<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SSL VPN WITH STATICALLY NATED IP in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275838#M105065</link>
    <description>&lt;P&gt;Hi Martijn,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we added the proxy arp&lt;BR /&gt;&lt;BR /&gt;tcpdump -i eth0 host 45.18.30.4 and port 443 -nn&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;11:39:21.042432 IP 45.18.30.4.10436 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3679793726, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:21.049128 IP 45.18.30.4.10437 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 116248886, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:21.295609 IP 45.18.30.4.10438 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3623247912, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:24.042378 IP 45.18.30.4.10436 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3679793726, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:24.048657 IP 45.18.30.4.10437 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 116248886, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:24.295722 IP 45.18.30.4.10438 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3623247912, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:30.041656 IP 45.18.30.4.10436 &amp;gt; 18.19.20.5.443: Flags [S], seq 3679793726, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:30.048135 IP 45.18.30.4.10437 &amp;gt; 18.19.20.5.443: Flags [S], seq 116248886, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:30.295105 IP 45.18.30.4.10438 &amp;gt; 18.19.20.5.443: Flags [S], seq 3623247912, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:39.322900 IP 45.18.30.4.10439 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 372606881, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:39.552212 IP 45.18.30.4.10440 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 1330313550, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:42.322018 IP 45.18.30.4.10439 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 372606881, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:42.552395 IP 45.18.30.4.10440 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 1330313550, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:48.322244 IP 45.18.30.4.10439 &amp;gt; 18.19.20.5.443: Flags [S], seq 372606881, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:48.553833 IP 45.18.30.4.10440 &amp;gt; 18.19.20.5.443: Flags [S], seq 1330313550, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Tue, 21 Apr 2026 06:16:11 GMT</pubDate>
    <dc:creator>siddu099</dc:creator>
    <dc:date>2026-04-21T06:16:11Z</dc:date>
    <item>
      <title>SSL VPN WITH STATICALLY NATED IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275836#M105063</link>
      <description>&lt;P class=""&gt;&lt;SPAN&gt;Dear Team,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;I am trying to configure SSL VPN on the Check Point gateway using a statically NATed public IP, but I am unable to access the SSL VPN portal page.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;The external interface (eth0) is configured with IP 18.19.20.1/28. Since this IP cannot be used directly for SSL VPN, I have selected another available IP from the same subnet (18.19.20.5) and configured static NAT for it.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN&gt;However, I am still unable to reach the SSL VPN page using the NATed IP.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Could you please suggest what additional checks or configurations need to be verified from my end?&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Thanks&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Siddu&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 05:14:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275836#M105063</guid>
      <dc:creator>siddu099</dc:creator>
      <dc:date>2026-04-21T05:14:43Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN WITH STATICALLY NATED IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275837#M105064</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Did you configure proxy ARP for the new static NAT IP?&lt;BR /&gt;&lt;BR /&gt;What does the log show? Can you show us what you have configured?&lt;BR /&gt;Have you performed a check with 'fw monitor' or 'tcpdump' to see what is going on?&lt;BR /&gt;&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 05:53:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275837#M105064</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2026-04-21T05:53:17Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN WITH STATICALLY NATED IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275838#M105065</link>
      <description>&lt;P&gt;Hi Martijn,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;we added the proxy arp&lt;BR /&gt;&lt;BR /&gt;tcpdump -i eth0 host 45.18.30.4 and port 443 -nn&lt;BR /&gt;tcpdump: verbose output suppressed, use -v or -vv for full protocol decode&lt;BR /&gt;listening on eth0, link-type EN10MB (Ethernet), capture size 262144 bytes&lt;BR /&gt;11:39:21.042432 IP 45.18.30.4.10436 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3679793726, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:21.049128 IP 45.18.30.4.10437 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 116248886, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:21.295609 IP 45.18.30.4.10438 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3623247912, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:24.042378 IP 45.18.30.4.10436 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3679793726, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:24.048657 IP 45.18.30.4.10437 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 116248886, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:24.295722 IP 45.18.30.4.10438 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 3623247912, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:30.041656 IP 45.18.30.4.10436 &amp;gt; 18.19.20.5.443: Flags [S], seq 3679793726, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:30.048135 IP 45.18.30.4.10437 &amp;gt; 18.19.20.5.443: Flags [S], seq 116248886, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:30.295105 IP 45.18.30.4.10438 &amp;gt; 18.19.20.5.443: Flags [S], seq 3623247912, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:39.322900 IP 45.18.30.4.10439 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 372606881, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:39.552212 IP 45.18.30.4.10440 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 1330313550, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:42.322018 IP 45.18.30.4.10439 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 372606881, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:42.552395 IP 45.18.30.4.10440 &amp;gt; 18.19.20.5.443: Flags [SEW], seq 1330313550, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:48.322244 IP 45.18.30.4.10439 &amp;gt; 18.19.20.5.443: Flags [S], seq 372606881, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;11:39:48.553833 IP 45.18.30.4.10440 &amp;gt; 18.19.20.5.443: Flags [S], seq 1330313550, win 8192, options [mss 1460,nop,nop,sackOK], length 0&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 06:16:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275838#M105065</guid>
      <dc:creator>siddu099</dc:creator>
      <dc:date>2026-04-21T06:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: SSL VPN WITH STATICALLY NATED IP</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275862#M105067</link>
      <description>&lt;P&gt;So the traffic is reaching the gateway. &lt;BR /&gt;&lt;BR /&gt;What do you see in the Check Point logs?&amp;nbsp;Any drops?&lt;BR /&gt;&lt;BR /&gt;What is your NAT configuration? Can you share a screenshot?&lt;BR /&gt;Do you see NAT is applied in the logs?&lt;BR /&gt;&lt;BR /&gt;Martijn&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2026 08:15:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/SSL-VPN-WITH-STATICALLY-NATED-IP/m-p/275862#M105067</guid>
      <dc:creator>Martijn</dc:creator>
      <dc:date>2026-04-21T08:15:43Z</dc:date>
    </item>
  </channel>
</rss>

