<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NAT and encryption domain in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124121#M17867</link>
    <description>&lt;P&gt;This is mostly a result of how Check Point handles domain-based VPN. The VPN routing logic is basing itself on the encryption domains. NAT is happening later in the firewall chain so the packets being tagged for VPN routing has already been taking place.&lt;BR /&gt;&lt;BR /&gt;But if you happen to utilise VTI instead of domain-based routing the negotiated encryption domain doesn't take any part in the actual VPN routing. 0.0.0.0/0 will be used as the encryption domain and whatever traffic you are routing through the virtual interface (VTI) determine what is going to be sent over the VPN tunnel so this should make it possible without having to deal with the encryption domains.&lt;BR /&gt;&lt;BR /&gt;But setting up VTI on Check Point is rather different and less normal than configuring domain-based VPN so this will most likely just become more confusing compared to simply adding the address to the encryption domain.&lt;/P&gt;</description>
    <pubDate>Thu, 15 Jul 2021 18:05:35 GMT</pubDate>
    <dc:creator>RamGuy239</dc:creator>
    <dc:date>2021-07-15T18:05:35Z</dc:date>
    <item>
      <title>NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/123774#M17815</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;I have a question about NAT and encryption domain.&amp;nbsp; My setup is as per below:&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="fwCapture.PNG" style="width: 645px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/12536i50CA3660377A149A/image-dimensions/645x309?v=v2" width="645" height="309" role="button" title="fwCapture.PNG" alt="fwCapture.PNG" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;There is a VPN tunnel between FW_EXTERNAL and EXTERNAL.&amp;nbsp; 192.168.0.1 is in the encryption domain and it accesses 172.26.0.1.&amp;nbsp; I also perform NAT and translate the source to 10.20.20.1.&amp;nbsp; Everything works fine.&lt;/P&gt;&lt;P&gt;Now I'd like to allow 10.10.10.1 to access&amp;nbsp;172.26.0.1.&amp;nbsp; Is there any way to achieve that &lt;STRONG&gt;without&lt;/STRONG&gt; adding&amp;nbsp;10.10.10.1 in the encryption domain on&amp;nbsp;FW_EXTERNAL?&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 07:57:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/123774#M17815</guid>
      <dc:creator>Teddy_Brewski</dc:creator>
      <dc:date>2021-07-14T07:57:49Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/123789#M17817</link>
      <description>&lt;P&gt;As far as I'm aware, the firewall needs to tag the packets for encryption and this is based on the real IP (pre-NAT), then to actually route it in the tunnel, the NATed IP should be defined. So you need both the real and the NATed IPs in your encryption domain.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So short of NATing the source on FW_Internal, you will need to add the real to the encryption domain on FW_External. R80.40+ allows you to specify Encryption domains per VPN community (not just RA) if you're worried about overlap.&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 10:51:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/123789#M17817</guid>
      <dc:creator>Gareth_somers</dc:creator>
      <dc:date>2021-07-14T10:51:12Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/123846#M17829</link>
      <description>&lt;P&gt;The Encryption Domain must include everything that needs to talk on the VPN.&lt;BR /&gt;That obviously has implications when negotiating a VPN with a third party.&lt;BR /&gt;See:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/Security-Gateways/NAT-Before-VPN/m-p/122828#M17586" target="_blank"&gt;https://community.checkpoint.com/t5/Security-Gateways/NAT-Before-VPN/m-p/122828#M17586&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 14 Jul 2021 16:56:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/123846#M17829</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-14T16:56:11Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124121#M17867</link>
      <description>&lt;P&gt;This is mostly a result of how Check Point handles domain-based VPN. The VPN routing logic is basing itself on the encryption domains. NAT is happening later in the firewall chain so the packets being tagged for VPN routing has already been taking place.&lt;BR /&gt;&lt;BR /&gt;But if you happen to utilise VTI instead of domain-based routing the negotiated encryption domain doesn't take any part in the actual VPN routing. 0.0.0.0/0 will be used as the encryption domain and whatever traffic you are routing through the virtual interface (VTI) determine what is going to be sent over the VPN tunnel so this should make it possible without having to deal with the encryption domains.&lt;BR /&gt;&lt;BR /&gt;But setting up VTI on Check Point is rather different and less normal than configuring domain-based VPN so this will most likely just become more confusing compared to simply adding the address to the encryption domain.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 18:05:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124121#M17867</guid>
      <dc:creator>RamGuy239</dc:creator>
      <dc:date>2021-07-15T18:05:35Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124122#M17868</link>
      <description>&lt;P&gt;I agree with phoneboy as well...I am pretty sure vpn domain must include 10.10.10.1 IP. I dont know, maybe there is some convoluted way of doing this otherwise, but Im not aware of it if it has to go through VPN tunnel.&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 18:09:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124122#M17868</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2021-07-15T18:09:51Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124135#M17873</link>
      <description>&lt;P&gt;That point was proven out in the thread I linked to. &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 15 Jul 2021 20:47:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/124135#M17873</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-07-15T20:47:33Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132829#M19719</link>
      <description>&lt;P&gt;I just ran in to this yesterday.&amp;nbsp; We're doing NAT for both incoming and outbound traffic on a policy-based VPN (aka "one tunnel per subnet" in CheckPoint speak) and found the VPN needed to include the NAT IPs for incoming traffic but true IPs for outgoing.&amp;nbsp; This is consistent with how firewall rules must be configured, but counter-intuitive because you'd think the CheckPoint would NAT the traffic first prior to encrypting it to be send across the tunnel.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I've yet to find an official CheckPoint document that explains this requirement.&amp;nbsp; With other vendors (Cisco, Palo Alto, etc) there is no such requirement to have the true IP address in the encryption domain.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 16:29:25 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132829#M19719</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-10-28T16:29:25Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132833#M19723</link>
      <description>&lt;P&gt;We need to know what traffic is "interesting" as far as encryption goes, particularly when using domain-based VPNs (versus route-based).&lt;BR /&gt;This is done by way of defining the encryption domain to include the real IPs.&amp;nbsp;&lt;BR /&gt;In a route-based VPN, this isn't necessary, since traffic will only be "interesting" if it is routed out the relevant VTI.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 18:38:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132833#M19723</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-28T18:38:28Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132835#M19724</link>
      <description>&lt;P&gt;Well, that still doesn't explain the requirement, because the SAs (traffic selectors / crypto maps / proxy ids / whatever you want to call them) get built using the NAT IP addresses.&amp;nbsp; &amp;nbsp;This is what shows up when running &lt;STRONG&gt;vpn tu tlist&lt;/STRONG&gt; on the gateway.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thus, the "interesting" traffic has already been defined.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 18:58:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132835#M19724</guid>
      <dc:creator>johnnyringo</dc:creator>
      <dc:date>2021-10-28T18:58:10Z</dc:date>
    </item>
    <item>
      <title>Re: NAT and encryption domain</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132836#M19725</link>
      <description>&lt;P&gt;Yes, but the decision to encrypt or not is made &lt;STRONG&gt;&lt;EM&gt;before&lt;/EM&gt;&lt;/STRONG&gt;&amp;nbsp;SAs are negotiated.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 28 Oct 2021 19:09:23 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/NAT-and-encryption-domain/m-p/132836#M19725</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2021-10-28T19:09:23Z</dc:date>
    </item>
  </channel>
</rss>

