@louis2 said in 1:1 NAT reflection to replace splict DNS as solution to reach my own public servers from the LAN:
However since DNS query's are more and more hidden in HTTPS, Split DNS solutions do not work any longer. So I need a different solution, which might simplify things as well.
You should better care, that the local devices use your local DNS instead.
Normally you can configure web browsers to not use DoH, but the system DNS resolver.
And for the hard cores, there are lists with DoH servers in the internet, which you can use to block it.
option: System > Advanced on the Firewall & NAT Enable automatic outbound NAT for Reflection
I combination with some rules in "Firewall NAT1:1"
This should also enable internal devices accessing your public IPs without additional NAT rules.
But remember, this is only NAT as well.
When a packet is arriving via the WAN, the WAN has a couple of rules to allow / to block / to NAT.
When using NAT 1:1, you have to additionally configure the necessary firewall rules on WAN and on the internal interface. The NAT rules don't pass any traffic on their own.