<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Incorrect NAT IP on Interface when failover in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130655#M19193</link>
    <description>&lt;P&gt;Do these UDP/443 packets has same source port?&lt;/P&gt;</description>
    <pubDate>Thu, 30 Sep 2021 10:00:57 GMT</pubDate>
    <dc:creator>Yair_Shahar</dc:creator>
    <dc:date>2021-09-30T10:00:57Z</dc:date>
    <item>
      <title>Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130629#M19189</link>
      <description>&lt;P&gt;Hi all,&lt;/P&gt;&lt;P&gt;We have this weird situation. Our firewall has a BGP peering with a peer from which certain routes are being learned. The BGP PEER is 172.17.0.10 as per diagram below. One of the routes learned from this peer is 1.1.1.0/24.&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-30 08_11_58-Window.png" style="width: 588px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13821i9283C82BB8CC2A52/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-09-30 08_11_58-Window.png" alt="2021-09-30 08_11_58-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;BGP works fine and as per below screenshot, it can be seen that route towards 1.1.1.0/24 should pass through eth2.777.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-30 08_12_49-Window.png" style="width: 707px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13817i441BAAD62284AC40/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-09-30 08_12_49-Window.png" alt="2021-09-30 08_12_49-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;So far so good. Traffic passes fine. Source 172.16.168.34 is able to talk to 1.1.1.0/24 through eth2.777. The source 172.16.168.34 is NATted behind the gateway ip address which is 172.17.0.1.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-30 08_13_23-Window.png" style="width: 608px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13818iF415C630F0E0D376/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-09-30 08_13_23-Window.png" alt="2021-09-30 08_13_23-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The issue arises when BGP peer is down. Obviously the learned routes will not be available so since 1.1.1.0/24 is a public IP address, traffic goes then through eth5 which is through the default route.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-30 08_13_57-Window.png" style="width: 739px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13819i0A551128B0000A00/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-09-30 08_13_57-Window.png" alt="2021-09-30 08_13_57-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;The only thing is that through fw monitor, we can see that traffic although is going out through the correct interface (eth5), it is still being NATted behind the IP address of interface eth2.777.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-30 08_15_52-Window.png" style="width: 722px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13820i9DC66A84EA7BD7F9/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-09-30 08_15_52-Window.png" alt="2021-09-30 08_15_52-Window.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;DIV class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;P&gt;In this case originally I was pinging 1.1.1.1 and upon route failover, it stopped working since NATting is not being changed accordingly. However if I try to ping another IP address which was not in use before for example 1.1.1.2, NATting is performed correctly and hidden behind the public ip of eth5. This is causing severe outages on our environment because we expect that traffic is NATted correctly when route failover occurs. It seems that NAT problem occurs only on machines which already have a connection established. So somewhere in the NAT table the values are not being updated.&lt;/P&gt;&lt;P&gt;Effectively this is a lab environment I have created since originally this is a production critical system.&lt;/P&gt;&lt;P&gt;I have also tried to disable secureXL however to no avail. Our production firewalls are with R80.30 Jumbo Hotfix 217, however in the lab I managed even to replicate it on R81 with latest jumbo hotfix, so it seems something common on Checkpoint.&lt;/P&gt;&lt;P&gt;Has anyone encountered such behaviour and how did you overcome it? Basically traffic going out of the correct interface but NATting with the wrong IP address.&lt;/P&gt;&lt;P&gt;For traffic that is ICMP its solved with this command -&amp;nbsp;fw_allow_simultaneous_ping 1 , however we have multiple tunnels which are being established behind our firewall using UDP/443, which when primary route (BGP) is down, they need to still be reachable via the default route.&lt;/P&gt;&lt;P&gt;Thanks in advance&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 06:18:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130629#M19189</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-09-30T06:18:42Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130645#M19190</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;Same NAT IP will be applied to packets of an already opened connection, main reason is that the server will not recognize this is the same connection and will probably drop the connection.&lt;/P&gt;
&lt;P&gt;Once new connection is established new NAT IP will be applied.&lt;/P&gt;
&lt;P&gt;Yair&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 08:55:39 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130645#M19190</guid>
      <dc:creator>Yair_Shahar</dc:creator>
      <dc:date>2021-09-30T08:55:39Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130646#M19191</link>
      <description>&lt;P&gt;Hi Yair,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks for the reply.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But what do you mean a new connection? The originating traffic constantly sends tunneled traffic on UDP/443 and UDP if fire and forget. How will CheckPoint be aware that the connection is terminated since there is no three way handshake?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 09:00:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130646#M19191</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-09-30T09:00:22Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130655#M19193</link>
      <description>&lt;P&gt;Do these UDP/443 packets has same source port?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 10:00:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130655#M19193</guid>
      <dc:creator>Yair_Shahar</dc:creator>
      <dc:date>2021-09-30T10:00:57Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130664#M19194</link>
      <description>&lt;P&gt;Hi Yair,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, Source port is 443 and destination port is 443 too.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 12:03:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130664#M19194</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-09-30T12:03:42Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130667#M19195</link>
      <description>&lt;P&gt;I assume the firewall holds this connection (same 5-tuple) in the firewall connection table and every packet that match this tuple counts as same connection and refresh the timeout so connection not getting deleted (timed out) from the table.&lt;/P&gt;
&lt;P&gt;what is the gap between each udp packet?&lt;/P&gt;
&lt;P&gt;maybe you can change service timeouts (in service properties) to have the connection deleted from the table on each packet or so?&lt;/P&gt;
&lt;P&gt;Yair&lt;/P&gt;
&lt;DIV id="tinyMceEditor_8a54e5c4d0feccYair_Shahar_0" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;DIV id="tinyMceEditor_8a54e5c4d0feccYair_Shahar_1" class="mceNonEditable lia-copypaste-placeholder"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 12:26:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130667#M19195</guid>
      <dc:creator>Yair_Shahar</dc:creator>
      <dc:date>2021-09-30T12:26:14Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130690#M19197</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;The time delta between each packet is negligible as its constantly sending these packets. In wireshark there is a filter with src and dst ip addresses. The screenshot below shows the time delta between each packet.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="2021-09-30 15_30_07-cap1.pcap.png" style="width: 226px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/13836i80B898D8D3A7939A/image-size/large?v=v2&amp;amp;px=999" role="button" title="2021-09-30 15_30_07-cap1.pcap.png" alt="2021-09-30 15_30_07-cap1.pcap.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;what do you mean by ' change service timeouts to have the connection deleted form the table on each packet?'&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thanks&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:31:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130690#M19197</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-09-30T13:31:45Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130694#M19198</link>
      <description>&lt;P&gt;In such delta time I assume we would not be able to cause the connection to get deleted from the connection table on each packet.&lt;/P&gt;
&lt;P&gt;BTW - can you verify it is indeed always same connection in 'fw tab -t connections -f -u' | grep &amp;lt;server ip&amp;gt; - you will probably see connection timeout always refreshed&lt;/P&gt;
&lt;P&gt;what is the option to make those connections to use different source port?&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 13:46:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130694#M19198</guid>
      <dc:creator>Yair_Shahar</dc:creator>
      <dc:date>2021-09-30T13:46:38Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130704#M19199</link>
      <description>&lt;P&gt;option to make these connections use different source port i think its impossible since this is an outpost of AWS always communicating with AWS. So its a black box for us.&lt;/P&gt;&lt;P&gt;with regards to running fw tab -t connections -f -u i think will hang the firewall as it uses a lot of RAM&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 14:08:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130704#M19199</guid>
      <dc:creator>lullejd</dc:creator>
      <dc:date>2021-09-30T14:08:45Z</dc:date>
    </item>
    <item>
      <title>Re: Incorrect NAT IP on Interface when failover</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130707#M19200</link>
      <description>&lt;P&gt;Thanks&lt;/P&gt;
&lt;P&gt;I would suggest to contact TAC to see if there any other solution I might not be aware of.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Yair&lt;/P&gt;</description>
      <pubDate>Thu, 30 Sep 2021 14:25:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Incorrect-NAT-IP-on-Interface-when-failover/m-p/130707#M19200</guid>
      <dc:creator>Yair_Shahar</dc:creator>
      <dc:date>2021-09-30T14:25:53Z</dc:date>
    </item>
  </channel>
</rss>

