In SmartDashboard, the automatic NAT rules are organized as follows: first, Static NAT rules for Firewall or node (computer or server) objects have the highest priority, followed by Hide NAT rules for Firewall or node objects. Then come Static NAT rules for network or address range objects. Finally, Hide NAT rules for network or address range objects have the lowest priority. Therefore, both Address Range Hide NAT and Network Hide NAT have the lowest implementation priority.
Spoofing in the context of R80 refers to making packets appear as if they come from an authorized IP address. This method involves attackers using a fake, trusted IP address to hijack connections, send malware, perform DoS attacks, or gain unauthorized access to a network. This is consistent with the definition and purpose of IP spoofing in network security.