1 Similar to SNAT/DNAT depending on chain: it takes a range of addresses 2 (`\-\-to 1.2.3.4\-1.2.3.7') and gives a client the same 3 source-/destination-address for each connection. 4 .PP 5 N.B.: The DNAT target's \fB\-\-persistent\fP option replaced the SAME target. 6 .TP 7 \fB\-\-to\fP \fIipaddr\fP[\fB\-\fP\fIipaddr\fP] 8 Addresses to map source to. May be specified more than once for 9 multiple ranges. 10 .TP 11 \fB\-\-nodst\fP 12 Don't use the destination-ip in the calculations when selecting the 13 new source-ip 14 .TP 15 \fB\-\-random\fP 16 Port mapping will be forcibly randomized to avoid attacks based on 17 port prediction (kernel >= 2.6.21). 18