1Similar to SNAT/DNAT depending on chain: it takes a range of addresses
2(`\-\-to 1.2.3.4\-1.2.3.7') and gives a client the same
3source-/destination-address for each connection.
4.PP
5N.B.: The DNAT target's \fB\-\-persistent\fP option replaced the SAME target.
6.TP
7\fB\-\-to\fP \fIipaddr\fP[\fB\-\fP\fIipaddr\fP]
8Addresses to map source to. May be specified more than once for
9multiple ranges.
10.TP
11\fB\-\-nodst\fP
12Don't use the destination-ip in the calculations when selecting the
13new source-ip
14.TP
15\fB\-\-random\fP
16Port mapping will be forcibly randomized to avoid attacks based on
17port prediction (kernel >= 2.6.21).
18