That rule is not natting your 216.168.46.0/24 traffic, barring a major bug in 
RouterOS.  Something else may be, but not that rule as shown here.

"/ip firewall nat export" and show the command you typed all the way through 
the next command prompt.

Also let us know your RouterOS version. 

On July 3, 2015 11:49:33 AM CDT, "D. Ryan Spott" <[email protected]> wrote:
>I have the following network:
>
><internet>-<router>-<ISP Network>
>
>The router has a WAN IP of 209.90.234.1/28
>The router has a LAN IP of 216.168.46.0/24
>The router has a LAN IP of 10.0.1.0/24
>
>When I enable this:
>/ip firewall nat
>add action=masquerade chain=srcnat out-interface=WAN
>src-address=10.0.1.0/24
>
>The result is ALL of the LAN clients 10. and 216. are all masqueraded
>to 
>209.90.234.1.
>
>
>
>
>How can I limit the masquerade to the 10.0.1.0/24 network ONLY and let 
>the 216.168.46.0 addresses do the normal internet routing thing?
>
>It is something obvious. Need more coffee.. or Scotch.
>
>
>ryan
>
>-- 
>D. Ryan Spott | NGC457, llc
>broadband | telco | colo | communities
>PO Box 1734 Sultan, WA 98294
>425-939-0047
>
>
>
>------------------------------------------------------------------------
>
>_______________________________________________
>Mikrotik-users mailing list
>[email protected]
>http://lists.wispa.org/mailman/listinfo/mikrotik-users

-- 
Sent from my Android device with K-9 Mail. Please excuse my brevity.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
<http://mail.butchevans.com/pipermail/mikrotik/attachments/20150703/24488d51/attachment.html>
_______________________________________________
Mikrotik mailing list
[email protected]
http://mail.butchevans.com/mailman/listinfo/mikrotik

Visit http://blog.butchevans.com/ for tutorials related to Mikrotik RouterOS

Reply via email to