Andrew
Andrew
He comes here twice a year, if he misses few watch shifts ill make a branch and add readme ;-)
Will adapt in a week
This is about state of internet. Windows limits all retransmits to 5 to https://support.microsoft.com/en-us/topic/how-to-modify-the-tcp-ip-maximum-retransmission-time-out-7ae0982a-4963-fa7e-ee79-ff6d0da73db8 Thus one obtained from linux covers it. If you achieve more than few retransmits under normal...
This can be done even quicker, no point keeping it another yesr
Hi @jow- According to "upstream documentation" no need to perform any checks before deleting table since kernel 4.9.0.
``` # old meta nfproto ipv4 tcp dport 53 counter dnat 192.0.2.0:53 # new meta nfproto ipv4 tcp dport 53 counter dnat 192.0.2.0 ``` It could be even shorter with...
Also can zap remote port if equal and optimize user's rule.
Workaround: Create file /etc/nftabled.d/srcnat-wan.nft ``` chain srcnat_vpn { ip saddr 192.168.106.0/24 counter snat ip to 10.254.1.0/24 persistent comment "!fw4: SNAT" return // original rule just creates chain + jump but...
actually one could implement almost-mwan this way ;-)
You did not understand the trick involved. You make a snat rule which adds ifname filtering extra chain, then prepend that chain with ``` { your rule return # unreachable...