7 Nov
2013
7 Nov
'13
1:33 a.m.
Not that I'm saying that NAT is the appropriate solution, if you are having "NAT fall over whenever some attacker breathes a few packets across it" then you are doing it waaaay wrong.
You could do that with 1:1 NAT instead of having public IPs directly on the servers.
And then watch the NAT fall over whenever some attacker breathes a few packets across it. ;>