Would be nice. At the moment i have to put ip address as source and that can cause problems if someone else uses that ip.
sorry, what are you talking about?..
You can already do this:
/ip firewall nat add chain=dstnat src-mac-address=xx:xx:xx:xx:xx:xx
/ip firewall nat add chain=srcnat src-mac-address=xx:xx:xx:xx:xx:xx
It’s on the Advanced tab of a new NAT rule’s properties: Src. MAC Address
Does it make sense to match mac-address in POSTROUTING?
Does mac-address appear in netfilter POSTROUTING (src-nat) chain?
PREROUTING:
IN=eth3 OUT= MAC=00:15:17:2c:a2:a7:00:0e:8e:13:c5:a8:08:00 SRC=10.1.1.22 DST=76.201.155.14 LEN=126 TOS=0x00 PREC=0x00 TTL=127 ID=28360 PROTO=UDP SPT=7331 DPT=61271 LEN=106
POSTROUTING:
IN= OUT=eth0 SRC=192.168.93.7 DST=210.19.13.0 LEN=95 TOS=0x00 PREC=0x00 TTL=125 ID=1057 PROTO=UDP SPT=43643 DPT=10605 LEN=75
(tested on plain linux)
I don’t think it does in postrouting. So scratch off the srcnat line from above post.
So to answer poster’s question, you can do it as above example with dstnat chain and src-mac-address.
what i want to do is masquerade mac address xx.xx.xx.xx.xx.xx and allow it to access the ip range on the other side.
so, see first dssmiktik’s post in this thread