I recently ran into a problem where my newly purchased RVL200 to replace a BEFSX41 was performing SNAT all inbound packets being port forwarded or to the DMZ Therefore, all packets arriving at my server appear to originate from the router itself, i.e. the src IP address was the router's LAN IP address. Suffice to say that this is bad. In my case, my server firewall rules allowed all access to the internal LAN. Since this was true, my server appear as a public unprotected server on the internet. Obviously, I fixed that problem by viewing my router as the internet and setting up the appropriate firewall rules. In the meantime, my smtp server was "discovered" as a promiscuous router and I have been hammered ever since by evil spammers. I installed a number of spam-filters but dog gone it, many of them depend upon the src ip address. So that was a waste of time. Have have contacted Linksys about the issue and was wondering if anyone else in the linksys community has seen this problem. Moreover, if you do own an RVL200 and have a server, either port forwarded or DMZ'd, I wold suggest taking a look at your firewall rule to protect yourself from the router.