<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Many-to-One NAT from VPN to Internal in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122748#M17565</link>
    <description>&lt;P&gt;Thank you for the update!&lt;/P&gt;
&lt;P&gt;Please update the thread with (hopefully) eventual resolution.&lt;/P&gt;</description>
    <pubDate>Thu, 01 Jul 2021 16:49:28 GMT</pubDate>
    <dc:creator>Vladimir</dc:creator>
    <dc:date>2021-07-01T16:49:28Z</dc:date>
    <item>
      <title>Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122247#M17488</link>
      <description>&lt;P&gt;Hello guys,&lt;/P&gt;&lt;P&gt;i'm trying to understand if this type of NAT can be possible on CheckPoint firewall.&amp;nbsp;&lt;/P&gt;&lt;P&gt;Let me explain the scenario:&lt;/P&gt;&lt;P&gt;We have a VPN with a 3rd party gateway that is formed from remote network 172.16.32.0/24, while on our side we publish a 10.0.0.0/24. The remote network should reach various services hosted on a single IP, in this case it's 192.168.10.1.&lt;/P&gt;&lt;P&gt;On our old firewall we have done a simple NAT in this WAY:&lt;/P&gt;&lt;P&gt;Source: 172.16.32.0/24 Destination: 10.0.0.0/24 Translated Destination: 192.168.10.1&lt;/P&gt;&lt;P&gt;But on CheckPoint is not working. I've also tried Automatic NAT on network 10.0.0.0/24, but looks like this solution is only for traffic originated inside and not from VPN. Obviously create Static NAT with fixed IP from subnet 10.0.0.0/24 is working, but want to avoid because some remote client can have different IP from the already known.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a workaround to do that?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:55:03 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122247#M17488</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T12:55:03Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122249#M17489</link>
      <description>&lt;P&gt;Apologies, but Im slightly confused...&lt;/P&gt;
&lt;P&gt;When you say below:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Source: 172.16.32.0/24 Destination: 172.16.32.0/24 Translated Destination: 192.168.10.1&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;...its same source and destination, why do you need to translate that??&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 11:45:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122249#M17489</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T11:45:46Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122250#M17490</link>
      <description>&lt;P&gt;Sorry what’s a typo, it is:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Source: 172.16.32.0/24, Destination 10.0.0.0/24, Translated Dest: 192.168.10.1/32&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 11:49:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122250#M17490</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T11:49:19Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122252#M17491</link>
      <description>&lt;P&gt;Im really glad you asked this question and I will tell you how to do it. I know this is not as easy as it may seem...so what you have to do is instead of using host object create address range and give it starting and ending IP as same address, so in your case 192.168.10.1 and once you save, dont push policy yet, just click the option from the menu to verify, because if it shows all green, then its good to go.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Let me know if any issues. I actually discovered this last year when customer had exactly same problem...&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 11:55:16 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122252#M17491</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T11:55:16Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122255#M17492</link>
      <description>&lt;P&gt;Hi the_rock so here is the list of what i've tried:&lt;/P&gt;&lt;P&gt;- first attempt: SRC NET: 172.16.32.0/24 DST NET 10.0.0.0/24 DST XLATE 192.168.10.1 (as address range) -- not working&lt;/P&gt;&lt;P&gt;- secondattempt: SRC NET: 172.16.32.0/24 DST NET 10.0.0.1-254 (as address range) DST XLATE 192.168.10.1 (as address range) -- not working&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The only way to make it works is with a single IP as DST NET &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:22:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122255#M17492</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T12:22:00Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122256#M17493</link>
      <description>&lt;P&gt;Can you send me a screenshot of the rule you attempted the way I mentioned, as well as how you defined address range?&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:33:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122256#M17493</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T12:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122257#M17494</link>
      <description>&lt;P&gt;yes, see the attachments&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:37:18 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122257#M17494</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T12:37:18Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122258#M17495</link>
      <description>&lt;P&gt;Make sure you did not inadvertently configured NAT for auto nat on the network objects. Just for my own sanity, I tested this in the lab and worked fine. See attached. Im free around 1.30 pm EST to do remote if you like, just message me privately.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Cheers.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:46:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122258#M17495</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T12:46:30Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122259#M17496</link>
      <description>&lt;P&gt;i've checked all the network objects and auto nat is not enabled.&lt;/P&gt;&lt;P&gt;I'm testing it too into a small lab before production. I'm in Italy, so 1.30PM EST should be 7PM here, but i'm not avaliable at this time &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:54:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122259#M17496</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T12:54:33Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122260#M17497</link>
      <description>&lt;P&gt;Ah Italy, ok :). Im just watching some Italian cartoon movie. Buongiorno...hey, send me your email, lets do remote now, I can send you webex or zoom.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 12:58:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122260#M17497</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T12:58:57Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122263#M17498</link>
      <description>&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt;&amp;nbsp;...maybe you can give your CP expert input on this. So I did zoom remote with Gianmarco and he showed me that if you do single IP as destination in original packet, all works fine, BUT, if you do whole network /24, it fails, for some reason nat does not take place...cant say I seen this in a long time. Do you think maybe clearing NAT table might be worth it? We did capture on the firewall for destination IP 192.168.15.19 and all we see are echo requests and no replies and no drops anywhere, but routing definitely seems correct.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 14:49:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122263#M17498</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T14:49:41Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122266#M17500</link>
      <description>&lt;P&gt;This is sounding like a bug which means we’ll need a TAC.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 16:18:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122266#M17500</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-06-26T16:18:46Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122268#M17501</link>
      <description>&lt;P&gt;I’ve already opened a SR and explain the current behavior. I let you know when have a feedback.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;&lt;P&gt;thanks all for your support&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 16:27:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122268#M17501</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T16:27:46Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122270#M17502</link>
      <description>&lt;P&gt;Not sure I understand what you are trying to accomplish here.&lt;/P&gt;
&lt;P&gt;What is the 192.168.10.1? Is there a network 192.168.10.0/24?&lt;/P&gt;
&lt;P&gt;Is this network connected to one of the firewall's interfaces or is it a routed network behind 10.0.0.0/24?&lt;/P&gt;
&lt;P&gt;When you are writing&amp;nbsp; "I've also tried Automatic NAT on network 10.0.0.0/24, but looks like this solution is only for traffic originated inside and not from VPN. Obviously create Static NAT with fixed IP from subnet 10.0.0.0/24 is working, but want to avoid because some remote client can have different IP from the already known."&lt;/P&gt;
&lt;P&gt;My understanding is that the clients you are expecting to come in would all belong to the 172.16.32.0/24 (for now).&lt;/P&gt;
&lt;P&gt;So your working NAT rules, presumably (or should) look like:&lt;/P&gt;
&lt;P&gt;172.16.32.0/24 to 10.0.0.x/32, service; original to 192.168.10.1, original&lt;/P&gt;
&lt;P&gt;192.168.10.1 to 172.16.32.0/24, service; 10.0.0.x/32 to original, original&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;where 10.0.0.x/32 is the single IP your peer would be connecting to for a given service.&lt;/P&gt;
&lt;P&gt;You can define that IP either as a dummy host or as a /32 network.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 16:44:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122270#M17502</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-06-26T16:44:40Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122272#M17503</link>
      <description>&lt;P&gt;Thats what I thought as well...maybe fw tab -t fwx_alloc -x command might help, but not sure if even clearing NAT table would do much, but worth a try.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 17:02:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122272#M17503</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-06-26T17:02:14Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122273#M17504</link>
      <description>&lt;P&gt;What I’ve to achieve is this:&lt;/P&gt;&lt;P&gt;each packet received from source NET 172.16.32.x and destinated to any IP of the NET 10.0.0.x (it’s a fake network, not present anywhere) should be natted to IP 192.168.10.1. As I’ve said doing static NAT to specific IP of NET 10.0.0.x to 192.168.10.1 is working as expected.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 17:14:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122273#M17504</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-26T17:14:51Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122274#M17505</link>
      <description>&lt;P&gt;But that's exactly what I do not understand the reason for.&lt;/P&gt;
&lt;P&gt;I mean, if you have a legitimate need to NAT network to network 1:1, I understand that.&lt;/P&gt;
&lt;P&gt;If, on the other hand, your incoming traffic is &lt;STRONG&gt;ultimately targeting a single IP&lt;/STRONG&gt;, why would the users in NET 172.16.32.x be trying to connect to random IPs in NET 10.0.0.x, to only be NATed to a single IP?&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 17:27:19 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122274#M17505</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-06-26T17:27:19Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122275#M17506</link>
      <description>&lt;P&gt;Because on the other side I don’t have a real user but an IoT device that can be configured with various IP of subnet 10.0.0.x, and we are not aware of all IPs, so to avoid doing NAT for each sigle IP we are using this type of configuration on actual firewall (obviously there is a rule that restrict ports on the target machine)&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jun 2021 11:38:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122275#M17506</guid>
      <dc:creator>stich86</dc:creator>
      <dc:date>2021-06-27T11:38:43Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122278#M17507</link>
      <description>&lt;P&gt;Thank you for explaining your use case, it makes sense now.&lt;/P&gt;</description>
      <pubDate>Sat, 26 Jun 2021 18:09:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122278#M17507</guid>
      <dc:creator>Vladimir</dc:creator>
      <dc:date>2021-06-26T18:09:30Z</dc:date>
    </item>
    <item>
      <title>Re: Many-to-One NAT from VPN to Internal</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122291#M17509</link>
      <description>&lt;P&gt;Just an idea ... What if you use VIP in combination of Load Balance ? I mean, you will always connect to the same IP (VIP), but the LB will do the job to transfer traffic to real (random) IoT IP. LB will be "man-in-the-middle" configured with static IP (VIP).&lt;/P&gt;</description>
      <pubDate>Sun, 27 Jun 2021 06:45:15 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Many-to-One-NAT-from-VPN-to-Internal/m-p/122291#M17509</guid>
      <dc:creator>JozkoMrkvicka</dc:creator>
      <dc:date>2021-06-27T06:45:15Z</dc:date>
    </item>
  </channel>
</rss>

