Comments
-
Yes, I know the WAN IP currently (dont want to post publicly) - lets call it 64.60.100.10/28 (LAN1) The other block is (fake) 64.55.100.10/26 (LAN2) I will leave the original alone, and do the LAN2 for 64.55.100.10/26 and SNAT none route LAN2 to WAN
-
Thanks Peter - Just so I understand correctly, and to put it in terms of what I have - I have 1 line currently going to WAN1 port - this carries my SSL, IPSEc etc for the core (LAN1). Could I do it such that I use my P7 (LAN2) port to separate out my Public traffic - I do the LAN2 to WAN1 SNAT None WIll that work same way?…
-
For clarification - this is the post where I saw one IP at a time - https://kb.zyxel.com/KB/searchArticle!viewDetail.action?articleOid=015541&lang=EN Also note that the switch has its own IP, and the pass through public IP are different. So I dont want to put the entire Zywall 110 in bridge mode, just one port of it will…
-
Is the ZyWall 110 affected by this vulnerability? The latest firmware for that is 4.71 so bit confused.