<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: header to identify inbound original ip after nat hide nat in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65247#M12366</link>
    <description>If you're doing this with NAT, no.&lt;BR /&gt;I believe you can achieve this with MAB Reverse Proxy.&lt;BR /&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110348" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110348&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;However that SK says it doesn't add XFF.&lt;BR /&gt;However, you can add it by editing the reverse proxy conf file&lt;BR /&gt;$CVPNDIR/conf/ReverseProxy_conf/httpd_common.conf&lt;BR /&gt;Add the line -&lt;BR /&gt;CvpnAddHeader "X-Forwarded-For" "$CLIENTIP" – to the end of the file.&lt;BR /&gt;Save changes and run ReverseProxyCLI apply config&lt;BR /&gt;</description>
    <pubDate>Thu, 17 Oct 2019 23:37:56 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2019-10-17T23:37:56Z</dc:date>
    <item>
      <title>header to identify inbound original ip after nat hide nat</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65049#M12365</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;below is the scenario&lt;/P&gt;&lt;P&gt;Internet -- &amp;gt; Checkpoint Firewall (any internet Nat'd to firewall external interface ip hide nat) ---- &amp;gt; Load balancer -- &amp;gt; backend server&lt;/P&gt;&lt;P&gt;Need to identify the inbound public ip post performing Nat in checkpoint firewall for analysis.&lt;/P&gt;&lt;P&gt;Is there a way to see this original inbound public ip in packet captures with different header name like xff etc....&lt;/P&gt;&lt;P&gt;thanks&amp;nbsp;&lt;/P&gt;&lt;P&gt;BSB&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 16 Oct 2019 02:55:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65049#M12365</guid>
      <dc:creator>bsb</dc:creator>
      <dc:date>2019-10-16T02:55:45Z</dc:date>
    </item>
    <item>
      <title>Re: header to identify inbound original ip after nat hide nat</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65247#M12366</link>
      <description>If you're doing this with NAT, no.&lt;BR /&gt;I believe you can achieve this with MAB Reverse Proxy.&lt;BR /&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110348" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110348&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;However that SK says it doesn't add XFF.&lt;BR /&gt;However, you can add it by editing the reverse proxy conf file&lt;BR /&gt;$CVPNDIR/conf/ReverseProxy_conf/httpd_common.conf&lt;BR /&gt;Add the line -&lt;BR /&gt;CvpnAddHeader "X-Forwarded-For" "$CLIENTIP" – to the end of the file.&lt;BR /&gt;Save changes and run ReverseProxyCLI apply config&lt;BR /&gt;</description>
      <pubDate>Thu, 17 Oct 2019 23:37:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65247#M12366</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-17T23:37:56Z</dc:date>
    </item>
    <item>
      <title>Re: header to identify inbound original ip after nat hide nat</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65363#M12367</link>
      <description>&lt;P&gt;Hi,&amp;nbsp;&lt;/P&gt;&lt;P&gt;This is for inbound connection.&lt;/P&gt;&lt;P&gt;below is the scenario.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. ISP --- &amp;gt; inbound traffic -- &amp;gt; FW (incoming interface 1 and exit interface 2) --- &amp;gt; Load balancer --- &amp;gt; backend servers.&lt;/P&gt;&lt;P&gt;2. Same ISP -- &amp;gt; inbound traffic -- &amp;gt; FW (same firewall - incoming interface 1 and exit interface 5 ) -- &amp;gt; Load balancer(same LB) -- &amp;gt; backend servers.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;problem is already we have a default route pointing towards firewall interface 2 from load balancer.&lt;/P&gt;&lt;P&gt;having one more default towards different different interface is not feasible.&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="scenario.png" style="width: 200px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/2780iD38B20B4BE0DFFE2/image-size/small?v=v2&amp;amp;px=200" role="button" title="scenario.png" alt="scenario.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;hence inbound public ip is natted, nat ip reaches LB, where LB has the comfort of routing nat'd ip towards different interface.&lt;/P&gt;</description>
      <pubDate>Sat, 19 Oct 2019 03:11:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65363#M12367</guid>
      <dc:creator>bsb</dc:creator>
      <dc:date>2019-10-19T03:11:16Z</dc:date>
    </item>
    <item>
      <title>Re: header to identify inbound original ip after nat hide nat</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65367#M12368</link>
      <description>MAB Reverse Proxy will proxy the connection, originating it from the Security Gateway so NAT will not be required.&lt;BR /&gt;It can also add the XFF header, assuming you configure it as described.&lt;BR /&gt;Check Point does not provide a mechanism to add an XFF header when using NAT alone.</description>
      <pubDate>Sat, 19 Oct 2019 12:32:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/header-to-identify-inbound-original-ip-after-nat-hide-nat/m-p/65367#M12368</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2019-10-19T12:32:04Z</dc:date>
    </item>
  </channel>
</rss>

