Choose your cart
Choose your cart
Receive up to $504 promo credit ($180 w/Welcome Unlimited, $360 w/ 5G Start, or $504 w/5G Do More, 5G Play More, 5G Get More or One Unlimited for iPhone plan (Welcome Unlimited and One Unlimited for iPhone plans can't be mixed w/other Unlimited plans; all lines on the account req'd on respective plans)) when you add a new smartphone line with your own 4G/5G smartphone on an eligible postpaid plan between 2/10/23 and 4/5/23. Promo credit applied over 36 months; promo credits end if eligibility requirements are no longer met.
$699.99 (128 GB only) device payment purchase or full retail purchase w/ new smartphone line on One Unlimited for iPhone (all lines on account req'd on plan), 5G Start, 5G Do More, 5G Play More or 5G Get More plan req'd. Less $699.99 promo credit applied over 36 mos.; promo credit ends if eligibility req’s are no longer met; 0% APR.
Hi,
I recently switched to Verizon Fios GigE service from cablevision. I do a port forwarding to internal machine for ssh (port 22). I have some rules based on failed login attempts to ban the ip (fail2ban software). SInce I switched to FIOS, I can no longer use that as verizon does a NAT for incoming traffic as well and all of the traffic from outside seems to come from 192.168.1.1 (router ip). Ideally this should only be done for outgoing traffic where the source ip gets replaced with public ip and not for incoming traffic. Is there a setting in router that can fix this behavior?
Thanks,
I'm surprised you're having this problem -- when I ssh into my servers from afar, the servers see me connecting from the remote host, not the router. And that, of course, is how things should be...
One of these servers is the DMZ host, and the other's ssh-port is reached via port-forwarding. For both of them connections look as one'd expect...