<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic NAT Source Port manipulation in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/90783#M10824</link>
    <description>&lt;P&gt;Hello Checkmates&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently dealing with an issue for a client and need some guidance from the community.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attached a diagram showing the traffic flow. which I have summarised below:&lt;/P&gt;&lt;P&gt;The client establishes a site to site VPN from their location C to their location A. All traffic flows through a Checkpoint Firewall running R80.x (think of it like we are their ISP), at the point of exit we NAT the traffic from their source IP (C) to ours (B) as well as change the source port number to Y.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that when the VPN fails for any reason and reestablishes, it is renatted to a different source Port (Z) which is seen as a new tunnel at the destination and this breaks the clients communication as all comms should remain on the original port (Y).&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question: Is there a way to set a NAT or anything else on the firewall that woud say, if traffic is sourced from IP address C then use permanently source port Y. I suspect that I would also have to put some sort of reservation on that port so that it is not used. but I'm not sure that this is possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any insights/thoughts would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 08 Jul 2020 16:44:50 GMT</pubDate>
    <dc:creator>H2-F1</dc:creator>
    <dc:date>2020-07-08T16:44:50Z</dc:date>
    <item>
      <title>NAT Source Port manipulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/90783#M10824</link>
      <description>&lt;P&gt;Hello Checkmates&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm currently dealing with an issue for a client and need some guidance from the community.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have attached a diagram showing the traffic flow. which I have summarised below:&lt;/P&gt;&lt;P&gt;The client establishes a site to site VPN from their location C to their location A. All traffic flows through a Checkpoint Firewall running R80.x (think of it like we are their ISP), at the point of exit we NAT the traffic from their source IP (C) to ours (B) as well as change the source port number to Y.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The issue is that when the VPN fails for any reason and reestablishes, it is renatted to a different source Port (Z) which is seen as a new tunnel at the destination and this breaks the clients communication as all comms should remain on the original port (Y).&amp;nbsp;&lt;/P&gt;&lt;P&gt;The question: Is there a way to set a NAT or anything else on the firewall that woud say, if traffic is sourced from IP address C then use permanently source port Y. I suspect that I would also have to put some sort of reservation on that port so that it is not used. but I'm not sure that this is possible.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any insights/thoughts would be appreciated.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jul 2020 16:44:50 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/90783#M10824</guid>
      <dc:creator>H2-F1</dc:creator>
      <dc:date>2020-07-08T16:44:50Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Source Port manipulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/90941#M10825</link>
      <description>Unfortunately, the diagram doesn't really clarify the situation at all.&lt;BR /&gt;&lt;BR /&gt;Is Site C terminating VPN on Site B or only going through Site B to terminate on Site A?&lt;BR /&gt;Also, are you doing a static NAT or a hide NAT?&lt;BR /&gt;Because a static NAT would not change the source port at all from what the client specifies.&lt;BR /&gt;When you are doing a hide NAT, you have zero control over the source port and can't specify/change it to suit your desires.</description>
      <pubDate>Wed, 08 Jul 2020 23:17:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/90941#M10825</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-08T23:17:39Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Source Port manipulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/91136#M10826</link>
      <description>Hi Dameon&lt;BR /&gt;&lt;BR /&gt;the VPN is initiated by Site C goes through Site B where it is natted (Hide NAT) and terminates on Site A. Based on the information you provided we would need to change the nat to a static NAT.&lt;BR /&gt;&lt;BR /&gt;Would you know if there is a way to do a dynamic nat pool, the address wouldn't be a 1-to-1 but for that session + x Hours it wouldn't change (like a DHCP lease), if the session drops for more than an hour it'll pick up the same public IP again when it reconnects.</description>
      <pubDate>Fri, 10 Jul 2020 11:01:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/91136#M10826</guid>
      <dc:creator>H2-F1</dc:creator>
      <dc:date>2020-07-10T11:01:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Source Port manipulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/91168#M10827</link>
      <description>&lt;P&gt;There is IP Pool NAT available, but I don't think the timeout is adjustable and, offhand, not sure what the timeout is.&lt;BR /&gt;Enable it in Global Properties:&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-07-10 at 11.02.20 AM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7219i17F3A5E7B6957D05/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-07-10 at 11.02.20 AM.png" alt="Screen Shot 2020-07-10 at 11.02.20 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Then you can change the settings in the relevant gateway object:&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screen Shot 2020-07-10 at 11.03.21 AM.png" style="width: 400px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7220i4DC687A8AF131323/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Screen Shot 2020-07-10 at 11.03.21 AM.png" alt="Screen Shot 2020-07-10 at 11.03.21 AM.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;See also:&amp;nbsp;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk39327" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk39327&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 18:05:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/91168#M10827</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-07-10T18:05:23Z</dc:date>
    </item>
    <item>
      <title>Re: NAT Source Port manipulation</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/91173#M10828</link>
      <description>&lt;P&gt;Excellent,&lt;/P&gt;&lt;P&gt;The article you referred shows that the IP NAT Pool timer is configurable. I will give this a try and let you know how we get on.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="IP-NAT-Pool.PNG" style="width: 734px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/7221i82FFE7D29F23C492/image-size/large?v=v2&amp;amp;px=999" role="button" title="IP-NAT-Pool.PNG" alt="IP-NAT-Pool.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Fri, 10 Jul 2020 18:17:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-Source-Port-manipulation/m-p/91173#M10828</guid>
      <dc:creator>H2-F1</dc:creator>
      <dc:date>2020-07-10T18:17:46Z</dc:date>
    </item>
  </channel>
</rss>

