<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Identity propagation ClusterXl members in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/275038#M104771</link>
    <description>&lt;P&gt;This might be a job for TAC, I don't have the setup to test this at the moment. I'm not aware of any reason why it should or should not work but I also haven't tried it before.&lt;/P&gt;</description>
    <pubDate>Wed, 08 Apr 2026 02:06:25 GMT</pubDate>
    <dc:creator>emmap</dc:creator>
    <dc:date>2026-04-08T02:06:25Z</dc:date>
    <item>
      <title>Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274953#M104756</link>
      <description>&lt;P&gt;It became necessary to establish a connection between PDP and PEP in Identity Sharing mode from the interfaces of ClusterXL members. In short, the analogue of the cause of sk63264.&lt;BR /&gt;Is it possible?&lt;BR /&gt;The need is that some of the equipment must work via Route-Based IPsec, and, as it turned out, NAT is not possible with vti/vpnt.&lt;BR /&gt;Maybe there is an option to set a source IP to establish a connection?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 05:08:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274953#M104756</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-07T05:08:23Z</dc:date>
    </item>
    <item>
      <title>Re: Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274957#M104757</link>
      <description>&lt;P&gt;You want to change the IP address being used for ID sharing? We can do that:&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk60701" target="_blank"&gt;https://support.checkpoint.com/results/sk/sk60701&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 05:30:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274957#M104757</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-07T05:30:27Z</dc:date>
    </item>
    <item>
      <title>Re: Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274967#M104758</link>
      <description>&lt;PRE class=""&gt;I saw this SK. Ithink It doesn't quite fit. The following is required.&lt;BR /&gt;There is an Identity Sharing Gateway.&lt;BR /&gt;A cluster with a VIP main IP of 172.21.56.1 connects to it. NAT is created. When accessing through regular interfaces via the backup ethxx channel, everything is fine. But when accessing via IPsec, the traffic doesn't follow the NAT rule. Traffic from the VPN simply ignores the NAT and goes from the VPN's src IP (let's say 192.168.1.1 ClusterMemberA, 192.168.1.2 ClusterMemberB). And the output I get is the situation described in sk63264 - Identity Sharing GW with two Incoming sessions from 192.168.1.1 and 192.168.1.2.&lt;/PRE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 08:24:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274967#M104758</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-07T08:24:05Z</dc:date>
    </item>
    <item>
      <title>Re: Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274975#M104759</link>
      <description>&lt;P&gt;Does your VTI have a VIP configured in SmartConsole?&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 09:44:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274975#M104759</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-07T09:44:28Z</dc:date>
    </item>
    <item>
      <title>Re: Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274978#M104760</link>
      <description>&lt;P&gt;Yes. Explicit Hide rule. NAT doesn't work.&lt;/P&gt;&lt;P&gt;There is a backup plan to simply connect directly to the collector becasue it initiates connection, but I would like to try to make the current configuration work.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Apr 2026 10:24:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/274978#M104760</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-07T10:24:58Z</dc:date>
    </item>
    <item>
      <title>Re: Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/275038#M104771</link>
      <description>&lt;P&gt;This might be a job for TAC, I don't have the setup to test this at the moment. I'm not aware of any reason why it should or should not work but I also haven't tried it before.&lt;/P&gt;</description>
      <pubDate>Wed, 08 Apr 2026 02:06:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/275038#M104771</guid>
      <dc:creator>emmap</dc:creator>
      <dc:date>2026-04-08T02:06:25Z</dc:date>
    </item>
    <item>
      <title>Re: Identity propagation ClusterXl members</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/276267#M105127</link>
      <description>&lt;P&gt;According to latest tests, R82.10 supports NAT for vpnt interfaces. But tested only single device.&lt;/P&gt;</description>
      <pubDate>Wed, 29 Apr 2026 17:10:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Identity-propagation-ClusterXl-members/m-p/276267#M105127</guid>
      <dc:creator>akurtasanov</dc:creator>
      <dc:date>2026-04-29T17:10:57Z</dc:date>
    </item>
  </channel>
</rss>

