at 10:01 AM, Chupaka <[email protected]> wrote: >> >> Seems like that's not the only NAT rule you have, because that rule >> masquerades only 10.0.1.0/24 :) >> >> Anyway, I prefer using scheme like >> >> /ip firewall nat >> add action=accept chain=srcnat out-interface=WAN src-address=209.90.234.1/28 >> add action=masquerade chain=srcnat out-interface=WAN >> >> I.e. accept your public addresses so that they won't be NATted, and then >> masquerade everything else. >> >> >> -- >> Подпись: >> (добавляется в конце всех исходящих писем) >> >> 2015-07-03 19:49 GMT+03:00 D. Ryan Spott <[email protected]>: >> >>> I have the following network: >>> >>> <internet>-<router>-<ISP Network> >>> >>> The router has a WAN IP of 209.90.234.1/28 >>> The router has a LAN IP of 216.168.46.0/24 >>> The router has a LAN IP of 10.0.1.0/24 >>> >>> When I enable this: >>> /ip firewall nat >>> add action=masquerade chain=srcnat out-interface=WAN src-address= >>> 10.0.1.0/24 >>> >>> The result is ALL of the LAN clients 10. and 216. are all masqueraded to >>> 209.90.234.1. >>> >>> >>> >>> >>> How can I limit the masquerade to the 10.0.1.0/24 network ONLY and let >>> the 216.168.46.0 addresses do the normal internet routing thing? >>> >>> It is something obvious. Need more coffee.. or Scotch. >>> >>> >>> ryan >>> >>> -- >>> D. Ryan Spott | NGC457, llc >>> broadband | telco | colo | communities >>> PO Box 1734 Sultan, WA 98294 >>> 425-939-0047 >>> >>> -------------- next part -------------- >>> An HTML attachment was scrubbed... >>> URL: < >>> http://mail.butchevans.com/pipermail/mikrotik/attachments/20150703/e80d012b/attachment.html >>> _______________________________________________ >>> Mikrotik mailing list >>> [email protected] >>> http://mail.butchevans.com/mailman/listinfo/mikrotik >>> >>> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik >>> RouterOS >> -------------- next part -------------- >> An HTML attachment was scrubbed... >> URL: >> <http://mail.butchevans.com/pipermail/mikrotik/attachments/20150703/bcc8f86d/attachment.html> >> _______________________________________________ >> Mikrotik mailing list >> [email protected] >> http://mail.butchevans.com/mailman/listinfo/mikrotik >> >> Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS > _______________________________________________ > Mikrotik mailing list > [email protected] > http://mail.butchevans.com/mailman/listinfo/mikrotik > > Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS _______________________________________________ Mikrotik mailing list [email protected] http://mail.butchevans.com/mailman/listinfo/mikrotik Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

